Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Cyberspace
biblio
The final security problem in IOT: Don’t count on the canary!
Submitted by aekwall on Fri, 02/17/2023 - 10:40am
encoding
CFI
buffer overflow
rop attacks
ROP
data science
Cyberspace
programming
Layout
Software
composability
Resiliency
Scalability
pubcrawl
Anomaly Detection
Resists
Human Factors
biblio
Detect Phishing Website by Fuzzy Multi-Criteria Decision Making
Submitted by grigby1 on Fri, 02/03/2023 - 5:22pm
Computer hacking
Neural networks
pubcrawl
Human behavior
Decision Making
Phishing
Uniform resource locators
Cyberspace
Anti-phishing
Costs
Blacklist
Fuzzy MCDM
White-list
biblio
Situational Control of Cyber Security in Socio-Cyber-Physical Systems
Submitted by aekwall on Fri, 01/20/2023 - 4:12pm
composability
control systems
Cybersecurity
Cyberspace
Force
human computer interaction
integrated circuits
Predictive Metrics
process control
pubcrawl
Resiliency
security situational awareness
situational awareness
situational control
socio-cyber-physical system
Transforms
biblio
Research on the Characteristics and Security Risks of the Internet of Vehicles Data
Submitted by aekwall on Fri, 01/13/2023 - 3:52pm
Organizations
Human Factors
data privacy
pubcrawl
Scalability
Metrics
Resiliency
Industries
Data Security
Cyberspace
data science
Standards organizations
security policies
Internet of Vehicle
security risk
biblio
Research on Network Attack Information Acquisition and Monitoring Method based on Artificial Intelligence
Submitted by grigby1 on Fri, 12/09/2022 - 5:55pm
monitoring method
security situational awareness
Resiliency
resilience
pubcrawl
Predictive Metrics
Personnel
network security
network attack
National security
Artificial Intelligence
Metrics
Market research
IP networks
information acquisition
Human behavior
Cyberspace
composability
artificial intelligence security
biblio
Objection!: Identifying Misclassified Malicious Activities with XAI
Submitted by grigby1 on Thu, 12/01/2022 - 5:09pm
feature extraction
machine learning
security
pubcrawl
resilience
Resiliency
Conferences
Scalability
Object recognition
malware
malware detection
Cyberspace
malicious website detection
xai
biblio
Risk Management of Silent Cyber Risks in Consideration of Emerging Risks
Submitted by grigby1 on Fri, 11/18/2022 - 2:06pm
Cyberspace
Security Risk Management
Silent cyber risk
Risk Matrix
Risk Breakdown Structure
Electric breakdown
Combination risk
Alteration risk
Insurance
Focusing
risk management
Scalability
Resiliency
resilience
Metrics
Human Factors
Human behavior
pubcrawl
security
Organizations
biblio
Node Importance Evaluation Method for Cyberspace Security Risk Control
Submitted by grigby1 on Fri, 08/26/2022 - 3:07pm
Big Data
Node importance
Key nodes
cyber security knowledge graph
Cyber security data fusion
Control Theory
Cyberspace
education
Ontologies
security
Topology
Scalability
Correlation
Resiliency
Human Factors
Human behavior
pubcrawl
biblio
Enhancing Continuous Service of Information Systems Based on Cyber Resilience
Submitted by grigby1 on Wed, 07/13/2022 - 1:17pm
information security
Trustworthy Systems
trust
Systems engineering and theory
security architecture
security
Scalability
Resiliency
resilience measurement
pubcrawl
policy governance
Metrics
Computing Theory
Human behavior
faces
data science
Cyberspace
cybersecurity education
cyber resilience
continuous service
Conferences
composability
collaboration
resilience
biblio
Bit-FP: A Traffic Fingerprinting Approach for Bitcoin Hidden Service Detection
Submitted by grigby1 on Wed, 06/15/2022 - 10:56am
Forestry
pubcrawl
Human behavior
Conferences
Scalability
Fingerprint recognition
bitcoin
traffic control
Online banking
Cyberspace
Traffic analysis
Tor hidden service
website fingerprinting
bitcoin security
1
2
3
4
5
6
7
8
next ›
last »