Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Companies
biblio
Improving security decision under uncertainty: A multidisciplinary approach
Submitted by grigby1 on Tue, 03/07/2017 - 1:43pm
requirements engineering
uncertainty
software engineering
security threat
security risk
security of data
security decision-making
security
risk management
risk assessment
Risk
Companies
quantitative decision analysis
pubcrawl170109
modelling language
identity theft
decision-making
Decision Making
crime script
crime science
Credit cards
biblio
A review on recent phishing attacks in Internet
Submitted by grigby1 on Tue, 03/07/2017 - 1:31pm
phishing attacks
Web sites
URL
unsolicited e-mail
Uniform resource locators
textual analysis
text analysis
Tabnapping
socially engineered messages
security
pubcrawl170109
phishing Website
phishing emails
Browsers
malware code
malware
invasive software
internet
illegal activity
email messages
email classification
Electronic mail
cyber-crime
Computer crime
Companies
biblio
"Concept for a security investigation framework"
Submitted by abfox on Tue, 02/14/2017 - 12:29pm
malware
Trace Attacks
telecommunication security
standards
SIF
security systems
security investigation framework
Reliability
pubcrawl170101
Multi-Stage Attack
multi-stage APT
malware analyses
advanced persistent threat
log files
lateral movement
Investigation Framework
Forensics
forensic investigations
Correlation
Companies
APT campaigns
APT
advanced persistent threat campaigns
biblio
Challenges from the Identities of Things: Introduction of the Identities of Things discussion group within Kantara initiative
Submitted by BrandonB on Wed, 05/06/2015 - 1:28pm
identity management mechanisms
authentication
authorisation
authorization
communication protocols
Companies
data privacy
identifier
Identities of Things discussion group
identity
sensors
internet
Internet of Things
IoT
Kantara Initiative
name service
Object recognition
privacy
Protocols
biblio
Assuming a State of Compromise: A Best Practise Approach for SMEs on Incident Response Management
Submitted by BrandonB on Wed, 05/06/2015 - 10:39am
best practices
Companies
Computer crime
Cybercrime
economic feasibility
enterprise IT security experts
Forensics
Incident Response
incident response management
IT security
malware
remediation
small and medium sized enterprises
small-to-medium enterprises
SME
biblio
Security attack mitigation framework for the cloud
Submitted by BrandonB on Tue, 05/05/2015 - 10:17am
security guarantee
Markov processes
mean time to security failure
MTTSF cloud
privacy losses
private data security
resource consolidation
security
Security Administration
security attack mitigation framework
Markov model
security of data
Silicon
software products
software vulnerabilities
software vulnerability exploits
virtual machine
Virtual machining
virtualisation
virtualization technology
customer trust
attack mitigation plan
availability parameter
business data leaks
Cloud Computing
cloud resource manager
cloud service
Companies
confidentiality parameter
cross-channel attacks
attack graphs
enterprise cloud computing
enterprise cloud solutions
enterprise IT infrastructure
enterprise wide information processing system
hacking techniques
information technology
integrity parameter
markov chain
biblio
i/k-Contact: A context-aware user authentication using physical social trust
Submitted by BrandonB on Tue, 05/05/2015 - 8:56am
Mobile-device-management (MDM)
visualization
visual contact
user authentication
ubiquitous computing
Trusted Computing
Social trust
Servers
physical trust relationship
physical social trust
Physical communication
authentication
Mobile handsets
i-k Contact mechanism
context-aware user authentication
Context-aware security
Context
Companies
Big Data application
authorisation
authentication system
authentication control
biblio
A game-theory analysis of the rat-group attack in smart grids
Submitted by BrandonB on Fri, 05/01/2015 - 7:40am
Analytical models
attack
Companies
electricity
game theory
game-theory analysis
Games
power engineering computing
Power Grid
rat-group attack
security of data
Smart Grid
Smart Grids
smart meter
smart meters
smart power grids
biblio
Third-Party Web Tracking: Policy and Technology
Submitted by rvmeush on Fri, 09/26/2014 - 1:03pm
security
Web sites
Web privacy
Web pages
Web innovation
user browsing activity tracking
third-party Web tracking
third-party Web sites
third-party tracking
social networking
advertising
privacy
History
fourth party Web measurement platform
Economics
Do Not Track
data privacy
Companies
analytics
« first
‹ previous
…
7
8
9
10
11
12
13
14
15