Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computer hacking
biblio
Zero-Day Attack Identification in Streaming Data Using Semantics and Spark
Submitted by grigby1 on Mon, 03/26/2018 - 1:13pm
semantic reasoning
MRMR feature selection algorithm
parallel detection
pattern classification
pubcrawl
Resiliency
security of data
semantic learning
Semantic learning and reasoning
semantic link networks
minimum redundancy maximum relevance feature selection algorithm
Semantics
SLN
Spark Streaming
Spark streaming platform
Sparks
Training
Zero day attacks
zero-day attack identification
feature extraction
cognition
collaborative classification methods
Collaborative mining
composability
Computer hacking
Data Streaming
defense
dynamic semantic graph generation
Anomaly Detection
Feature Selection
Flow Creation
graph theory
groupware
IDS
Intrusion Detection Systems
learning (artificial intelligence)
Metrics
biblio
A Graphical Password Authentication for analyzing legitimate user in online social network and secure social image repository with metadata
Submitted by grigby1 on Tue, 12/12/2017 - 1:31pm
meta data
uploaded images
social networking (online)
Social network services
Security Policies Analysis
secure social image repository
pubcrawl
privacy
policy-based governance
online social network
multimedia information sharing
metadata
Meta Data Stratification
alphanumeric textbased password
legitimate user
internet
hassle-free privacy setting
Graphical Password authentication
flaw points
Databases
data privacy
Computer hacking
collaboration
automatic policy prediction
authorisation
authentication
biblio
Real-Time IRC Threat Detection Framework
Submitted by grigby1 on Tue, 12/12/2017 - 1:22pm
Metrics
WannaCry ransomware attack
tools
Stanford coreNLP
social networking (online)
social media platforms
security of data
Scalability
Resiliency
real-time threat detection
real-time text communications
real-time systems
real-time IRC threat detection framework
pubcrawl
Neural networks
Monitoring
Autonomic Security
malicious IRC behavior analysis
IRC protocol
IRC channel monitoring
Internet Relay Chat protocol
Internet Relay Chat (IRC)
internet
hacker data analysis and visualization
hacker community
electronic messaging
Data collection
cyber security
Computer hacking
Computer crime
autonomic threat detection
biblio
Scalable Honeypot Architecture for Identifying Malicious Network Activities
Submitted by grigby1 on Wed, 03/08/2017 - 2:38pm
IP networks
virtualized environment
virtualisation
Servers
server machines
server honeypots
scalable honeypot architecture
pubcrawl170114
Ports (Computers)
peripheral security measures
operating systems
malware
malicious network activities identification
Kippo
J-Honeypot
advanced persistent attacks
honeypots
HoneyD
hacker activities
government organisations
Glastopf
file servers
Distributed honeypots
Dionaea
computer network security
Computer hacking
Computer crime
computer architecture
attack packets
biblio
Hackers topology matter geography: Mapping the dynamics of repeated system trespassing events networks
Submitted by grigby1 on Wed, 03/08/2017 - 2:38pm
SNA technique
Honey-pots network
Hot-spots
internet
IP networks
network topology
pubcrawl170114
repeated system trespassing event network dynamics mapping
SNA
hacking spatial context
social network analysis technique
social networking (online)
spatial attributes
system trespassers
topological positions
Topology
victimized computers
attacker behavior
hacking patterns
hacking network topology
Hacking
hackers topology
Geography
geographic position
Cyberspace Policies
Cybersecurity
Cybercrime
Computers
computer networks
Computer hacking
Computer crime
brute force attacks
BFA
biblio
Potential cyber-attacks against global oil supply chain
Submitted by grigby1 on Wed, 03/08/2017 - 2:28pm
Information Flow
threats to energy sector
Temperature sensors
supply chains
supply chain management
security of data
risk management
ripple effect
pubcrawl170112
petroleum industry
organization
organisational aspects
oil supply chain
information management
Companies
globalisation
global supply chain
global oil supply chain
global market
financial losses
Energy Sector
damaging effect
cyber-attacks countermeasures
cyber-attacks
cyber-attack
cyber risk assessment
Cyber incident
Computer hacking
biblio
Analyzing information security investment in networked supply chains
Submitted by grigby1 on Wed, 03/08/2017 - 2:23pm
networked supply chains
Trusted Computing
trust risks
supply chains
supply chain management
socially optimal solutions
security breaches
security attacks
risk management
pubcrawl170112
organisational aspects
optimisation
optimal strategy
noncooperative game condition
Computer hacking
Investment
interdependent risks
information security risk
information security investment
information security
infectious risks
Games
game theory-based model
game theory
firms
equilibrium levels
Economics
biblio
Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops
Submitted by grigby1 on Tue, 03/07/2017 - 1:43pm
hacker Web
Web sites
vulnerabilities
threats
threat identification
Servers
pubcrawl170109
online hacker communities
machine learning methodology
learning (artificial intelligence)
IRC channels
information retrieval techniques
information retrieval
carding shops
Hacker IRC
hacker forums
Cybersecurity
cybercriminals
cyber threat detection
cyber security
cyber defenses
Credit cards
Computer hacking
Computer crime
Communities
biblio
Phishing - the threat that still exists
Submitted by grigby1 on Tue, 03/07/2017 - 1:41pm
online security attack
Uniform resource locators
statistical analysis
sensitive information harvesting
Radiation detectors
pubcrawl170109
phishing attack
Phishing
Password theft
online security threat
antiphishing systems
Google
Electronic mail
cyber security
Computer hacking
Computer Fraud
Computer crime
Browsers
authorisation
biblio
Integrating Human Behavior Into the Development of Future Cyberterrorism Scenarios
Submitted by grigby1 on Tue, 03/07/2017 - 1:41pm
Organizations
Terrorism
social force
social
scenario
pubcrawl170109
psychology
psychological force
psychological
Predictive models
Computer crime
motivation
Human Factors
Human behavior
digital technologies
cyberterrorism scenarios
cyberterrorism
cyber threats
Computer hacking
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »