Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Computer hacking
biblio
Topic Modeling for Cyber Threat Intelligence (CTI)
Submitted by grigby1 on Fri, 04/28/2023 - 3:51pm
cyber threat intelligence
threat recommendation
Maryam
application security
electronic commerce
topic modeling
OWASP
computational intelligence
Informatics
Cryptography
natural language processing
Compositionality
composability
Computational modeling
pubcrawl
security
Computer hacking
biblio
A Study on Brute Force Attack on T-Mobile Leading to SIM-Hijacking and Identity-Theft
Submitted by grigby1 on Fri, 04/14/2023 - 4:08pm
Systems architecture
tunneling
T-Mobile
SSH tunneling
SIM Hijacking
Scanning and Enumeration
identity theft
passwords
brute force attacks
Brute force
collaboration
cyber attack
Force
Data Breach
Databases
policy-based governance
Human Factors
Human behavior
pubcrawl
Computer hacking
biblio
Investigating Novel Approaches to Defend Software Supply Chain Attacks
Submitted by grigby1 on Fri, 04/14/2023 - 4:04pm
Computer hacking
Organizations
pubcrawl
resilience
Conferences
Software
Scalability
Cybersecurity
Resistance
supply chains
software security
Chained Attacks
Resiliency
codes
software reusability
Software Supply Chain Attacks
biblio
Intrinsic Decision based Situation Reaction CAPTCHA for Better Turing Test
Submitted by grigby1 on Fri, 04/14/2023 - 3:57pm
captchas
Turing test
Reaction Test
Hard AI Problem
bots
Text recognition
game theory
web security
CAPTCHA
Computer hacking
Web servers
chatbots
Web pages
Games
composability
Computers
Human behavior
pubcrawl
biblio
A Robust Captcha Scheme for Web Security
Submitted by grigby1 on Fri, 04/14/2023 - 3:56pm
web security
Synthetic artifacts
Rotation
optical character recognition
OCR
CAPTCHA attacks
Bot
Text recognition
Web and internet services
Computer hacking
CAPTCHA
captchas
Interference
Three-dimensional displays
Streaming media
composability
Human behavior
pubcrawl
biblio
Traitor Tracing in Broadcast Encryption using Vector Keys
Submitted by aekwall on Fri, 03/31/2023 - 9:38am
Resistance
black box encryption
Traitor Tracing (TT)
Pirate decoder (PD)
Key Generation Center (KGC)
Closed box
Broadcast Encryption (BE)
BlackBox Approach
Decoding
data communication
Computational efficiency
composability
Resiliency
Metrics
pubcrawl
encryption
Computer hacking
biblio
SMS Spam Detection Using TFIDF and Voting Classifier
Submitted by grigby1 on Fri, 02/17/2023 - 5:37pm
feature extraction
spam
Feature Selection
Message service
spam detection
HAM
Mobile SMS Spam
TFIDF
Voting Classifier
Computer hacking
Hacker
machine learning
pubcrawl
Human behavior
Metrics
Scalability
Measurement
Mobile handsets
mobile computing
biblio
Comparative Study of Classification Algorithms for Website Phishing Detection on Multiple Datasets
Submitted by grigby1 on Fri, 02/03/2023 - 5:24pm
Computer hacking
information security
machine learning algorithms
Support vector machines
cyber security
Neural networks
pubcrawl
Human behavior
Artificial Intelligence
Classification algorithms
Phishing
Seminars
Phishing Detection
phishing attacks
Phishing Classification
biblio
Detect Phishing Website by Fuzzy Multi-Criteria Decision Making
Submitted by grigby1 on Fri, 02/03/2023 - 5:22pm
Computer hacking
Neural networks
pubcrawl
Human behavior
Decision Making
Phishing
Uniform resource locators
Cyberspace
Anti-phishing
Costs
Blacklist
Fuzzy MCDM
White-list
biblio
An Efficient and Secure Anonymous Authentication Scheme for V2G Networks
Submitted by grigby1 on Fri, 01/20/2023 - 3:47pm
smart grid consumer privacy
authentication
collaboration
Computer hacking
data privacy
Economics
fault tolerance
Fault tolerant systems
Policy Based Governance
privacy
pubcrawl
security
simulation
Vehicle to Grid
Vehicle-to-grid
1
2
3
4
5
6
7
8
9
next ›
last »