Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computer hacking
biblio
A Framework for Making Effective Responses to Cyberattacks
Submitted by aekwall on Mon, 03/04/2019 - 9:46am
attribution confidence
USG
U.S. government
suspected attacker
Risk
Response
private sector
policymakers
national intelligence community
Market research
Government
Escalation
effective response decision
Deterrence
decision makers
cyberattack
analysis
attribution
Companies
Decision Making
Computer hacking
Metrics
composability
pubcrawl
Human behavior
Big Data
human-in-the-loop security center paradigm
Computer crime
security of data
biblio
Vulnerability Analysis of Content Management Systems to SQL Injection Using SQLMAP
Submitted by aekwall on Mon, 02/25/2019 - 10:39am
tools
program testing
pubcrawl
Resiliency
security vulnerability
SQL
SQL injection
SQLI
SQLi vulnerabilities
SQLMAP
privacy
Vulnerability
Vulnerability Analysis
vulnerability scanner
Web application
web applications
Web sites
websites
WordPress
Drupal website pages
Computer hacking
content management
content management systems
Cybersecurity
data confidentiality
data integrity
Data protection
Databases
Computer crime
Human behavior
internet
Joomla website pages
LAMP server
Metrics
Nikto
Penetration Testing
policy-based-governance
biblio
A Real-World Implementation of SQL Injection Attack Using Open Source Tools for Enhanced Cybersecurity Learning
Submitted by aekwall on Mon, 02/25/2019 - 10:39am
privacy
website connected database
Web sites
vulnerabilities
tools
threats
SQL injection attack
SQL injection
SQL
specific website
Servers
retrieving sensitive information
Resiliency
real-world implementation
query processing
pubcrawl
actual website
preventive measures
policy-based-governance
open source tools
Metrics
Linux
invasive software
Human behavior
foundational cybersecurity course
executing SQL queries
enhanced cybersecurity learning
Databases
Crawlers
computer science education
Computer hacking
Acunetix
biblio
Dynamic Honeypot Configuration for Intrusion Detection
Submitted by grigby1 on Fri, 02/08/2019 - 3:37pm
resilience
internet
intruders
intrusion detection system
Intrusion Prevention system factors
IP networks
Market research
network activity
pubcrawl
Informatics
Resiliency
Scalability
secured network
Software
unauthorized users
unsecured network
unused IP address
honey pots
Computer hacking
computer network security
Conferences
Dynamic Configuration
Dynamic configuration and Intruders
dynamic Honeypot Configuration
enterprise level security
Honey Pot
Computer crime
honey trap methodology
honeypot
honeypot mechanism activity
Honeypot security system
Honeytrap
Human behavior
Human Factors
biblio
Honeypot in the Cloud Five Years of Data Analysis
Submitted by grigby1 on Fri, 02/08/2019 - 3:37pm
Honeypott
tools
security of data
Scalability
Resiliency
resilience
Ransomware
pubcrawl
password
Human Factors
Human behavior
Computer crime
Honeypot Results
Honeypot in the cloud
honeypot data
Honeypot Analysis
honeypot
honey pots
data analysis
cyber security
Computer hacking
biblio
Detection of Distributed Denial of Service (DDoS) Attacks Using Artificial Intelligence on Cloud
Submitted by grigby1 on Fri, 02/08/2019 - 3:14pm
Detectors
Spark
signature-based approach
signature
Resiliency
pubcrawl
neural nets
Neural
Metrics
Intrusion Detection
Human behavior
feature extraction
distributed denial of service attacks
digital signatures
Amazon public cloud
DDoS attack detection
DDoS
computer network security
Computer hacking
Computer crime
composability
Cloud Computing
cloud
Artificial Neural Networks
artificial intelligence security
Artificial Intelligence
anomaly-based distributed artificial neural networks
Anomaly
biblio
A Novel Privacy Technique for Augmented Reality Cloud Gaming Based on Image Authentication
Submitted by grigby1 on Mon, 11/19/2018 - 11:14am
image authentication
Watermarking
Scalability
Resiliency
resilience
pubcrawl
privacy
positioning data privacy
mobile computing
message authentication
location-based games
Image Processing
augmented reality
Human behavior
Games
data privacy
Cryptography
Computer hacking
computer games
Cloud Computing
cheating scenario problem
authentication
augmented reality cloud gaming
biblio
A hybrid method for detection and prevention of SQL injection attacks
Submitted by grigby1 on Thu, 06/07/2018 - 2:13pm
serious security threat
Policy-Governed Secure Collaboration
Prevention
privacy
pubcrawl
Resiliency
Runtime
security of data
sensitive information
policy-based governance
Servers
SQL
SQL injection
SQL injection attack
SQL statements
SQLIA
static
web applications
detection
collaboration
common gateway interface
Computer hacking
Data mining
database design
database driven web applications
database management systems
Databases
access content
dynamic
Hacker
Human behavior
hybrid method
hybrid SQLIA
internet
Policy
biblio
Extracting Cyber Threat Intelligence from Hacker Forums: Support Vector Machines versus Convolutional Neural Networks
Submitted by grigby1 on Wed, 04/11/2018 - 1:49pm
learning (artificial intelligence)
vital information
threat vectors
text classification
Support vector machines
relevant threat intelligence
relevant threat information
pubcrawl
privacy
pattern classification
Open-Source Intelligence
Metrics
machine learning
Learning systems
Computer crime
hacker forums
hacker forum
feedforward neural nets
error-prone process
Data mining
Cyber Threat Intelligence (CTI)
cyber threat intelligence
cyber security threats
cyber security
convolutional neural networks
Convolutional Neural Network algorithms
Computer hacking
biblio
Deep Web Online Anonymity
Submitted by grigby1 on Mon, 04/02/2018 - 11:30am
resilience
Internet user
Logic gates
Metrics
online anonymity
personal information sharing
privacy
privacy protection
pubcrawl
internet
Resiliency
social hub
social media
social networking (online)
Terrorism
user data
Vulnerabilities of Social Media
cyber space
anonymity
Browsers
composability
Computer crime
Computer hacking
Computers
crime
Cryptography
Anarchy
Cyberspace Anonymity
Data protection
deep web
Government
hidden encrypted network
Human behavior
information privacy
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »