Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
cyber threats
biblio
Advanced Petya Ransomware and Mitigation Strategies
Submitted by
aekwall
on Mon, 10/07/2019 - 10:43am
Advance Petya ransomware
anti-virus detection
composability
Computer crime
Cryptography
cyber era
cyber threats
cyber world
cyber-attack
Cyber-security
Electronic mail
encryption
encryption codes
heavy ransom
invasive software
Metrics
Mitigations
Organizations
Petya ransomware
pubcrawl
Ransomware
ransomware attack
Resiliency
biblio
Security Assessment as a Service Cross-Layered System for the Adoption of Digital, Personalised and Trusted Healthcare
Submitted by
grigby1
on Mon, 08/26/2019 - 10:09am
Cloud Computing
composability
computer security
Cross Layer Security
cyber aware environment
cyber threats
Cybersecurity
cybersecurity risk
digital-personalised-trusted healthcare
health care
Healthcare
Internet of Things
Internet-of-Things
IT healthcare ecosystem
Medical services
Monitoring
pubcrawl
resilience
Resiliency
SAaaS
security assessment as a service
security of data
sensors
service cross-layered system
Trusted Computing
biblio
IoT Standardisation: Challenges, Perspectives and Solution
Submitted by
grigby1
on Mon, 07/01/2019 - 9:02am
computer security
cyber threats
Human behavior
Human Factors
IoT
legislation
privacy
pubcrawl
resilience
Resiliency
Scalability
security audit
Security Audits
standards
biblio
Using Convolutional Neural Networks to Network Intrusion Detection for Cyber Threats
Submitted by
grigby1
on Fri, 03/15/2019 - 10:53am
privacy
security of data
pubcrawl
Metrics
feature extraction
Training
convolution
convolutional neural networks
feedforward neural nets
learning (artificial intelligence)
deep learning
Conferences
Support vector machines
pattern classification
network intrusion detection
Intrusion Detection
threat vectors
Behavior features
cyber threats
LeNet-5
network behavioural features
network threat classification
threat detection classification
biblio
Challenges and Mitigation of Cyber Threat in Automated Vehicle: An Integrated Approach
Submitted by
aekwall
on Wed, 02/13/2019 - 10:56am
automobiles
Automotive engineering
automotive industry
automotive vehicle cybersecurity
autonomous vehicles
cyber threat mitigation
cyber threats
cyberattack
cybersecurity threats
increased risks
Organizational Mitigation
organizational mitigation measures
road safety
road vehicles
Safety
security of data
Technical mitigation
technical mitigation measures
technological development
traffic engineering computing
Resiliency
Human behavior
pubcrawl
metric
threat mitigation
biblio
Analyst Intuition Inspired High Velocity Big Data Analysis Using PCA Ranked Fuzzy K-Means Clustering with Multi-Layer Perceptron (MLP) to Obviate Cyber Security Risk
Submitted by
grigby1
on Wed, 11/14/2018 - 12:21pm
Analyst Intuition
analyst intuition inspired high velocity big data analysis
Artificial Intelligence
attacker IP addresses characteristics
Big Data
Clustering algorithms
computer networks
computer network security
computer security
cyber-attacks
cyber security
cyber security expert
cyber security log classification
cyber security risk
cyber threats
data analysis
Data mining
efficient security monitoring system
Expectation Regulated
expert system
expert systems
Fuzzy k-means (FKM)
fuzzy set theory
High Velocity
Human behavior
integrated datasets
invasive software
IP networks
learning (artificial intelligence)
log history annotation
malware
malware attacks
manually labelled data
MLP
Monitoring
Multi-layer Perceptron (MLP)
multilayer perceptrons
network datasets
network protocols
network user
neural network classifier multilayer perceptron base
pattern classification
pattern clustering
PCA ranked fuzzy k-means clustering
principal component analysis
Principal Component Analysis (PCA)
pubcrawl
resilience
Resiliency
Scalability
scoring system
security
special semisupervise method
statistical data generation
Virus
biblio
A secure and reliable coding scheme over wireless links in cyber-physical systems
Submitted by
grigby1
on Fri, 10/26/2018 - 3:52pm
coding scheme reliability
coding scheme security
communication protocol security
Cryptographic Protocols
cyber threats
cyber-physical system
cyber-physical systems
embedded systems
encoding
encryption
encryption matrices
forward error correction
forward error correction coding
lightweight coding method
matrix algebra
network coding
Protocols
pubcrawl
radio links
radio networks
Receivers
Reliability
replay attacks
Resiliency
Scalability
security
telecommunication network reliability
telecommunication security
transmission protocol
Wireless communication
wireless communication links
wireless network
wireless networks
wireless sensor networks
biblio
A Lightweight Malware Classification Method Based on Detection Results of Anti-Virus Software
Submitted by
grigby1
on Wed, 06/20/2018 - 11:57am
antivirus software detection
arrays
computer viruses
cyber threats
Data mining
Databases
dynamic analysis
Electronic mail
Human behavior
internet
lightweight malware classification
malware
Malware Analysis
malware classification
Malware Clustering
Metrics
pattern classification
Phased arrays
privacy
program diagnostics
pubcrawl
resilience
Resiliency
static analysis
biblio
Cyber Situational Awareness Enhancement with Regular Expressions and an Evaluation Methodology
Submitted by
grigby1
on Tue, 02/06/2018 - 1:07pm
composability
computer network security
computer security
Cyber Operations
cyber situational awareness
cyber situational awareness enhancement
cyber threats
Cybersecurity
decision maker mission completeness
deep packet inspection
Handheld computers
Metrics
pattern matching
PCRE
performance evaluation
pubcrawl
Regexbench
regular expression processing capability
Regular expressions
Resiliency
security systems
situational awareness
Sniffles
biblio
A Quantitative CVSS-Based Cyber Security Risk Assessment Methodology for IT Systems
Submitted by
grigby1
on Tue, 02/06/2018 - 12:44pm
attack graphs
big data security metrics
computer security
cyber security risk assessment methodology
cyber security risks
cyber threats
detailed risk assessment
graph theory
high level risk metrics
IT systems
Measurement
Metrics
Organizations
probability
pubcrawl
quantitative CVSS
Resiliency
risk assessment
risk management
risk management frameworks
risk metrics
risk metrics values
risk views
Scalability
security of data
standards
system risk assessments
Vulnerability
Vulnerability Management
1
2
next ›
last »