Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computer hacking
biblio
From Analyzing Operating System Vulnerabilities to Designing Multiversion Intrusion-Tolerant Architectures
Submitted by grigby1 on Fri, 04/17/2020 - 11:29am
microsoft windows
Windows Operating System Security
vulnerability statistics
vulnerability databases
Vulnerability
security
Resiliency
resilience
pubcrawl
operating systems (OSs)
intrusion tolerance
Metrics
forever-day vulnerabilities
diversity
Days-of-grey-risk
Databases
Computer hacking
computer architecture
composability
biblio
Enhanced Cryptocurrency Security by Time-Based Token Multi-Factor Authentication Algorithm
Submitted by aekwall on Mon, 02/10/2020 - 12:04pm
security enhancement
wallets
transaction processing
time-based token multifactor authentication algorithm
time-based onetime password technique
single level password authentication
multifactor authentication algorithm
MFA token
MFA security scheme
Cryptocurrency security
multifactor authentication
Human Factors
security
cryptocurrency
password
cryptocurrencies
authentication
Computer hacking
Metrics
bitcoin
pubcrawl
Resiliency
authorisation
Computer crime
biblio
Network Penetration Identification Method Based on Interactive Behavior Analysis
Submitted by grigby1 on Tue, 01/28/2020 - 2:36pm
penetration attacks
long-term memory shortage
LSTM
malicious attacks
Mathematical model
Metrics
national economy
Network penetration identification method
network penetration recognition technology
ordinary recurrent neural network
penetration attack
Long short-term memory
pubcrawl
recurrent neural nets
recurrent neural network
Recurrent neural networks
Sebek
Sebek technology
short-short time memory network
time series
time series modeling
Hidden Markov models
attack recognition method
attacker information collection
attacker keystroke record
Computer hacking
computer network security
Data models
feature extraction
gradient disappearance problem
gradient explosion
attack identification
honeynet
Human behavior
Human Factors
interaction behavior
interactive behavior analysis
internet
keystroke analysis
keystroke sequences
Logic gates
biblio
Host-based Intrusion Detection Systems Inspired by Machine Learning of Agent-Based Artificial Immune Systems
Submitted by aekwall on Mon, 01/20/2020 - 11:55am
dendritic cells
TC agent
Resiliency
pubcrawl
network packets
multiagents system
multi-agent systems
machine learning
Learning systems
learning (artificial intelligence)
Intrusion Detection Systems
Intrusion Detection
Immune system
host-based intrusion detection systems
AAIDS
dendritic cell
DC agent
danger theory
computer network security
Computer hacking
Computational modeling
composability
artificial immune systems
artificial immune system
agent-based artificial immune systems
AG agent
adaptable agent-based IDS
biblio
Securing IS assets through hacker deterrence: A case study
Submitted by aekwall on Wed, 12/18/2019 - 2:36pm
wireless networks
internal threat deterrence
information systems security
hacker deterrence
external threat deterrence
external computer criminals
e-commerce organization
cyber attack
broken windows theory
Deterrence
electronic commerce
Computer crime
Computers
Information systems
resilience
Companies
Computer hacking
pubcrawl
Human behavior
Scalability
computer network security
biblio
Cyber Deception: Overview and the Road Ahead
Submitted by Katie Dey on Mon, 09/09/2019 - 10:25pm
adaptive cyber defense techniques
adversarial mind manipulation
Cognitive Security
Computer hacking
computer security
cyber attack and defense
cyber deception
Cybersecurity
Cyberspace
moving target defense
primitive systems
proactive cyber defense
proactive strategies
security
security of data
Cognitive Security
Articles for Review
C3E 2019
biblio
Cyber Security and Vulnerability Analysis of Networked Control System Subject to False-Data Injection
Submitted by grigby1 on Mon, 08/05/2019 - 11:35am
Networked Control System
vulnerability level
Vulnerability Analysis
sensors
security of data
Scalability
Resiliency
resilience
pubcrawl
policy-based governance
networked control systems
networked control system cyber security
Networked Control Systems Security
NCS
Monitoring
malicious outsiders
geometric approach
false-data injection
false trust
false data injection attacks
controlled system
control engineering computing
Computer hacking
collaboration
biblio
A Framework for Insider Collusion Threat Prediction and Mitigation in Relational Databases
Submitted by aekwall on Wed, 05/08/2019 - 9:47am
insider threat
robust technique
Resiliency
resilience
remuneration
relational databases
relational database systems
relational database security
Relational Database
real time monitoring technique
pubcrawl
Predictive models
mitigating technique
Metrics
Knowledgebase
insiders accesses
threat mitigation
insider collusion threat prediction
information security
Human behavior
discovered collusion insider threat
database schema
database management systems
database architect
Data dependencies
Computer hacking
composability
Collusion Threat
collusion insider attacks
collaboration
Cloud Computing
authorisation
biblio
An Association Rule Mining-Based Framework for Profiling Regularities in Tactics Techniques and Procedures of Cyber Threat Actors
Submitted by grigby1 on Fri, 03/15/2019 - 11:52am
machine learning-based framework
TTPs
tools
threat vectors
threat information
Tactics Techniques and Procedures
tactics techniques
STIX
security of data
pubcrawl
profiling regularities
privacy
Metrics
malware
association rule mining
learning (artificial intelligence)
input cyber threat intelligence documents
Information Gain
feature extraction
Data mining
cyber threat intelligence
cyber threat actors
Cyber Threat Actor
cyber domain
CTAs
Conferences
Computer hacking
behavior
biblio
Collecting Cyber Threat Intelligence from Hacker Forums via a Two-Stage, Hybrid Process Using Support Vector Machines and Latent Dirichlet Allocation
Submitted by grigby1 on Fri, 03/15/2019 - 11:52am
security controls
machine learning algorithms
malicious proxy servers
malware
Metrics
nontraditional information sources
privacy
pubcrawl
resource management
machine learning
Support vector machines
SVM
text classification
threat vectors
topic modeling
two-stage hybrid process
Vocabulary
AV detection
learning (artificial intelligence)
leaked credentials
LDA
latent Dirichlet allocation
internet
hybrid machine learning model
hacker forums
hacker forum posts
cyber threat landscape
Cyber Threat Intelligence (CTI)
cyber threat intelligence
cyber security
CTI
Computer hacking
Computer crime
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »