Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
cyber security threats
biblio
Research on Industrial Internet of Things Security Architecture and Protection Strategy
Submitted by aekwall on Mon, 05/04/2020 - 10:14am
Intelligent Data and Security
Intelligent Data Security
Compositionality
Resiliency
Scalability
computer network security
cyber security threats
data acquisition
Data processing
industrial automation systems
Industrial IoT
industrial IoT information security protection technology
industrial IoT system
information security issues
intelligent environment detection
intelligent processing
intelligent transportation
Internet of Things
Internet of Things security architecture
IoT security
IoT systems
Network Security Architecture
network security threats
production engineering computing
protection strategy
Protocols
pubcrawl
security
security of data
security protection strategies
security strategy
security threats
Servers
biblio
Development of Incident Response Tool for Cyber Security Training Based on Virtualization and Cloud
Submitted by grigby1 on Fri, 04/17/2020 - 10:28am
actual information system
artificial intelligenc
artificial intelligence technology
CBT type remote education
cloud
Cloud Computing
composability
computer based training
Computer crime
computer science education
cyber security
cyber security experts
cyber security threats
cyber security training system
defense practice
government data processing
infringement incident response tool
Korean e-government framework
Korean government agency
Linux
Metrics
military war game modeling
modeling and simulation
pubcrawl
resilience
Resiliency
scenario based infringement incident response training
Secure Coding
virtualisation
virtualization-based infringement incident response tool
vulnerability measure practice
Window operating system environments
Windows Operating System Security
biblio
Anomaly Detection in Cyber Security Attacks on Networks Using MLP Deep Learning
Submitted by grigby1 on Fri, 03/22/2019 - 12:01pm
Advanced Security Network Metrics \\& NonPayload-Based Obfuscations
Anomaly Detection
Big Data
big data security
C4.5
computer network security
Correlation
cyber security
cyber security attacks
cyber security threats
Decision trees
deep learning
feature extraction
ID3
information security
invasive software
J48
learning (artificial intelligence)
machine learning
malware
malware attacks
malware data
Metrics
MLP deep learning
Multilayer Perceptron
Multilayer Perceptron (MLP)
multilayer perceptrons
pubcrawl
resilience
Resiliency
Scalability
WEKA
biblio
Cyber Physical Sensors System Security: Threats, Vulnerabilities, and Solutions
Submitted by grigby1 on Mon, 02/25/2019 - 2:21pm
Cloud Computing
composability
computing platform
control center
CPSS threats
Cryptography
cyber physical SENSOR Systems
cyber physical sensors system security
cyber security
cyber security threats
cyber-physical systems
Data collection
enterprise command
Human behavior
Human Factors
Humidity
Indexes
Intelligent sensors
local real-time control activities
physical object
process algorithm
pubcrawl
Resiliency
security of data
Sensor Systems
Servers
smart cities
Smart Grid
Smart Grid Sensors
Smart Sensor
vulnerabilities
wireless access points
biblio
Extracting Cyber Threat Intelligence from Hacker Forums: Support Vector Machines versus Convolutional Neural Networks
Submitted by grigby1 on Wed, 04/11/2018 - 1:49pm
Computer crime
Computer hacking
Convolutional Neural Network algorithms
convolutional neural networks
cyber security
cyber security threats
cyber threat intelligence
Cyber Threat Intelligence (CTI)
Data mining
error-prone process
feedforward neural nets
hacker forum
hacker forums
learning (artificial intelligence)
Learning systems
machine learning
Metrics
Open-Source Intelligence
pattern classification
privacy
pubcrawl
relevant threat information
relevant threat intelligence
Support vector machines
text classification
threat vectors
vital information
biblio
Studying cyber security threats to web platforms using attack tree diagrams
Submitted by K_Hooper on Wed, 02/14/2018 - 10:59am
artificial intelligence security
attack tree
attack tree diagrams
Attack Tree method
common vulnerabilities
computer security
computer security threats
computer system
Computers
cyber security threats
cyber-attack
global reference system
graphical analysis
Human behavior
Information systems
information systems designers
information technology
internet
Metrics
Open Source Software
Organizations
pubcrawl
Resiliency
Scalability
security of data
security personnel
security threats
trees (mathematics)
Web platform
Web platforms
WordPress platform
WordPress vulnerabilities
biblio
Cyber security threats \#x2014; Smart grid infrastructure
Submitted by grigby1 on Mon, 11/27/2017 - 11:25am
composability
computer security
cyber infrastructure
cyber security
cyber security threats
cyber-attack
Demand response (DR)
denial-of-service (DoS)
electronic devices
ICT
ICT driven power equipment massively layered structure
Metrics
new generation sensors
NIST
Peak Load Management (PLM)
power grid vulnerability analysis
power system framework
power system security
prosumer
Protocols
pubcrawl
R and D
Resiliency
risk evaluation process
SCADA
secure cyber infrastructure
security of data
smart devices
smart grid infrastructure
Smart Grids
smart meters
smart power grids
smart power system
Software
WANs
biblio
Efficient spear-phishing threat detection using hypervisor monitor
Submitted by grigby1 on Tue, 03/07/2017 - 12:39pm
antievasion sandbox
CIA
Cloud Computing
cloud-threat inspection appliance
commercial antivirus software
Computer crime
cyber security
cyber security threats
detection engine
document handling
document prefiltering algorithm
Electronic mail
fake emails
hackers
hardware-assisted virtualization
hardware-assisted virtualization technology
hypervisor kernel
hypervisor monitor
invasive software
malicious activities
malicious attachments
malware
Monitoring
PDF format structures
Portable document format
pubcrawl170109
Spear-phishing
spear-phishing attack
spear-phishing threat detection
transparent hypervisor monitor
unsolicited e-mail
URL links
user accounts
Virtual machine monitors
virtualisation
Virtualization