Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computer hacking
biblio
Using Dynamic Taint Approach for Malware Threat
Submitted by grigby1 on Tue, 03/07/2017 - 1:40pm
pubcrawl170109
Information Flow
intersuspicious modules
invasive software
malware
Malware behavioural analysis
malware infection
malware threat analysis
network threats
FSM
Servers
suspicious apps
taint checking tools
taint marking
threat analysis
trees (mathematics)
weighted spanning tree analysis scheme
Computer hacking
Android programs
attack sequence
behavioural analysis
cloud applications
Cloud Computing
cloud computing server
Computational modeling
Computer crime
Analytical models
cyber security attack
data tracking
defence capability
Dynamic taint propagation
dynamic taint propagation analysis model
finite state machine
finite state machines
biblio
Identifying digital threats in a hacker web forum
Submitted by grigby1 on Tue, 03/07/2017 - 1:39pm
Discussion forums
Social network services
sentiment analysis tool
sentiment analysis
query processing
pubcrawl170109
parts of speech tagger
natural language processing
malicious hackers
internet
HTML
Hacking
hacker Web forum
hacker language analysis
discussion posts
automated analysis tools
digital threat identification
Databases
data systems
data querying
Data mining
cyber-attacks
customized Web-crawler
critical infrastructures
critical infrastructure
critical computer networks
Computer hacking
Computer crime
communication platform
biblio
Comparative analysis of Governmental Countermeasures to cyber attacks
Submitted by grigby1 on Tue, 03/07/2017 - 1:36pm
ISAO
US government
United States
strengthening national cyber security posture initiative
South Korea
Sony
security of data
sanctions EO
retaliatory action
pubcrawl170109
presidential secretary
North Korea
ministry of industry
Law
KHNP
Comparative Analysis
Interviews
internet
information sharing EO
Inductors
governmental countermeasures
Government
cyber-attacks
cyber security response capability
Cyber incident
Cyber Attacks
CTIIC
control tower
Computer hacking
Computer crime
biblio
A Multi-token Authorization Strategy for Secure Mobile Cloud Computing
Submitted by BrandonB on Wed, 05/06/2015 - 1:22pm
multitoken authorization strategy
security
Secure Mobile Computing
secure mobile cloud computing
radio links
privacy
Organizations
omnipresent mobile-based clients
OAuth
security of data
Modified Identity Management System
mobile computing
Mobile communication
mobile cloud computing
mathematical modeling
mathematical analysis
malicious code
IdM
Computer hacking
trust
traffic interception
identity management systems
identity management system
Hacker
data privacy
credentials
computing models
vulnerable wireless communication links
cloud resources
cloud computing security
Cloud Computing
authorization architecture
authorization
authorisation
Access Control
Servers
biblio
Synthesizing perception based on analysis of cyber attack environments
Submitted by BrandonB on Tue, 05/05/2015 - 12:40pm
Equations
Vulnerability
vulnerabilities types
toxicity metrics
social aspects of automation
perception synthesis
offensive activities
Measurement
India CTF
InCTF characteristics
Hacking
hackers
Games
framework
adversory behavior
defensive activities
Cyber situational awreness
cyber situational awareness
cyber intensive games
cyber attack intensity
cyber attack environments
cyber attack aggression
Computer hacking
computer games
Computer crime
assets protection
analytic hierarchy process
biblio
Ethics behind Cyber Warfare: A study of Arab citizens awareness
Submitted by BrandonB on Tue, 05/05/2015 - 11:55am
ethics
technological research centers
security systems
scientific research centers
personal information
offence
military war
military computing
Law
information technology
government data processing
Government
Arab citizens awareness
ethical aspects
despotic government plans
defense
cyber warfare
cyber war
cyber security
cyber attack
cyber army
Computers
Computer hacking
Computer crime
biblio
A new type of intrusion prevention system
Submitted by BrandonB on Tue, 05/05/2015 - 11:55am
active defense intrusion detection system
Communication networks
Computer hacking
computer network security
defense
Interaction honeypot
Intrusion Detection
intrusion prevention system
Logic gates
mixed interactive honeypot
Monitoring
network security
operating systems
Servers
biblio
Analysis of Cloud Computing Performance, Scalability, Availability, amp; Security
Submitted by BrandonB on Tue, 05/05/2015 - 9:28am
Availability
Cloud Computing
Computer hacking
internet
parallel computing
parallel processing
Scalability
security
security of data
virtual machine
virtual machines
biblio
Robust encryption algorithm based SHT in wireless sensor networks
Submitted by BrandonB on Mon, 05/04/2015 - 2:12pm
network traffic
wireless sensor networks
wireless device network
testing
telecommunication traffic
supply location
sturdy cryptography algorithmic rule
SHT
robust encryption algorithm
privacy
nuisance parameters and committal to writing theory
nuisance data victimization sturdy cryptography algorithmic rule
anonymity
machine load problem
location privacy
interval indistinguishability
Hypothesis testing
encryption
device network obscurity
Cryptography
Correlation
consecutive hypothesis testing
Computer hacking
communication overhead
biblio
State of the Art: Automated Black-Box Web Application Vulnerability Testing
Submitted by rvmeush on Fri, 09/26/2014 - 1:04pm
Automatic testing
Code standards
Computer hacking
Credit cards
Cross Site Scripting
Data Security
Decision support systems
Forgery
Personnel
privacy
Probes
SQL injection
SQLI
XSS
« first
‹ previous
…
2
3
4
5
6
7
8
9
10