Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Data collection
biblio
Security Visualization and Active Querying for OT Network
Submitted by grigby1 on Mon, 01/25/2021 - 10:28am
active querying
Air gaps
air-gap
business network
comma separated value format
common event format
composability
computer network security
computer networks
cyber-attacks
Data collection
data visualisation
Data visualization
firewalls
Human behavior
Human Factors
internet
intrusion detection system
intrusion prevention system
Metrics
Monitoring
network behavior
network inclusion
network security
operational technology network
OT Network
physical objects
pubcrawl
real-time systems
resilience
Resiliency
security
Security Visualization
visualization
Workstations
biblio
Identifying, Collecting, and Monitoring Personally Identifiable Information: From the Dark Web to the Surface Web
Submitted by grigby1 on Fri, 01/15/2021 - 11:22am
dark web
Data Breach
Data collection
Human behavior
Human Factors
PII
privacy
pubcrawl
surface Web
biblio
Understanding Trust, Privacy and Financial Fears in Online Payment
Submitted by aekwall on Mon, 11/23/2020 - 10:38am
data privacy
Conferences
security
Trusted Computing
pubcrawl
privacy
Web sites
consumer behaviour
uncertainty
trust
Data collection
Human Factors
electronic money
online transactions
Decision Making
financial data processing
e-commerce
online payment
privacy loss
Human behavior
human trust
customer concerns
customer fears
customer satisfaction
financial fear perception
financial fears
financial loss
online payment decision
online purchasing environment
online seller
payment page
payment security perception
perceived payment security
purchasing
risk perception
website
biblio
Anomaly Detection Models for Smart Home Security
Submitted by aekwall on Mon, 11/23/2020 - 10:28am
computer network security
Monitoring
Scalability
Big Data
data privacy
security
smart devices
DDoS Attacks
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
Anomaly Detection
Energy Efficiency
Data collection
sensor fusion
Intelligent sensors
Smart homes
home automation
Smart Home
smart home environment
Compositionality
privacy violations
Hidden Markov models
hidden Markov model
anomalous activities
anomaly detection models
cyber threat surface
fire accidents
HMM model
multiple sensors
network level sensor data
smart home security
smart homes devices
smart security cameras
smoke sensors
unauthorized movements
Intelligent Data Security
Intelligent Data and Security
biblio
The World (of CTF) is Not Enough Data: Lessons Learned from a Cyber Deception Experiment
Submitted by aekwall on Mon, 10/12/2020 - 10:45am
capture the flag
cognition
cognitive testing
Computer bugs
Computer crime
computer security
computer-security-computer-networks-computer-hacking-cyber-defense-research-and-development-humans-testing-deception
controlled human-subject experiment
cyber deception experiment
cyber testing
Data collection
deeply rooted human component
experimental controls
future cyber operations studies
human attacker
Human behavior
Human Behavior and Cybersecurity
Human Factors
human performance
military computing
psychology
pubcrawl
red team
Task Analysis
traditional CTF events
biblio
Observation Measures to Profile User Security Behaviour
Submitted by aekwall on Mon, 10/12/2020 - 10:42am
cybersecurity threats
security of data
pubcrawl
computer security
human computer interaction
Human behavior
Behaviour Profile
behaviour profiling
computer user security
Data collection
interactive environment
Observation Measures
security behaviour profile
user modelling
User profile
user security behaviour
user-system interactions
Human Behavior and Cybersecurity
biblio
Privacy-Preserving Data Collection in Context-Aware Applications
Submitted by aekwall on Mon, 09/28/2020 - 10:54am
security of data
Scalability
data privacy
privacy concerns
game theory
Resiliency
Human behavior
pubcrawl
privacy
Data collection
Games
Numerical models
ubiquitous computing
game model
smart devices
context-aware applications
Context-aware services
context-awareness
data collection game
privacy leakage risk
privacy-preserving data collection scheme
serious privacy issues
three-antithetic-party game
user data privacy preservation
Computing Theory and Privacy
biblio
Data Collection from Privacy-Aware Users in the Presence of Social Learning
Submitted by aekwall on Mon, 09/21/2020 - 2:49pm
Scalability
data privacy
game theory
Bayes methods
Data models
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
privacy
cyber-physical systems
Data collection
Noise measurement
Silicon
cyber physical systems
Bayesian-Nash equilibrium
data collector
elicited data
friends
generalized majority voting rule
informative non-disclosive strategy
noisy group signals
payment mechanism
privacy cost
privacy-aware users
privacy-preserving data
private signal
Social groups
social learning
state estimation accuracy
symmetric randomized response strategy
Control Theory and Privacy
biblio
Securing smart grid data under key exposure and revocation in cloud computing
Submitted by grigby1 on Fri, 07/24/2020 - 11:50am
Ciphers
Cryptography
encryption
Internet of Things
authorisation
Cloud Computing
data privacy
Servers
Scalability
power engineering computing
power system security
Smart Grids
smart power grids
data owner
cloud server
pubcrawl
policy-based governance
CP-ABE
revocation
Data collection
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
advanced cipher text policy attribute
and smart grid
cloud supported IoT
encrypted key
encryption key
encryption process
enhancing system ability
key exposure
obtaining security
security requirements
smart grid data security method
smart grid systems data
smart IoT devices
system failures
transmission process
collaboration
biblio
Aggregating Crowd Wisdom via Blockchain: A Private, Correct, and Robust Realization
Submitted by grigby1 on Thu, 07/09/2020 - 12:58pm
Aggregates
blockchain
Compositionality
crowd wisdom
crowd wisdom aggregation
Crowdsensing
crowdsensing systems
Cryptography
data aggregation
Data collection
data confidentiality
data deletion
data privacy
Data Sanitization
data sensing
decentralized blockchain technology
differential privacy
Distributed databases
ethereum
faulty data providers
hardware-assisted transparent enclave
Human behavior
Human Factors
mobile client
mobile computing
privacy
pubcrawl
public blockchain
resilience
Resiliency
Scalability
Security Properties
sensor-rich mobile devices
SGX-enabled server
smart contract
smart contracts
Task Analysis
third-party platform
transparent blockchain
trusted hardware
zero-knowledge proof
1
2
3
4
5
6
next ›
last »