Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Cyberspace
biblio
A Security Qualification Matrix to Efficiently Measure Security in Cyber-Physical Systems
Submitted by aekwall on Mon, 02/08/2021 - 1:39pm
Scalability
security
cyber-physical systems
Resiliency
pubcrawl
Metrics
Smart Grids
Cyberspace
Human Factors
security metric
Compositionality
Microelectronics
Cyber Dependencies
Qualifications
Security Qualification Matrix
Security Scoring
smart manufacturing
threat analysis
biblio
A Black-Box Approach to Generate Adversarial Examples Against Deep Neural Networks for High Dimensional Input
Submitted by grigby1 on Fri, 09/04/2020 - 4:11pm
security of data
query processing
Conferences
optimisation
pubcrawl
composability
Metrics
Resiliency
resilience
learning (artificial intelligence)
neural nets
Cyberspace
machine-to-machine communications
regression analysis
Iterative methods
deep neural networks
face recognition
adversarial perturbations
gradient methods
adversarial examples
approximation theory
black-box approach
black-box setting
CNNs
data science
extensive recent works
generate adversarial examples
generating adversarial samples
high dimensional
image classification
learning models
linear fine-grained search
linear regression model
minimizing noncontinuous function
model parameters
noncontinuous step function problem
numerous advanced image classifiers
queries
white-box setting
Zeroth order
zeroth order optimization algorithm
zeroth-order optimization method
Black Box Security
biblio
On the Use of Cyber Threat Intelligence (CTI) in Support of Developing the Commander's Understanding of the Adversary
Submitted by aekwall on Mon, 08/03/2020 - 10:38am
Scalability
Servers
Organizations
security
Resiliency
Human behavior
pubcrawl
Metrics
Computer crime
tools
testing
indicators of compromise
Workstations
Cyberspace
military computing
cyber threat intelligence
advanced persistent threats
decision making process
threat models
Adversary Attribution
adversary tactics
ATT&CK framework
ATT&CK®
communication and information system security
CTI field
cyber related crimes
cyberspace operations
deception techniques
Decoys
military organization
Mission Planning
NATO Allied Command Transformation
NATO Communication and Information Agency
Adversary Models
biblio
Critical Infrastructure Security: Alignment of Views
Submitted by aekwall on Mon, 07/06/2020 - 10:18am
security
security of data
critical infrastructure
critical infrastructures
information security
Resiliency
pubcrawl
computer security
Cyberspace
National security
Europe
critical information infrastructure
air gap
common cyberspace
critical infrastructure security
cyber environment
information environment
informational space
intergovernmental national views
protection of critical infrastructure
Damage Assessment
biblio
An Intelligent Cyberspace Defense Architecture Based on Elastic Resource Infrastructure and Dynamic Container Orchestration
Submitted by aekwall on Mon, 05/04/2020 - 11:14am
composability
Metrics
Dynamic Networks and Security
aggregated security events
Cloud Computing
cloud computing platform
computer architecture
container library
containerization
containerization technology
Containers
Cyberspace
decision rule base
dynamic container orchestration
Dynamic decision making
Dynamical Systems
elastic resource infrastructure
Hardware
intelligent cyberspace defense architecture
intelligent defense
Network Security Architecture
pubcrawl
Resiliency
resource allocation
security
security architecture
security capability pool
security decision center
security event database
security load
security of data
security payload
security resource allocation
Software
top-level security framework
unprecedented hard situation
versatile cyberspace
biblio
Power of Communication Behind Extreme Cybersecurity Incidents
Submitted by grigby1 on Fri, 04/10/2020 - 12:53pm
Computational modeling
Cybersecurity
Cyberspace
Electronic mail
extreme cybersecurity incidents
Human behavior
Human Factors
internet
Metrics
Pervasive Computing Security
Phishing
Protocols
pubcrawl
resilience
Resiliency
risk analysis
risk management
risk mitigations
Scalability
security of data
surrounding threats
biblio
Distributed Threat Intelligence Sharing System: A New Sight of P2P Botnet Detection
Submitted by aekwall on Mon, 04/06/2020 - 10:14am
botnets
AHP and HMM based analysis algorithm
analytic hierarchy process
BAV quantitative TI model
botnet
Clustering algorithms
computer network security
Cyberspace
cyberspace security
distributed botnet
distributed cyber threat
distributed methods
distributed threat intelligence sharing system
evaluating system
Hidden Markov models
Human Factors
invasive software
Metrics
network traffic analysis
P2P botnet detection
peer to peer security
peer-to-peer botnet detection
Peer-to-peer computing
pubcrawl
Resiliency
Scalability
security
standards
telecommunication traffic
threat intelligence
Threat intelligence sharing
biblio
Construction of Cyber Range Network Security Indication System Based on Deep Learning
Submitted by grigby1 on Mon, 02/17/2020 - 5:17pm
advanced artificial intelligence deep learning technology
Artificial Intelligence
composability
computer network security
computer security
cyber range
cyber range network security indication system
Cyberspace
deep learning
Indication System
learning (artificial intelligence)
machine learning
Metrics
network security
neural network
pubcrawl
qualitative evaluation
quantitative evaluation
relevant network security situation assessment algorithms
resilience
Resiliency
situational awareness
Viruses (medical)
biblio
Developing an international cooperation on cyber defense and deterrence against Cyber terrorism
Submitted by aekwall on Wed, 12/18/2019 - 2:38pm
security of data
Scalability
Human behavior
pubcrawl
internet
Deterrence
Government
resilience
Cyberspace
Terrorism
cyber terrorism
cyber defense
Computers
cyber deterrence
social aspects of automation
Cyber defence
cyber security countermeasures
government data processing
information technology security
biblio
Deterring Strategic Cyberattack
Submitted by aekwall on Wed, 12/18/2019 - 2:37pm
security of data
Computer crime
Scalability
cyber security
critical infrastructures
Human behavior
pubcrawl
privacy
cyberattack
resilience
Cyberspace
Deterrence
collateral damage control
comprehensive defense
Critical Infrastructure Protection
cyber-dependent infrastructure
cyberattack deterrence
cyberwar
government policies
international agreement
legal norm
nuclear deterrence
nuclear deterrence versus cyber deterrence
nuclear regime
1
2
3
4
5
next ›
last »