Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Attack vectors
biblio
Exploring the Possibility of USB based Fork Bomb Attack on Windows Environment
Submitted by grigby1 on Fri, 04/17/2020 - 11:28am
Metrics
Windows Operating System Security
Windows operating system
Windows environment
Windows
USB flash drive devices
USB based Fork Bomb attack
USB attack
system buses
security of data
Resiliency
resilience
pubcrawl
primary storage devices
operating systems (computers)
Arduino Pro Microdevice
memory performance
media exchanges
fork bomb
flash memories
electronic data interchange
digital storage
device drivers
data storage
data exchange devices
Computer crime
composability
Attack vectors
attack vector
biblio
Phishing in Depth – Modern Methods of Detection and Risk Mitigation
Submitted by grigby1 on Wed, 02/26/2020 - 4:44pm
Phishing
virtual experiences
unsolicited e-mail
threats
threat mitigation
threat
security measures
security defense mechanisms
risk mitigation
Resiliency
resilience
pubcrawl
Attack vectors
Metrics
mass email infrastructures
machine learning
Human Factors
Human behavior
fraudulent content
fraud
email attacks
electronic mail service
Computer crime
biblio
Advance Persistant Threat and Cyber Spying - The Big Picture, Its Tools, Attack Vectors and Countermeasures
Submitted by grigby1 on Wed, 02/26/2020 - 4:40pm
Meterpreter
Wireshark
Vectors
Traceroute
tools
threat vectors
testing
skilled cybercriminal
Reconnaissance
pubcrawl
privacy
primary security concerns
Organizations
Metrics
advance persistant threat
Measurement
malware
Kali Linux
HPING3 Metasploit-Framework
Foot-printing
cyber spying
Computer crime
Clearing Tracks
big picture
big organizations
Attack vectors
advanced persistent threat
Advance Persistent Threat
biblio
An Attack Vector Evaluation Method for Smart City Security Protection
Submitted by grigby1 on Mon, 02/17/2020 - 5:08pm
pubcrawl
weakness
vulnerability assessment
Vulnerability
Software
smart city security protection
smart cities
simulation
security weaknesses
security of data
security
risk management
Resiliency
resilience
quantitative evaluation method
Analytical models
policy-based governance
network security risk assessment
Metrics
Human behavior
formal representation
edge computing
depend conditions
defense factors
critical information infrastructure
Conferences
Big Data
Attack vectors
attack vector evaluation method
attack vector
biblio
Design principles for national cyber security sensor networks: Lessons learned from small-scale demonstrators
Submitted by aekwall on Mon, 02/17/2020 - 2:33pm
IoC-centric cyber security sensor networks
design decisions
design principles
distributed cyber security sensor networks
effective cyber defence
exchange process
extensive human involvement
indicator distribution
information brokers
information exchange
cyber security sensor networks
national authorities
national cyber security
national cyber security centres
national cyber security sensor networks
scanning process
security data
security information
small-scale demonstrators
vital recommendations
composability
computer network security
Cryptography
Organizations
malware
Task Analysis
invasive software
Resiliency
Human behavior
pubcrawl
Computer crime
Metrics
Industries
Attack vectors
indicators of compromise
Feeds
sensor network
sensor security
National security
confidential indicators
biblio
Web-Based Platform for Evaluation of Resilient and Transactive Smart-Grids
Submitted by aekwall on Mon, 02/10/2020 - 12:05pm
physical components
computational components
DER
design studio
distributed sensors
economic control techniques
energy generation
energy generators
energy transmission
grid reliability
grid resilience
largely open IP-based communication network
comprehensive Web-based platform
physical-attacks
power-grid security
Power-grid simulation
remote cyber-attacks
smart-grids
software-controlled grid operations
TE approach
transactive energy
transactive smart-grids
Smart Grid Sensors
Communication networks
modeling and simulation
Resiliency
pubcrawl
internet
Reliability
Attack vectors
smart power grids
distributed energy resources
power engineering computing
Smart Grids
security of data
Load modeling
power system reliability
resilience
distributed power generation
Human Factors
Energy storage
Compositionality
storage devices
Meters
collaboration platform
biblio
Anomaly Based Distributed Denial of Service Attack Detection and Prevention with Machine Learning
Submitted by grigby1 on Wed, 12/18/2019 - 2:45pm
Human behavior
telecommunication traffic
service attack detection
Resiliency
resilience
pubcrawl
pattern clustering
Particle separators
network traffic
Metrics
Measurement
machine learning
learning (artificial intelligence)
anomaly based distributed denial of service attack detection
feature extraction
DoS-DDoS attacks
DDoS Attack Prevention
DDoS Attack
DBSCAN
computer network security
Computer crime
composability
Clustering algorithms
clustering algorithm
Attack vectors
biblio
Embedded policing and policy enforcement approach for future secure IoT technologies
Submitted by aekwall on Mon, 03/11/2019 - 10:37am
Root-of-trust
MPSoC
platform module
policy violation
potential technical vulnerabilities
pro-active policy
pubcrawl
Quality Control
Resiliency
malicious application
secure IoT technologies
software security technologies
SPE approach
supply chain efficiencies
system communication bus
system resources
Trusted Platfrom Modules
Zero-day attacks
computer network security
ARM TrustZone
Attack vectors
authentication mechanisms
authorisation
business operations
chain-of-trust
commercial building management
composability
additional threats
embedded applications
embedded hardware
embedded systems
end users
FPGA
hardware security policy engine
Internet of Things
IoT applications
biblio
DLR Secure Software Engineering
Submitted by aekwall on Mon, 03/04/2019 - 10:49am
data-science
Automated Secure Software Engineering
static analysis
software engineering
software development process
software automated security evaluation
self-developed software
secure-software-engineering
research organization
Provenance
IT-security
information sources
DLR secure software engineering
security of data
data-oriented approach
code-analysis
Aerospace engineering
Attack vectors
tools
composability
pubcrawl
Resiliency
Software
security
Conferences
biblio
A Systems Approach to Indicators of Compromise Utilizing Graph Theory
Submitted by aekwall on Mon, 03/04/2019 - 10:46am
Attack vectors
Workstations
Vectors
systems-based indicators
systems approach
network theory (graphs)
network security breaches
network intrusion
multiple diverse modalities
mathematical tool
IOC
indicators of compromise
complex networks
complex network intrusion
computer network security
Applied Mathematics
attribution
Mathematical model
tools
Metrics
graph theory
composability
pubcrawl
Human behavior
malware
IP networks
human-in-the-loop security center paradigm
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »