Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Heuristics
biblio
Developing Accessible and Usable Security (ACCUS) Heuristics
Submitted by
grigby1
on Mon, 07/01/2019 - 9:06am
accessibility
expert evaluation
Heuristics
pubcrawl
resilience
Resiliency
Scalability
Security Heuristics
Usable Security
biblio
At Your Own Risk: Shaping Privacy Heuristics for Online Self-Disclosure
Submitted by
grigby1
on Mon, 07/01/2019 - 9:06am
acceptance trees
adaptive privacy
audience component
aware- ness
data privacy
data structure representative
data structures
Decision trees
Employment
Facebook
Heuristics
Human-computer interaction
online self-disclosure
potential privacy risks
privacy
privacy awareness
privacy heuristics
private information
pubcrawl
recurrent regrettable scenarios
resilience
Resiliency
risk analysis
Scalability
Security Heuristics
sensitive information
social network sites
social networking (online)
Task Analysis
user-centred privacy preferences
biblio
Coverage-Based Heuristics for Selecting Assessment Items from Security Standards: A Core Set Proposal
Submitted by
grigby1
on Mon, 07/01/2019 - 9:05am
Assessment
Assessment Dimension
assessment dimensions
coverage
Heuristics
high-coverage assessment designs
IEC standards
information security
ISO standards
Ontologies
Ontology
Proposals
pubcrawl
resilience
Resiliency
Scalability
security
security aspects
security assessment designs
security assessment heuristics
security characteristics
Security Heuristics
security of data
security property
security standard
Standard
standards
system security
Systematics
biblio
Improving network connectivity using trusted nodes and edges
Submitted by
grigby1
on Thu, 08/23/2018 - 10:52am
Computing Theory
Economics
graph theory
Heuristics
network connectivity
network theory (graphs)
networked system
pubcrawl
Redundancy
resilience
Robustness
security
trusted edges
trusted nodes
TV
biblio
Detecting Phishing Websites Using Automation of Human Behavior
Submitted by
grigby1
on Mon, 03/26/2018 - 12:13pm
Anti-phishing
automation
composability
defense
Heuristics
Metrics
Phishing
pubcrawl
Resiliency
selenium
Zero day attacks
biblio
Towards a neural language model for signature extraction from forensic logs
Submitted by
K_Hooper
on Wed, 01/10/2018 - 10:14am
Clustering algorithms
complex relationship learning
data analysis
Digital Forensics
error-prone
forensic log analysis
Forensics
handcrafted algorithms
Heuristics
Human behavior
knowledge based systems
learning (artificial intelligence)
log line clustering
log message
natural language processing
natural language text
neural language model
neural nets
Neural networks
nonmutable part identification
pattern clustering
Predictive models
pubcrawl
Resiliency
rule-based approaches
rule-based systems
Scalability
signature extraction frameworks
Software
text analysis
use cases
biblio
Multi-hard Problems in Uncertain Environment
Submitted by
grigby1
on Fri, 10/27/2017 - 11:02am
Metrics
pubcrawl
co-evolution
Heuristics
metaheuristics
Multi-Objective Optimization
non-separable problems
real-world optimization problems
traveling thief problem
supply chain risk assessment
biblio
Fast Mining of Large-Scale Logs for Botnet Detection: A Field Study
Submitted by
grigby1
on Wed, 03/08/2017 - 1:32pm
abnormal data streams
AGD
algorithmically generated domains
botnet
botnet detection methods
botnet life cycle
C and C Servers
Cloud Computing
computer network behavioral analysis
computer network security
Data mining
digital signatures
feature extraction
feature pattern
Heuristics
information quality
information quantity
internet
invasive software
large-scale proxy log mining
logs
malware
malwares
mining
network-based attack
normal data streams
proxy
pubcrawl170112
Servers
Workstations
file
Enabling Forensics by Proposing Heuristics to Identify Mandatory Log Events
Submitted by
Laurie Williams
on Wed, 04/29/2015 - 10:18am. Contributors:
Jason King
Rahul Pandita
Laurie Williams
Science of Security
Foundations
privacy
Forensics
Heuristics
HotSoS 2015
Presentation
Academia
Presentations