Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
User behavior
biblio
Insider Threat Identification System Model Based on Rough Set Dimensionality Reduction
Submitted by grigby1 on Thu, 04/08/2021 - 4:55pm
insider threat
security of data
Training
security
Insider Threat Detection
pubcrawl
Human behavior
policy-based governance
resilience
Resiliency
Identification
Information systems
information system security
Classification algorithms
trees (mathematics)
Metrics
probability
User behavior
Bayes methods
Accuracy
rough set theory
set theory
attribute information database
Bayes network
demensionality reduction
feedback tree
impersonation detection
insider threat identification system model
minimum risk Bayes decision
rough set
rough set dimensionality reduction
biblio
User detection of threats with different security measures
Submitted by grigby1 on Tue, 03/30/2021 - 12:04pm
alerting system
Alerting systems
associated costs
Atmospheric measurements
computer security
Cyber Attacks
Cyber Insurance
cyber security system design
Cybersecurity
Decision Making
fourth condition
Human behavior
human decisions
Human Factors
IDS
Insurance
Investment
investment decisions
maximal investment
online experiment
optimal investment
Particle measurements
pubcrawl
risk-related behaviors
security
security measures
security mechanisms
security of data
security settings
signal detection
User behavior
biblio
User Behavior Trust Modeling in Cloud Security
Submitted by aekwall on Mon, 11/23/2020 - 11:36am
security of data
Cloud Computing
Servers
security
History
Trusted Computing
pubcrawl
Computational modeling
Mathematical model
Fuzzy logic
Cloud Security
Human Factors
User behavior
cloud service providers
trust evaluation
Human behavior
cloud computing infrastructure
could computing
fuzzy login
trust computation center
user behavior trust model based on fuzzy logic
user behavior trust modeling
user history patterns
user trust value
human trust
biblio
Privacy Is The Best Policy: A Framework for BLE Beacon Privacy Management
Submitted by grigby1 on Fri, 04/03/2020 - 12:32pm
Internet of Things
privacy
Bluetooth
pubcrawl
Human behavior
telecommunication security
data privacy
Scalability
Privacy Policy
smart phones
telecommunication computing
telecommunication network management
advertising
beacon privacy manager
BLE Beacon Privacy management
BLE Beacons
BLE signals
bluetooth low energy
bluetooth low energy beacon
policy configuration platform
Policy Management
proof-of-concept app
Receivers
trustworthy privacy management
User behavior
user experience
user-driven privacy policy configuration
Privacy Policies
biblio
Research and Analysis of User Behavior Fingerprint on Security Situational Awareness Based on DNS Log
Submitted by grigby1 on Mon, 02/17/2020 - 5:17pm
Big Data
composability
DNS
fingerprint
Metrics
pubcrawl
resilience
Resiliency
Safe Coding
situational awareness
User behavior
biblio
Dimensions of ‘Socio’ Vulnerabilities of Advanced Persistent Threats
Submitted by aekwall on Mon, 01/20/2020 - 12:04pm
invasive software
Resiliency
pubcrawl
composability
organisational aspects
Predictive Metrics
advanced persistent threats
advanced persistent threats (apt)
APT attacks
APT threats
environmental factors
inadequate cyber defenses
internetworked computer users
multistage attacks
near zero-day malware
nontechnical vulnerabilities
organizational management
socio factors
socio vulnerabilities dimension
socio-technical countermeasures
socio-technical vulnerabilities
Spear-phishing
system weaknesses
technical security
User behavior
user vulnerabilities
Zero Day Attacks and Defense
biblio
Dancing Pigs or Externalities?: Measuring the Rationality of Security Decisions
Submitted by grigby1 on Wed, 10/23/2019 - 12:35pm
Behavioral Modeling
decision science
empirical modeling
Human behavior
Human Factors
Metrics
pubcrawl
resilience
Resiliency
Scalability
security
Security Risk Estimation
User behavior
biblio
BitTrusty: A BitCoin Incentivized Peer-to-Peer File Sharing System
Submitted by grigby1 on Thu, 09/26/2019 - 10:43am
bitcoin
BitTorrent
BitTorrent platform
blockchain
collaborative distributed platform
composability
computer network security
Conferences
distributed systems
file sharing network
Free riding
free-riders
History
honest peers
Human behavior
Human Factors
incentives
Metrics
p2p
P2P cryptocurrency networks
P2P file sharing systems
P2P network
Peer-to-peer computing
peer-to-peer file
penal actions
pubcrawl
resilience
Resiliency
Secure File Sharing
Trusted Computing
User behavior
white-washers
biblio
Cloud Insider Attack Detection Using Machine Learning
Submitted by grigby1 on Mon, 06/10/2019 - 1:56pm
Anomaly Detection
anomaly node
attackers
broken node
Cloud Computing
cloud insider attack detection
cloud network
cloud security issues
cloud user
composability
compromised node
Data models
data sources
deep learning
improvised long short-term memory model
internal attacker
internal attackers compromise
learning (artificial intelligence)
Logic gates
Long short-term memory
machine learning
machine learning approaches
malicious node
misbehaving node
Monitoring
privacy
pubcrawl
resilience
Resiliency
security
security approaches
security of data
short-term behavioral data
trusted users
User behavior
valuable information
vulnerable information
vulnerable user node
biblio
Research on Way of Evaluating Cloud End User Behavior's Credibility Based on the Methodology of Multilevel Fuzzy Comprehensive Evaluation
Submitted by grigby1 on Mon, 12/03/2018 - 12:19pm
pubcrawl
indicators of user behavior credibility
Metrics
multi-level fuzzy comprehensive evaluation method
resilience
Resiliency
Scalability
User behavior
user privacy in the cloud
1
2
3
4
next ›
last »