Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computer crime
biblio
Light-Weight DDoS Mitigation at Network Edge with Limited Resources
Submitted by grigby1 on Wed, 04/13/2022 - 9:28am
Internet of Things
resource management
Resiliency
resilience
Queueing analysis
pubcrawl
performance evaluation
Metrics
Logic gates
Communication system security
Image edge detection
Human behavior
Floods
denial-of-service attack
DDoS attack mitigation
computer network management
Computer crime
composability
biblio
Econometric Models for Estimating the Financial Effect of Cybercrimes
Submitted by aekwall on Wed, 04/13/2022 - 9:14am
Computational modeling
Reliability
Computer crime
pubcrawl
Resiliency
Ransomware
cyber attack
Costs
Regulation
Cybercrime
econometric model
economic impact
hidden cost
legislation
monetary cost
Damage Assessment
biblio
Named Entity Recognition in Cyber Threat Intelligence Using Transformer-based Models
Submitted by grigby1 on Tue, 04/12/2022 - 11:14am
Feeds
XLNet
RoBERTa
named entity recognition
ELECTRA
DNRTI
BERT
cyber threat intelligence
dark web
deep learning
social networking (online)
visualization
Web pages
Computer crime
Human behavior
pubcrawl
Training
biblio
Network Protocol Reverse Parsing Based on Bit Stream
Submitted by grigby1 on Tue, 03/15/2022 - 1:16pm
Cloud Computing
security
pubcrawl
Conferences
Scalability
Protocols
cyber security
Computer crime
Syntactics
Clustering algorithms
Pattern recognition
association rules
Scalable Security
hierarchical clustering
reverse parsing
biblio
Simulation of the Effect of False Data Injection Attacks on SCADA using PSCAD/EMTDC
Submitted by grigby1 on Mon, 03/14/2022 - 11:37am
Power system dynamics
transient simulation
Transient analysis
Steady-state
SCADA Systems Security
sampling frequency
Resiliency
resilience
pubcrawl
Compositionality
power grids
polling
Human behavior
frequency estimation
Data models
cyberattacks
Computer crime
biblio
Cybersecurity Analysis of Wind Farm SCADA Systems
Submitted by grigby1 on Mon, 03/14/2022 - 11:36am
attack surface
Wind power generation
wind energy
Industry 4.0
ICS (industrial control system)
SCADA Systems Security
vulnerabilities
Wind farms
Market research
renewable energy sources
pubcrawl
Compositionality
Computer crime
cyberattack
SCADA systems
industrial control
Resiliency
resilience
Human behavior
biblio
Securing Energy Networks: Blockchain and Accounting Systems
Submitted by aekwall on Tue, 03/01/2022 - 3:31pm
Metrics
Triple Entry Accounting
Scandals and Fraud
risk management
Resiliency
Reliability
pubcrawl
Networks and Security
network accountability
blockchain
Focusing
distributed ledger
cyberattacks
computer network reliability
Computer crime
computer architecture
composability
blockchains
biblio
Towards Visual Analytics Dashboards for Provenance-driven Static Application Security Testing
Submitted by aekwall on Fri, 02/25/2022 - 9:46am
testing
Visualization application domains
software security engineering
Software and Application Security
security and privacy
human-centered computing
application security
codes
Provenance
visual analytics
security
composability
Human behavior
Resiliency
Metrics
pubcrawl
Computer crime
tools
visualization
biblio
Generating Fake Cyber Threat Intelligence Using Transformer-Based Models
Submitted by grigby1 on Wed, 02/09/2022 - 1:47pm
Human behavior
Data Poisoning Attack
cyber threat intelligence
Cybersecurity
Computer crime
cognition
Artificial Intelligence
AI Poisoning
Transformers
Training
Scalability
Resiliency
resilience
pubcrawl
Open Source Software
Neural networks
biblio
Incremental code updates exploitation as a basis for return oriented programming attacks on resource-constrained devices
Submitted by grigby1 on Fri, 02/04/2022 - 1:48pm
IoT
Scalability
rop attacks
return-oriented programming
Return Oriented Programming (ROP)
return oriented programming
Resiliency
resilience
pubcrawl
Power demand
Information Reuse
Incremental Code Update
Human Factors
Generators
encryption
Computer crime
composability
codes
authentication
security
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »