Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
cyber threat landscape
biblio
Defending Web Servers with Feints, Distraction and Obfuscation
Submitted by
grigby1
on Fri, 05/15/2020 - 11:00am
Computer crime
computer network security
cyber threat landscape
Databases
deception based information security
deceptive counter measure abilities
deceptive defense strategies
delay strategies
delays
file servers
honeytokens
internet
IP networks
Network reconnaissance
pubcrawl
Reconnaissance
reconnaissance process
resilience
Resiliency
robots
Scalability
security strategies
Web servers
biblio
Generating Real Time Cyber Situational Awareness Information Through Social Media Data Mining
Submitted by
grigby1
on Mon, 02/17/2020 - 4:17pm
composability
Cyber Attacks
cyber risk
cyber situational awareness
cyber situational awareness information
cyber threat landscape
cyberattack
Cybersecurity
cybersecurity tweet dataset
data aggregation
data analysis
data analytics techniques
Data mining
information retrieval
internet
machine learning
Metrics
pubcrawl
Ransomware
resilience
Resiliency
security of data
security relevant information retrieval
sentiment analysis
situational awareness
social media
social media data mining
social networking (online)
social networking site Twitter.com
Text Mining
biblio
On the Feasibility of Generating Deception Environments for Industrial Control Systems
Submitted by
aekwall
on Mon, 07/01/2019 - 9:10am
composability
computer network security
constantly morphing surface
critical infrastructure environments
critical infrastructures
critical physical processes
cyber defenders
cyber defense
cyber security
cyber threat landscape
data acquisition
data acquisition systems
deception
generating deception environments
Human behavior
ICs
ICS networks
industrial control
Industrial Control Systems
integrated circuits
networked computer systems
operational ICS
proactive threat intelligence
pubcrawl
Resiliency
SCADA
SCADA systems
SCADA Systems Security
security of data
supervisory control-and-data acquisition systems
threat intelligence
tools
Virtualization
biblio
Collecting Cyber Threat Intelligence from Hacker Forums via a Two-Stage, Hybrid Process Using Support Vector Machines and Latent Dirichlet Allocation
Submitted by
grigby1
on Fri, 03/15/2019 - 10:52am
AV detection
Computer crime
Computer hacking
CTI
cyber security
cyber threat intelligence
Cyber Threat Intelligence (CTI)
cyber threat landscape
hacker forum posts
hacker forums
hybrid machine learning model
internet
latent Dirichlet allocation
LDA
leaked credentials
learning (artificial intelligence)
machine learning
machine learning algorithms
malicious proxy servers
malware
Metrics
nontraditional information sources
privacy
pubcrawl
resource management
security controls
Support vector machines
SVM
text classification
threat vectors
topic modeling
two-stage hybrid process
Vocabulary