Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computer hacking
biblio
Attacks and vulnerability analysis of e-mail as a password reset point
Submitted by grigby1 on Fri, 09/04/2020 - 3:24pm
e-mail servers
brute force attacks
Vulnerability Analysis
social media
Social engineering attack
self-service password reset point
security questions
public knowledge attainable
personal Email account
Password Reset
Mobile handsets
mobile devices
middle attack
Email
authorisation
Brute-force Attack
Computer hacking
policy-based governance
Human Factors
Security analysis
password
Electronic mail
emails
collaboration
pubcrawl
internet
Protocols
biblio
Cyber Security at a Glance
Submitted by grigby1 on Fri, 09/04/2020 - 3:16pm
Sniffing
data records
DDoS and DOS attacks
DDoS Attack
distributed denial-of-service attack
firewall
hacking techniques
man in the middle attack
polymorphic virus
proxy
computer malwares
social engineering
spoofing
Tor browser
trojan
Trojan horses
Trojans
vpn
Worm
BIOS Security
Human Factors
Computer crime
Firewalls (computing)
internet
pubcrawl
Metrics
Resiliency
resilience
cyber security
malware
Scalability
Cyber Attacks
Computer hacking
denial-of-service attack
computer viruses
antivirus
BeEF
boot sector virus
Brute forcing
biblio
One-Class Classification with Deep Autoencoder Neural Networks for Author Verification in Internet Relay Chat
Submitted by grigby1 on Thu, 08/13/2020 - 5:22pm
pubcrawl
Internet Relay Chat (IRC)
IRC messages
IRC users
learning (artificial intelligence)
Monitoring
neural nets
one-class classification
pattern classification
internet relay chat
real-time systems
recursive deep learning
resilience
Resiliency
Scalability
social networking (online)
social networks
anonymous messaging
internet
electronic messaging
effective author verification
deep learning
deep autoencoder neural networks
Cybersecurity
cyber-crime
Computer hacking
Computer crime
autonomic IRC monitoring system
autoencoder
author verification approach
Author verification
arbitrary topics
anonymous users
biblio
Protecting Data in Android External Data Storage
Submitted by aekwall on Mon, 08/10/2020 - 10:32am
storage management
android encryption
secure Android data storage
proactive-control
Permission
malicious malware
external-storage
Android external storage vulnerability
Android external data storage
Metrics
Memory
Android (operating system)
Monitoring
smart phones
Vulnerability
Data protection
Computer hacking
pubcrawl
Human behavior
Resiliency
mobile computing
invasive software
encryption
Scalability
biblio
An Anomaly Detector for CAN Bus Networks in Autonomous Cars based on Neural Networks
Submitted by aekwall on Mon, 07/20/2020 - 10:44am
critical phase
in-vehicle networks
academic researchers
anomaly detector
anomaly-detection techniques
autonomous cars
CAN bus networks
CAN packets
Controller Area Networks bus
controller area networks
ID field
industrial researchers
MLP Neural Network
MultiLayer Perceptron neural network
real-time detection
robust secure system
securing communication
wireless interfaces
pubcrawl
security of data
Detectors
intrusion detection system
Internet of Things
Protocols
cyber-physical systems
feature extraction
Resiliency
Automotive engineering
Neural networks
Computer hacking
Anomaly Detection
Intrusion Detection
pattern clustering
controller area network security
intrusion detection method
multilayer perceptrons
biblio
The Browsers Strike Back: Countering Cryptojacking and Parasitic Miners on the Web
Submitted by grigby1 on Fri, 07/10/2020 - 1:07pm
heavily obfuscated code
Web sites
under-the-hood practices
stealthy mining operations
Resiliency
resilience
pubcrawl
parasitic miners
online front-ends
mining prevention plug-ins
mining code
Metrics
learning (artificial intelligence)
Human Factors
Human behavior
browser code
hardware-assisted profiling
Hardware
exploitative exercise
Data mining
cryptojacking
Cryptography
cryptocurrency market
cryptocurrency
covert mining operations
countering cryptojacking
Computer hacking
Browsers
browser extension
browser cryptojacking
biblio
Dark Web Along With The Dark Web Marketing And Surveillance
Submitted by grigby1 on Fri, 07/10/2020 - 11:54am
Human behavior
WebMarketing
Web sites
Weapons
Terrorism
terror activities
surveillance programs
surveillance
pubcrawl
law enforcement agencies
law enforcement
invasive software
internet
Human Factors
Computer crime
drugs
darkweb
dark Web sites
dark Web marketing
dark Web jihadist services
dark web
Daniel onion.
cybercrimes
cyber criminals
criminal law
Conferences
Computer hacking
biblio
Modeling Cyber Security of Information Systems Smart City Based on the Theory of Games and Markov Processes
Submitted by aekwall on Mon, 07/06/2020 - 10:14am
Markov processes
Cyber Dependencies
town and country planning
smart city systems
likelihood of cyber threats
information systems smart city
information security circuits
cybernetic risk
Cyber Security Systems
Communication Systems
information technologies
Smart City
cyber threats
Compositionality
smart cities
security of data
Human Factors
Games
Information systems
probability
Mathematical model
Computer hacking
Metrics
Computational modeling
component
pubcrawl
Resiliency
cyber security
game theory
Scalability
biblio
SDNLog-Foren: Ensuring the Integrity and Tamper Resistance of Log Files for SDN Forensics using Blockchain
Submitted by grigby1 on Wed, 06/03/2020 - 12:02pm
SDN security
log management
Metrics
network forensics
pubcrawl
resilience
Resiliency
Scalability
SDN forensics
log file identification
SDNLog-Foren
Secure log files
security enhancement
sensitive log data
software defined networking
Southbound interfaces
system monitoring
fine-grained access control
blockchain
Blockchain-based security
Computer crime
Computer hacking
computer network security
control systems
Cybersecurity
Digital Forensics
authorisation
global network configuration
Human behavior
Human Factors
information forensics
Integrity and Tamper Resistance.
log file analysis
log file collection
biblio
Network Intrusion Detection Based on Deep Learning
Submitted by aekwall on Mon, 05/11/2020 - 11:19am
Neurons
network monitoring data
network intrusion detection method
deep confidence neural network
deep confidence
computer network technology
network intrusion
probability
Intrusion Detection
BP Neural Network
Computer hacking
network intrusion detection
computer network security
Neural networks
neural nets
Backpropagation
Metrics
deep learning
composability
pubcrawl
Resiliency
learning (artificial intelligence)
feature extraction
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »