Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
security
biblio
A L-IDS against Dropping Attack to Secure and Improve RPL Performance in WSN Aided IoT
Submitted by grigby1 on Fri, 04/09/2021 - 11:36am
Internet of Things
security
IoT
IP networks
Peer-to-peer computing
pubcrawl
Resiliency
computer network security
wireless sensor networks
composability
Routing
data packets
Routing protocols
resilience
WSN
telecommunication network topology
Blackhole attack
IDS
Routing Protocol
network performance
network reliability
Black hole attackers
count data
destination data delivery
exchange data routing
expected IDS
L-IDs
L-IDS procedure
LHV value
Link Hop Value-based Intrusion Detection System
routing loops
RPL performance
RPL Routing
RPL routing security scheme
sensor devices
sensor nodes
wireless link
biblio
Assessment of Machine Learning Techniques for Building an Efficient IDS
Submitted by grigby1 on Fri, 04/09/2021 - 11:35am
learning (artificial intelligence)
machine learning
security
Intrusion Detection
Intrusion Detection Systems
pubcrawl
Resiliency
computer network security
telecommunication security
machine learning techniques
composability
real-time systems
telecommunication traffic
DDoS Attacks
Cyber Attacks
Buildings
resilience
IDS
cyberattack
denial-of-service attack
CICIDS2017 dataset
complex environments
efficient IDS
IDS dataset
realistic background traffic
biblio
On the Information Leakage in Private Information Retrieval Systems
Submitted by grigby1 on Thu, 04/08/2021 - 5:10pm
security
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Indexes
data privacy
Scalability
privacy
chaotic communication
information retrieval
encryption
Information Leakage
information forensics
coding schemes
common randomness
individual message leakage
PIR systems
private information retrieval systems
total leakage
biblio
Tackling Insider Threat in Cloud Relational Databases
Submitted by grigby1 on Thu, 04/08/2021 - 4:56pm
insider threat
security of data
Cloud Computing
relational databases
security
insider attacks
pubcrawl
Human behavior
policy-based governance
resilience
Resiliency
Load modeling
mobile computing
knowledge based systems
Metrics
load balancing
resource allocation
Cloud Security
Peer-to-peer computing
launch attacks
cloud systems
Availability
centralized model
cloud computing structures
cloud RDMS
cloud relational database systems
Databases
insider threat tackling
mobile-knowledge bases model
multiple availability zones
Peer to peer computing
peer-to-peer model
biblio
Insider Threat Identification System Model Based on Rough Set Dimensionality Reduction
Submitted by grigby1 on Thu, 04/08/2021 - 4:55pm
insider threat
security of data
Training
security
Insider Threat Detection
pubcrawl
Human behavior
policy-based governance
resilience
Resiliency
Identification
Information systems
information system security
Classification algorithms
trees (mathematics)
Metrics
probability
User behavior
Bayes methods
Accuracy
rough set theory
set theory
attribute information database
Bayes network
demensionality reduction
feedback tree
impersonation detection
insider threat identification system model
minimum risk Bayes decision
rough set
rough set dimensionality reduction
biblio
Modeling of Insider Threat using Enterprise Automaton
Submitted by grigby1 on Thu, 04/08/2021 - 4:55pm
authorisation
insider threat
Organizations
security
business data processing
pubcrawl
Human behavior
policy-based governance
resilience
Resiliency
data privacy
privacy issues
Computational modeling
Attack detection
automata
Metrics
Task Analysis
Silicon
security management
authorized privileges
enterprise automaton
Enterprise process
insider
insider agents
insider attacker
insider threat modeling
nonhuman agents
novel unified model
psycho-social behaviors
biblio
Navigating the Insider Threat Tool Landscape: Low Cost Technical Solutions to Jump Start an Insider Threat Program
Submitted by grigby1 on Thu, 04/08/2021 - 4:54pm
tools
security of data
insider threat
Organizations
security
Monitoring
pubcrawl
Human behavior
policy-based governance
resilience
Resiliency
Software
Law
Metrics
risk analysis
insider threat program
high-level categories
insider risk mitigation
insider threat control deployment
low-cost technical solutions
biblio
Toward an Ontology for Insider Threat Research: Varieties of Insider Threat Definitions
Submitted by grigby1 on Thu, 04/08/2021 - 4:54pm
insider threat
security of data
Organizations
security
pubcrawl
Human behavior
policy-based governance
resilience
Resiliency
Metrics
Ontologies
ontologies (artificial intelligence)
taxonomy
Ontology
software engineering
Educational institutions
conceptual model
definitions
insider
insider threat definitions
insider threat research
OWL
Taxonomies
biblio
Identifying indicators of insider threats: Insider IT sabotage
Submitted by grigby1 on Thu, 04/08/2021 - 4:53pm
insider threat
security of data
Organizations
security
pubcrawl
Human behavior
policy-based governance
resilience
Resiliency
Databases
information technology
Metrics
software engineering
Weapons
attack planning
chronological timelines
Educational institutions
indicators
insider IT sabotage
insider threat cases
insider threats indicators
Materials
sabotage
Sociotechnical
software installation
biblio
Universal Hashing for Information-Theoretic Security
Submitted by aekwall on Thu, 04/08/2021 - 4:43pm
Scalability
private key cryptography
Receivers
security
Resiliency
Human behavior
pubcrawl
policy-based governance
Communication system security
Cryptography
Metrics
information theory
information-theoretic security
Physical layer
Noise measurement
encoding
Communication channels
information theoretic security
secret key agreement
Random variables
telecommunication services
2-universal hash family
information coding
modular coding schemes
wiretap codes
wiretap coding
1
2
3
4
5
6
7
8
9
…
next ›
last »