Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
threat intelligence
biblio
On the Feasibility of Generating Deception Environments for Industrial Control Systems
Submitted by
aekwall
on Mon, 07/01/2019 - 9:10am
composability
computer network security
constantly morphing surface
critical infrastructure environments
critical infrastructures
critical physical processes
cyber defenders
cyber defense
cyber security
cyber threat landscape
data acquisition
data acquisition systems
deception
generating deception environments
Human behavior
ICs
ICS networks
industrial control
Industrial Control Systems
integrated circuits
networked computer systems
operational ICS
proactive threat intelligence
pubcrawl
Resiliency
SCADA
SCADA systems
SCADA Systems Security
security of data
supervisory control-and-data acquisition systems
threat intelligence
tools
Virtualization
biblio
Integrating Threat Intelligence to Enhance an Organization's Information Security Management
Submitted by
grigby1
on Mon, 05/20/2019 - 3:29pm
collaboration
composability
focus group discussion
Human behavior
Human Factors
information security
information theoretic security
Metrics
policy-based governance
pubcrawl
resilience
Resiliency
Scalability
threat intelligence
Vulnerability Management
biblio
Automating Threat Intelligence for SDL
Submitted by
aekwall
on Mon, 03/04/2019 - 9:49am
security of data
Conferences
malware
security
Resiliency
pubcrawl
composability
Databases
Data mining
software engineering
enterprise information technology infrastructure
Feeds
IT infrastructure
open source threat information sources mining
product deployment
Product design
product development
product security
product specific threat indicators
SDL
security community
security development lifecycle
Stakeholders
tactical threat intelligence
threat intelligence
vulnerability disclosure
Automated Secure Software Engineering
biblio
Hunting Observable Objects for Indication of Compromise
Submitted by
aekwall
on Wed, 02/13/2019 - 10:55am
indicator of compromise
Intrusion Detection
threat intelligence
Resiliency
Human behavior
pubcrawl
metric
threat mitigation
biblio
Quantifying the Spectrum of Denial-of-Service Attacks Through Internet Backscatter
Submitted by
grigby1
on Thu, 08/23/2018 - 10:43am
Compositionality
pubcrawl
composability
Cryptography
threat intelligence
computational intelligence
backscatter
Denial-of-Service
telescope
biblio
Threat Intelligence for Bluetooth-Enabled Systems with Automotive Applications: An Empirical Study
Submitted by
grigby1
on Thu, 08/23/2018 - 10:36am
wireless interfaces
war-nibbling
threat intelligence
resilience
pubcrawl
Pins
on-board communications
malicious attacks
Inspection
infotainment
human factor
Human behavior
telecommunication security
security risks
security
Roads
Safety
Resiliency
Cybersecurity
composability
Bluetooth-enabled systems
bluetooth security
Bluetooth connectivity
Bluetooth
automotive applications
automotive electronics
automotive
biblio
Rethinking Information Sharing for Threat Intelligence
Submitted by
grigby1
on Wed, 05/30/2018 - 2:57pm
computational intelligence
Human behavior
Human Factors
information sharing
Metrics
privacy
pubcrawl
resilience
Resiliency
Scalability
Security Risk Management
standards
threat intelligence
biblio
Mining Attributed Graphs for Threat Intelligence
Submitted by
grigby1
on Wed, 04/11/2018 - 1:46pm
advanced persistent threat
graph mining
Human behavior
information retrieval
Metrics
pubcrawl
resilience
Resiliency
threat intelligence
threat mitigation
biblio
Distributed and highly-scalable WAN network attack sensing and sophisticated analysing framework based on Honeypot technology
Submitted by
grigby1
on Mon, 12/04/2017 - 11:57am
attack efficiency
Attack Visualization
Big Data
botnet
botnets
brute-force login attacks
Compositionality
computer architecture
computer network security
cyber security
Data visualization
Databases
Dictionaries
distributed highly-scalable WAN honeypot network attack sensing
honeypot
honeypot technology
Internet of Things
invasive software
IoT enabled devices
IP networks
large scale DDoS attacks
Metrics
network security
Protocols
pubcrawl
Resiliency
security
threat intelligence
wide area networks
biblio
Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin
Submitted by
grigby1
on Fri, 11/03/2017 - 10:27am
auxiliary information
bitcoin
Bitcoin ecosystem
Bitcoin Fog
Bitcoin services
BitcoinTalk
BTC-e
composability
Computer crime
Cryptography
CryptoLocker
CryptoLocker economy
CryptoLocker operation
Cryptolocker ransoms
Cybercrime
cybercrimes
decentralized cryptographic currency
Electronic mail
erratic cybercrime landscape
financial data processing
financial infrastructure
Human behavior
Metrics
Online banking
online fora
privacy
Protocols
pubcrawl
Public key
ransom payments
Ransomware
reddit
Resiliency
security
sheep marketplace scam
threat intelligence