Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
command and control
biblio
Game theoretic modeling of cyber deception in the Internet of Battlefield Things
Submitted by grigby1 on Tue, 11/17/2020 - 2:59pm
Internet of battlefield things
security of data
security counter measure
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
Monitoring
IoBT systems
IoBT control
iobt
Internet of Things
battlefield services
internet
information technology
Human Factors
Games
game theory
game theoretic modeling
cyberattack
cyber deception
Computational modeling
command and control systems
command and control
biblio
Mining Malware Command and Control Traces
Submitted by grigby1 on Mon, 03/19/2018 - 1:55pm
Human behavior
telecommunication traffic
security of data
Scalability
Resiliency
resilience
pubcrawl
Payloads
Pattern recognition
pattern classification
Metrics
malware threats
malware detection rates
malware
invasive software
advanced persistent threat
effective anomaly based detection technique
detecting botnets
Data mining
controller commands
control traces
control payloads
control channel
command and control systems
command and control
Classification algorithms
botnet
anomaly based detection
advanced persistent threats
biblio
Resilient Dynamic Data Driven Application Systems as a Service (rDaaS): A Design Overview
Submitted by grigby1 on Tue, 12/12/2017 - 1:22pm
Scalability
large scale DDDAS applications
Metrics
pubcrawl
rDaaS
Resiliency
resilient DDDAS
resilient dynamic data driven application systems as a service
Runtime
Internet connectivity
security
security of data
service oriented architecture
service-oriented architecture
Situation Awareness
Software Architecture
web services
Crisis Management applications
Autonomic Security
Cloud Computing
cloud infrastructure
cloud service
command and control
Computational modeling
computer architecture
Crisis Management
agile DDDAS
cyber applications
Cybersecurity
Cyberspace
DDDAS
information fusion
innovative cloud-based architecture
internet
biblio
Feature selection to detect botnets using machine learning algorithms
Submitted by grigby1 on Mon, 12/04/2017 - 12:57pm
ISCX repositories
Training
testing
Servers
Resiliency
pubcrawl
Proposals
pattern classification
Metrics
malware detection
machine learning algorithms
machine learning
learning (artificial intelligence)
ISOT repositories
botnet
invasive software
genetic algorithms
genetic algorithm
Feature Selection
feature extraction
feature evaluation
Compositionality
command and control systems
command and control
C4.5 algorithm
C&c
botnets
Botnet detection
biblio
An Unsupervised Multi-Detector Approach for Identifying Malicious Lateral Movement
Submitted by thurlwel on Tue, 10/24/2017 - 4:38pm
Science of Security
advanced persistent threat
advanced persistent threats
Anomaly Detection
command and control
lateral movement
pubcrawl
Science of Security
biblio
Integrity of a common operating picture in military situational awareness
Submitted by BrandonB on Tue, 05/05/2015 - 12:41pm
Microwave integrated circuits
Wireless communication
Weight measurement
situational awareness information
situational awareness
military situational awareness
military operations
military computing
military command and control
C2
integrity
Decision Making
COP integrity
common operating picture integrity
Common Operating Picture
command and control systems
command and control
Cameras
biblio
Soft systems methodology in net-centric cyber defence system development
Submitted by BrandonB on Tue, 05/05/2015 - 12:09pm
modeling
system dynamics model
System Dynamics
system behaviour
SSM
soft systems methodology
sociotechnical systems
situational awareness
security of data
SA
net-centric information system
net-centric hypothesis
net-centric cyber defence system development
net-centric approach
Net-Centric
collaboration
interdependent dynamic relationships
information value
Information systems
information sharing community
information security
information reach
information environment
human activity system
Distributed Information Systems
data sources
complexity
Communities
command and control
collaborative communities
biblio
The Coordination of Cyber and Kinetic Deception for Operational Effect: Attacking the C4ISR Interface
Submitted by BrandonB on Thu, 04/30/2015 - 1:39pm
Force
cyber environment
deception
decision maker
Decision Making
C4ISR interface attacking
combat
command and control
command and control systems
cyber attack
cyber deception
Aircraft
information network attack
kinetic deception
Kinetic theory
operational effect
risk management
security of data
sensors
surveillance
Synchronization
trust
biblio
Rapid Synthesis of Multi-Model Simulations for Computational Experiments in C2
Submitted by volgy on Tue, 10/07/2014 - 2:02pm
Architectures
Multi-models
Modeling
Resilient Systems
Science of Security
Simulation
Foundations
command and control
data interoperability
distributed simulation
heterogeneous simulation
high-level architecture
meta-modeling
model-based integration
model-based program synthesis
multi-model simulation
multi-paradigm modeling
cyberinfrastructure
WebGME
Evaluation and experimentation