Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
tools
biblio
A2G2V: Automatic Attack Graph Generation and Visualization and Its Applications to Computer and SCADA Networks
Submitted by aekwall on Mon, 01/25/2021 - 12:03pm
security
computer network security
Internet of Things
Internet of Things (IoT)
computer architecture
SCADA systems
cyber-physical systems
Resiliency
pubcrawl
composability
graph theory
Computational modeling
tools
computer networks
model checking
data visualisation
visualization
Predictive Metrics
formal verification
Internet of Things systems
SCADA networks
networked system
cyber-physical systems security
attack graphs
A2G2V algorithm
architecture description tool
atomic-level vulnerabilities
attack graph
automatic attack graph generation
control networks
Cyber-Physical Systems (CPS)
enumerating counterexamples
model-checking tools
model-checking-based automated attack graph generator and visualizer
visualization tool
biblio
Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks
Submitted by aekwall on Mon, 01/25/2021 - 12:02pm
security
Protocols
Software
computer architecture
Resiliency
pubcrawl
composability
Databases
tools
risk management
network attacks
Predictive Metrics
attack graph
attack graphs
MulVal
network protocols
biblio
An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center
Submitted by grigby1 on Mon, 01/25/2021 - 10:29am
Air gaps
Analytical models
composability
Government
Human behavior
Human Factors
machine learning
malware
Metrics
pubcrawl
resilience
Resiliency
security
tools
usability
biblio
Evolving Advanced Persistent Threat Detection using Provenance Graph and Metric Learning
Submitted by grigby1 on Fri, 01/22/2021 - 1:37pm
tools
learning (artificial intelligence)
security of data
feature extraction
machine learning
security
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Conferences
Scalability
Trojan horses
Measurement
advanced persistent threat
APT
Zero-day attacks
graph theory
detection accuracy
APT attacks
advanced persistent threat detection
attack campaigns
benign tools
deep learning method
high profile information
online adaptive metric learning
provenance graph
TPR
true positive rate
biblio
IoT-APIScanner: Detecting API Unauthorized Access Vulnerabilities of IoT Platform
Submitted by grigby1 on Wed, 01/20/2021 - 3:22pm
API
API test cases
API unauthorized access vulnerability detection
APIs
application program interfaces
application programming interface
authorisation
cloud API
Cloud Computing
cloud services
Compositionality
data privacy
formal verification
Internet of Things
IoT devices
IoT security
IoT-APIScanner
permission verification
program testing
pubcrawl
resilience
Resiliency
security
Smart homes
Task Analysis
timing
tools
unauthorized access
user privacy
Web API
biblio
Investigating The Darknet
Submitted by grigby1 on Fri, 01/15/2021 - 11:24am
Automated honeypots
Computer crime
computer security mechanisms
Cybercrime
dark web
darknet
detection
drugs
Forensics
honeypots
Human behavior
Human Factors
internet
Internet users
investigation
Organizations
pubcrawl
Research honeypots
security
Servers
tools
Virtual machining
World Wide Web criminals
biblio
A Social Network Analysis and Comparison of Six Dark Web Forums
Submitted by grigby1 on Fri, 01/15/2021 - 11:24am
central nodes post
Computer crime
content ranging
criminal interests
Cryptography
dark web
dark Web forums
data privacy
drugs
Hacking
Human behavior
Human Factors
Instruction sets
interaction graphs
network centrality analysis
online communities
post discussion data
posting activities
privacy
pubcrawl
social interactions
social network analysis
social network analysis tools
social networking (online)
structural patterns
Terrorism
tools
underground communities
whistle-blowing
biblio
On the Generality of Facial Forgery Detection
Submitted by grigby1 on Fri, 01/15/2021 - 11:14am
computer architecture
tools
feature extraction
CNN
convolutional neural nets
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
Scalability
Streaming media
Metrics
Task Analysis
face recognition
convolutional neural networks
object detection
Face
video streaming
DeepFake
Deepfakes
Face2Face
Forgery
CNN architectures
detection architectures
FaceSwap
facial forgery detection
GANnotation
ICface
image forgery detection
MesoNet
multiple spoofing techniques
unseen spoofing techniques
unseen techniques
X2Face
XceptionNet
biblio
A Programming Framework for Differential Privacy with Accuracy Concentration Bounds
Submitted by aekwall on Mon, 01/11/2021 - 12:42pm
Scalability
data privacy
programming
Resiliency
Human behavior
pubcrawl
composability
privacy
tools
Databases
cognition
differential privacy
programming languages
data analysis
reasoning
Accuracy
functional programming
accuracy concentration
concentration bounds
data analyses results
Haskell
private data analyses
programming differentially private analyses
biblio
Secure Wipe Out in BYOD Environment
Submitted by aekwall on Mon, 01/11/2021 - 12:30pm
Scalability
encryption
Hardware
performance evaluation
real-time systems
pubcrawl
tools
privacy
Standards organizations
computer science
BYOD
cryptographic erasure
deletion
Memory Forensics
Per-file deletion
data deletion
1
2
3
4
5
6
7
8
9
…
next ›
last »