Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Electronic mail
biblio
Indigenous Network Monitoring System
Submitted by grigby1 on Fri, 05/15/2020 - 10:58am
real-time systems
military communication
military reconnaissance
miniature preset codes
Monitoring
NavIC control center
Network reconnaissance
NMS
offline link analysis plot
Protocols
pubcrawl
real-time network monitoring
Lucknow
resilience
Resiliency
satellite navigation
Scalability
security
Simple Network Management Protocol
SMS alert
SMS alert and Security
snmp
SNMP comprise security risks
strategic necessity
GUI based real-time link status
command and control systems
communication link performance explication
computer network management
Decision Making
Electronic mail
electronic messaging
Email
external network satellite launch vehicle
Geo-orbit
graphical user interfaces
GUI
Bandwidth
ICMP
in-house network monitoring system
Inc
indigenous navigation system
indigenous Network monitoring system
inertial navigation
internet
Internet control message protocol based link monitoring
ISTRAC Launch network
ISTRAC network
link statistics
biblio
Modular Vulnerability Indication for the IoT in IP-Based Networks
Submitted by grigby1 on Fri, 05/15/2020 - 10:36am
Reconnaissance
modular vulnerability indication
multiple tools
Network reconnaissance
network scanner tools
Open Source Software
potential vulnerabilities
Protocols
pubcrawl
modular framework
resilience
Resiliency
Scalability
scanner module
scanning tools
security concepts
severe vulnerabilities
tools
intermediate scanning
analysis data
automated network reconnaissance
bad application
common IP-based IoT components
computer network security
Decision Making
Electronic mail
identified network vulnerabilities
advanced analysis modules
Internet of Things
Internet of Things devices
IoT devices
IP networks
IP-based networks
meaningful correlation
modular capabilities
biblio
Social Privacy Score Through Vulnerability Contagion Process
Submitted by aekwall on Mon, 04/20/2020 - 9:31am
Diffusion processes
privacy models and measurement
vulnerable social interactions
vulnerable interactions
vulnerable friends
vulnerability measurement
vulnerability diffusion process
vulnerability contagion process
social privacy score
privacy fields
privacy awareness framework
over-trusting vulnerable users
Messaging services
graph-theoretical properties
security of data
sensitive information
Message service
privacy issues
social networking (online)
Metrics
privacy
graph theory
pubcrawl
Electronic mail
Current measurement
security
data privacy
biblio
Power of Communication Behind Extreme Cybersecurity Incidents
Submitted by grigby1 on Fri, 04/10/2020 - 11:53am
Phishing
surrounding threats
security of data
Scalability
risk mitigations
risk management
risk analysis
Resiliency
resilience
pubcrawl
Protocols
Computational modeling
Pervasive Computing Security
Metrics
internet
Human Factors
Human behavior
extreme cybersecurity incidents
Electronic mail
Cyberspace
Cybersecurity
biblio
Classifying Phishing Email Using Machine Learning and Deep Learning
Submitted by grigby1 on Fri, 04/10/2020 - 11:36am
one-hot encoding
Web sites
unsolicited e-mail
text analysis
Support vector machines
Semantics
pubcrawl
phishing emails
phishing email
Phishing
pattern classification
Computer crime
machine learning
learning (artificial intelligence)
Human Factors
Human behavior
encoding
email text
Electronic mail
deep semantic analysis
deep learning
biblio
Building Confidence not to be Phished Through a Gamified Approach: Conceptualising User's Self-Efficacy in Phishing Threat Avoidance Behaviour
Submitted by grigby1 on Fri, 04/10/2020 - 11:36am
observational knowledge
user self-efficacy
Training
tools
Threat avoidance motivation and behaviour
threat avoidance motivation
structural knowledge
social cognitive theory
Self-Efficacy
pubcrawl
phishing threat prevention behaviour
phishing threat avoidance behaviour
phishing attacks
phishing attack
Phishing
online identity theft attack
Human Behavior and Cybersecurity
knowledge attributes
Knowledge
internet
Human Factors
Human behavior
heuristic knowledge
gaming prototype
gamified approach
Gamification/Gamified approach
Games
Electronic mail
Computers
computer games
Computer crime
cognition
biblio
Privacy Protection Scheme in Smart Grid Using Rechargeable Battery
Submitted by grigby1 on Mon, 03/09/2020 - 1:57pm
Scalability
Metrics
policy-based governance
privacy
privacy protection scheme
pubcrawl
rechargeable battery
resilience
Resiliency
Information Leakage
secondary cells
Smart Grid
Smart Grid Privacy
Smart Grids
smart meters
smart power grids
statistical methods
user privacy
electrical power
automation
batteries
battery power information
collaboration
composability
data privacy
Educational institutions
electrical load information
Abstracts
Electronic mail
energy consumption
heuristic algorithm
home energy use information
home network
Human behavior
Human Factors
biblio
Combining Tensor Decompositions and Graph Analytics to Provide Cyber Situational Awareness at HPC Scale
Submitted by grigby1 on Mon, 02/17/2020 - 4:16pm
resilience
metadata
Metrics
multidimensional anomaly detection fusing HPC Analytics and Tensors
network topology
parallel processing
parallelized graph analysis
pattern clustering
pubcrawl
MADHAT
Resiliency
security of data
sensor fusion
situational awareness
structured network sensor logs
Tensile stress
tensors
tools
groupware
Security Metrics
clustering methods
composability
data structures
Detectors
Electronic mail
graph analytics
graph theory
Computing Theory
high-performance packages
HPC architecture for cyber situational awareness
HPC resources
HPC scale
integrated workflow
IP networks
large-scale sparse tensor decompositions
biblio
Spam Domain Detection Method Using Active DNS Data and E-Mail Reception Log
Submitted by grigby1 on Mon, 02/10/2020 - 10:17am
Metrics
unsolicited e-mail
Training
system monitoring
supervised learning
spoofed e-mails
SPF
spam mail
spam domain detection
spam detection
sender IP address
sender domain authentication
Scalability
pubcrawl
Postal services
active DNS
message authentication
IP networks
internet
Human Factors
Human behavior
feature extraction
Electronic mail
e-mail reception log
e-mail log analysis
DMARC
DKIM
authentication
active DNS data
biblio
Removing Personally Identifiable Information from Shared Dataset for Keystroke Authentication Research
Submitted by grigby1 on Tue, 01/21/2020 - 10:23am
policy-based governance
keystroke dataset
keystroke dynamics
message authentication
Metrics
password
personally identifiable information
personally sensitive information
PII detection program
keystroke authentication research
privacy removal
pubcrawl
resilience
Resiliency
social security numbers
Task Analysis
text analysis
user authentication systems
Electronic mail
authentication
authorisation
bank card numbers
biometrics (access control)
collaboration
Continuous Authentication
conventional authentication methods
data privacy
arrays
free-text authentication algorithm
free-text keystroke authentication
Human behavior
identity theft
insider threat
Insider Threats
keystroke analysis
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »