Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
invasive software
biblio
Modeling an Information-Based Advanced Persistent Threat Attack on the Internal Network
Submitted by grigby1 on Fri, 08/07/2020 - 3:57pm
cyberattack
APT attack
Weapons
weaponization movement
strategy decision-making
mathematical framework
lateral movement
internal network
intelligence gathering
initial entry model
information-based APT attack
information-based advanced persistent threat attack
IEL
defense mechanism ineffective
pubcrawl
Reconnaissance
Silicon
APT
advanced persistent threat
Metrics
invasive software
Decision Making
Scalability
Mathematical model
computer network security
Resiliency
resilience
Human behavior
biblio
Modeling Worm Propagation and Insider Threat in Air-Gapped Network using Modified SEIQV Model
Submitted by grigby1 on Fri, 08/07/2020 - 3:38pm
resilience
insider threat
invasive software
malware
Mathematical model
Metrics
modified SEIQV model
Patching
pubcrawl
Immune system
Resiliency
SEIQP model
SEIQV
susceptible-exposed-infected-quarantined-patched model
susceptible-exposed-infected-quarantined-vaccinated model
Worm
worm propagation modeling
computer network security
air-gapped network
anti-virus
Atmospheric modeling
Biological system modeling
biologically based epidemic models
Communication networks
composability
Computational modeling
Air gaps
computer networks
Computer worms
differential equations
Epidemic model
Grippers
Human behavior
Human Factors
biblio
CTRL-ALT-LED: Leaking Data from Air-Gapped Computers Via Keyboard LEDs
Submitted by grigby1 on Fri, 08/07/2020 - 3:38pm
optical equipment
light emitting diodes
light sensor
malicious insider
malware
Metrics
modern cyber-attack
modern USB keyboards
Network
Num-Lock
optical
optical communication
Keyboards
Optical sensors
pubcrawl
Receivers
remote cameras
resilience
Resiliency
Scroll-Lock
sensitive optical sensors
smart phones
Trusted Computing
Universal Serial Bus
CTRL-ALT-LED
Air gaps
air-gap
air-gapped computers
airgapped computers
bit rate 120.0 bit/s
bit rate 3000.0 bit/s
Cameras
Caps-Lock
composability
computer network security
covert channel
advanced persistent threat
data leakage prevention systems
evil maid attacks
exfiltrate data
exfiltration
firmware
Human behavior
Human Factors
invasive software
keyboard
keyboard LEDs
biblio
Bridging The Gap: Data Exfiltration In Highly Secured Environments Using Bluetooth IoTs
Submitted by grigby1 on Fri, 08/07/2020 - 3:38pm
invasive software
unprecedented threats
strict security policies
Software
sensitive information
sensitive environments
security standard
security measures
security
Science of Security
pubcrawl
professional networks
Payloads
malicious actor
IoT devices
IoT
air gapped network
Internet of Things
insecure IoT
Image color analysis
home networks
highly secured network
free-space optical communication
Data Exfiltration
Cryptography
computer network security
Browsers
botnets
Bluetooth smart bulb
Bluetooth IoT
Bluetooth
biblio
BLOC: A Game-Theoretic Approach to Orchestrate CPS against Cyber Attacks
Submitted by grigby1 on Thu, 07/16/2020 - 11:57am
game-theoretic approach
Stackelberg game model
simulations
Resiliency
resilience
pubcrawl
Metrics
measurement signals
Markov processes
Markov game model
Jamming
invasive software
HVAC system
HVAC
host machine infection
Games
Atmospheric modeling
game theory
game theoretical techniques
cyberattack
cyber-physical systems
cyber-attacks
Cyber Attacks
Current measurement
CPS modeling
CPS
control-loop constraints
control systems
control loop
composability
check blocks
BLOC
biblio
Study of hardware trojans based security vulnerabilities in cyber physical systems
Submitted by grigby1 on Thu, 07/16/2020 - 11:57am
SCADA systems
IC industry
integrated circuits
invasive software
malicious modifications
Metrics
pubcrawl
reliable functionality
resilience
Resiliency
hardware-in-the-loop based simulation platform
secure functionality
security
Security Awareness
security vulnerabilities
simulations
software peripherals
threat models
Trojan horses
CPS modeling
closed-loop systems
completely virtual simulation platform
complex computing environment
composability
Computational modeling
computing chip
computing hardware design
computing platform
closed loop systems
critical CPS application
cyber physical systems
cyber-physical systems
gas pipeline based SCADA system
Hardware
hardware internals
Hardware Trojans
hardware-in-the loop simulation
biblio
Ransomware Threat and its Impact on SCADA
Submitted by grigby1 on Fri, 07/10/2020 - 1:08pm
Ransom
Device Compromising
Downtime
Encrypting
human machine interface
ICs
Industrial Control Systems
industrial networks
industrial processes
Infected System
Locker
malicious software
Network
operation technology
Petya
programmable logic controllers
Data Mitigation
Ransomware
ransomware attack
Ransomware Deadline
Ransomware Incidents
Ransomware Prevention
Ransomware Strategies
Ransomware Taxonomy
ransomware threat
Ransomware Threating
Remote Terminal Units
SCADA systems
supervisory control and data acquisition
Threat report
WannaCry
cryptocurrency
invasive software
Cybersecurity
pubcrawl
Metrics
Resiliency
resilience
Human behavior
Computer crime
malware
Human Factors
control engineering computing
industrial control
information security
cybercrimes
production engineering computing
cryptojacking
business productivity
Coin Miner
critical infrastructure
critical infrastructures
Cryptor
Cyber Actor
cyber attack
cyber threat
cyber-attack incidents
cybercriminals
Data and System Access
Data Backup
Data Extortion
biblio
A survey of zero-day malware attacks and its detection methodology
Submitted by grigby1 on Fri, 07/10/2020 - 1:08pm
invasive software
zero-days
zero-day malware attacks
security systems
Resiliency
resilience
pubcrawl
Privacy-invasive software
Metrics
malware outbreaks
malware developers
malware detection
malware
large-scale attacks
advanced persistent threats
Human Factors
Human behavior
end-point security solutions
Electronic mail
detection methodology
detection
cryptojacking
Cryptography
Code Obfuscation
botnets
botnet
APT
analysis
biblio
TrustSign: Trusted Malware Signature Generation in Private Clouds Using Deep Feature Transfer Learning
Submitted by grigby1 on Fri, 07/10/2020 - 1:08pm
supervised classifiers
Metrics
neural nets
private clouds
program diagnostics
pubcrawl
ransomware samples
resilience
Resiliency
static analysis
malware
transfer learning
Trusted Computing
trusted malware signature generation method
TrustSign signature generation process
unsupervised classifier
Unsupervised Learning
VGG-19 neural network model
virtualisation
volatile memory
distribution time
Cloud Computing
cloud virtualization technology
convolutional neural networks
Cryptography
cryptojacking
cryptojacking attacks
deep feature transfer learning
deep learning
digital signatures
Automatic Signature Generation
dynamic analysis
fileless malware
high-level deep features
Human behavior
Human Factors
ImageNet dataset
in-browser cryptojacking attacks
inspection procedure
invasive software
biblio
Resident Evil: Understanding Residential IP Proxy as a Dark Service
Submitted by grigby1 on Fri, 07/10/2020 - 11:55am
residential-ip
malware hosting
Malware-and-unwanted-software
Network-and-systems-security
proxy hosts
pubcrawl
resident evil
residential IP proxy
residential networks
residential proxy
Logic gates
residential-IP-proxy-as-a-service
residential-proxy
RESIP IP
Security-and-privacy-for-the-Internet-of-Things
server- side
Servers
underground business world
web-proxy
emerging Internet business
Companies
compromised hosts
Computer crime
computer network security
dark service
dark web
elusive gray services
Embedded-systems-security
anonymity
engineered RESIP services
Human behavior
Human Factors
illicit operations RESIP hosts
internet
Internet service
invasive software
IP networks
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
…
next ›
last »