Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Terrorism
biblio
Asymmetric Analysis of Anti-Terrorist Operations and Demand for Light Weapons under the Condition of Informationization
Submitted by grigby1 on Tue, 04/26/2022 - 10:35am
pubcrawl
Weapons
Training
Terrorism
Technological innovation
small arms
Scalability
Resiliency
resilience
Anti-terrorist operations
Informationization
Information age
Image Processing
Human behavior
Deterrence
Cyberspace
Asymmetry
biblio
Cyber Warfare Threat Categorization on CPS by Dark Web Terrorist
Submitted by grigby1 on Tue, 04/12/2022 - 12:12pm
Training
machine learning
pubcrawl
Human behavior
Web pages
tagging
Weapons
dark web
Tor
Terrorism
supervised learning
categorization
cyber warfare
Cyber-Physical Systems (CPS)
biblio
Intrusion Detection from Synchrophasor Data propagation using Cyber Physical Platform
Submitted by aekwall on Fri, 02/04/2022 - 10:36am
analysis and detection
Cyber Physical System
Intrusion Detection
microgrid
Microgrids
Phasor measurement units
power system stability
pubcrawl
real-time systems
Resiliency
synchrophasor
Technological innovation
Terrorism
US government
biblio
A Social Network Analysis and Comparison of Six Dark Web Forums
Submitted by grigby1 on Fri, 01/15/2021 - 12:24pm
network centrality analysis
whistle-blowing
underground communities
tools
Terrorism
structural patterns
social networking (online)
social network analysis tools
social network analysis
social interactions
pubcrawl
privacy
posting activities
post discussion data
online communities
central nodes post
interaction graphs
Instruction sets
Human Factors
Human behavior
Hacking
drugs
data privacy
dark Web forums
dark web
Cryptography
criminal interests
content ranging
Computer crime
biblio
An Investigation of High-Throughput Biometric Systems: Results of the 2018 Department of Homeland Security Biometric Technology Rally
Submitted by grigby1 on Wed, 11/04/2020 - 1:34pm
Metrics
user satisfaction metrics
US government
unmanned face
unmanned biometric systems
U.S. Department
traveler identification
Throughput
testing
Terrorism
security of data
Science and Technology Directorate
pubcrawl
National security
metrics testing
2018 Biometric Technology Rally
Measurement
measured throughput
measured performance
MdTF
matching capability
Maryland Test Facility
Iris recognition
homeland security biometric technology rally
high-throughput security environment
high-throughput biometric systems
face-iris systems
Face
DHS S-T affiliated bio-metrics
capture capability
biblio
Dark Web Along With The Dark Web Marketing And Surveillance
Submitted by grigby1 on Fri, 07/10/2020 - 11:54am
Human behavior
WebMarketing
Web sites
Weapons
Terrorism
terror activities
surveillance programs
surveillance
pubcrawl
law enforcement agencies
law enforcement
invasive software
internet
Human Factors
Computer crime
drugs
darkweb
dark Web sites
dark Web marketing
dark Web jihadist services
dark web
Daniel onion.
cybercrimes
cyber criminals
criminal law
Conferences
Computer hacking
biblio
Drone Detection in Long-Range Surveillance Videos
Submitted by aekwall on Mon, 04/13/2020 - 10:27am
learning (artificial intelligence)
Videos
video surveillance
Training
tracking surveillance
Terrorism
SSD
single shot detector
security of data
security breaches
Resiliency
pubcrawl
Proposals
object detection
Metrics
long-range surveillance videos
deep video
Human behavior
high-security risks
Faster-RCNN
Faster R-CNN
drones
drone detection
Detectors
detection methods
deep learning-based object detection
deep learning
convolutional neural nets
CNN-based architectures
Birds
autonomous aerial vehicles
biblio
Developing an international cooperation on cyber defense and deterrence against Cyber terrorism
Submitted by aekwall on Wed, 12/18/2019 - 2:38pm
Terrorism
information technology security
government data processing
cyber security countermeasures
Cyber defence
social aspects of automation
cyber deterrence
Computers
cyber defense
cyber terrorism
security of data
Cyberspace
resilience
Government
Deterrence
internet
pubcrawl
Human behavior
Scalability
biblio
The positive force of deterrence: Estimating the quantitative effects of target shifting
Submitted by aekwall on Wed, 12/18/2019 - 2:37pm
counter piracy
Terrorism
target shifting
stopping performance
Radiation detectors
low performance security
game theoretic approach
force multiplier
Force measurement
false alarm
deterrence force
counterterrorism
security of data
Deterrence
risk analysis
protection system
resilience
uncertainty
Force
pubcrawl
Human behavior
game theory
Scalability
biblio
Developing a Secure Cyber Ecosystem for SCADA Architecture
Submitted by aekwall on Mon, 07/01/2019 - 10:09am
Monitoring
Terrorism
states security system
security of data
secure Cyber ecosystem
SCADA Systems Security
SCADA systems
SCADA network systems
SCADA architecture
SCADA
RTU
robust cyber security
pubcrawl
PLC
network attack
Resilient Security Architectures
Industries
Human behavior
Global village
cyber terrorism
cyber resilience
Cyber invasions
Cyber Attacks
critical infrastructure
critical information
Conferences
computer security
composability
CII
Resiliency
1
2
3
next ›
last »