Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
standards
biblio
Continuous Compliance
Submitted by aekwall on Mon, 03/22/2021 - 1:08pm
continuous compliance process
Open Source Software
Manuals
key length
SoC
PCI DSS
auditing source code
cloud data stores
compliance certificate
encryption audits
cryptographically unsafe algorithms
FedRAMP
Hard-coded credentials
large cloud-services company
lightweight verification tools
open-source software
pluggable type systems
source-code compliance requirement
Production
Cryptography
Data Security
data privacy
Resiliency
pubcrawl
Compliance
standards
tools
Cloud Computing
Industries
software engineering
public domain software
encryption
program diagnostics
program verification
Predictive Metrics
Compositionality
biblio
Research on Sensitivity Audit Scheme of Encrypted Data in Power Business
Submitted by aekwall on Mon, 03/22/2021 - 1:05pm
Predictive Metrics
informatization construction
known plaintext attacks
plaintext attacks
power business data sensitivity
power engineering computing
Power industry
power production
power system economics
power system security
Frequency measurement
pubcrawl
security demonstration
sensitive data audit
Sensitivity
sensitivity audit scheme
Standard Network Data Security System
standards
transparent encryption
Weight measurement
Data protection
Scalability
Resiliency
Human behavior
Business
ciphertext data
Compositionality
Cryptography
data information
Data models
Security Audits
data resource
Data Security
data security protection
data storage
decryption key
Electricity supply industry
encrypted data
encryption
encryption audits
biblio
An Optimization Approach to Graph Partitioning for Detecting Persistent Attacks in Enterprise Networks
Submitted by grigby1 on Wed, 03/17/2021 - 12:44pm
attack graphs
Chained Attacks
underlying attack
smaller incidents
skilled adversaries
security-context
security-aware partitions
Persistent attacks
optimization approach
multistep attacks
kill chain progression
graph partitioning
false-positives
enterprise networks
actual attack plan
advanced persistent threats
security of data
Linear programming
security perspective
graph theory
detection algorithms
standards
Topology
Scalability
Correlation
optimization
computer network security
Resiliency
resilience
pubcrawl
security
biblio
Individualization of Anonymous Identities Using Artificial Intelligence (AI)
Submitted by aekwall on Tue, 03/09/2021 - 11:57am
data privacy
unique identity
stereo image processing
standards
specific personal characteristics
Scalability
Resiliency
Reliability
Regulation
pubcrawl
Metrics
individualization
identity anonymization
Human-computer interaction
human body measures
Fingerprint recognition
biometric encryption
Cryptography
COVID-19
computer vision
communication
but still anonymous
blockchain
biometrics (access control)
biometric identity
biometric footprint
authorisation
Artificial Intelligence (AI)
Artificial Intelligence
anonymous identity
anonymous identities
additional personal information being
biblio
Automating the BGE Attack on White-Box Implementations of AES with External Encodings
Submitted by grigby1 on Thu, 03/04/2021 - 2:34pm
reverse engineering
white-box cryptography
White Box Security
white box cryptography
white box
test equipment
standards
Software systems
security
secure software
Automated Secure Software Engineering
Resiliency
resilience
pubcrawl
Metrics
Manuals
encoding
Consumer electronics
composability
biblio
HAC-T and Fast Search for Similarity in Security
Submitted by aekwall on Mon, 02/22/2021 - 1:43pm
nearest neighbor search
Trend Locality Sensitive Hashing (TLSH)
tree-based index
tools
threshold based hierarchical agglomerative clustering algorithm
standards
similarity digests
security operations center operators
security of data
security analysts
security
search problems
pubcrawl
Predictive Metrics
nearest neighbour methods
Approximate Nearest Neighbour
Measurement
malware
Indexes
Hierarchical Agglomerative Clustering (HAC)
HAC-T
Fuzzy Hashing
fast nearest neighbor search techniques
Cryptography
computer viruses
clustering technique
Clustering algorithms
clustering
cluster quality
cluster malware
biblio
NDNconf: Network Management Framework for Named Data Networking
Submitted by aekwall on Mon, 02/22/2021 - 1:35pm
electronic data interchange
unified configuration
structured naming
stateful data retrieval
standard Interest-Data exchanges
secured NDN data
networking architectures
network management framework
network devices
NDNconf framework
native data-centric NDN mechanisms
name-based interest forwarding
data-centric security model
configuration data models
application layers
in-network caching
computer network security
network components
named data networking
complex networks
internet
standards
pubcrawl
Human behavior
Resiliency
Data models
computer network management
Protocols
security
Servers
Scalability
biblio
Multi-direction Edge Detection Operator
Submitted by grigby1 on Mon, 02/08/2021 - 2:02pm
noise rejection ability
wavelet transforms
Transforms
the shear transformation
standards
single-pixel edge images
shear transformation
Sensitivity
security
Scalability
Resiliency
resilience
pubcrawl
noisy images
composability
Noise measurement
multidirection edge detection operator
multi-direction edge detection operator
Metrics
mathematical operators
matched edges
Image edge detection
image denoising
false edges
edge extraction
edge detection
convolution
Computed tomography
biblio
Design and Implementation of DNA Based Cryptographic Algorithm
Submitted by aekwall on Mon, 02/08/2021 - 1:50pm
S-box
pipeline processing
half cryptographic framework
DNA based S-box
DNA based cryptographic algorithm
current security
Circuits and systems
Artix-7 device
AES-Algorithm
biocomputing
DNA cryptography
security
cryptographic algorithm
Predictive Metrics
DNA
privacy
standards
pubcrawl
Human behavior
Resiliency
encryption
Cryptography
biblio
Hitting the Road: Exploring Human-Robot Trust for Self-Driving Vehicles
Submitted by grigby1 on Wed, 02/03/2021 - 1:42pm
Robot Trust
mobile robots
pubcrawl
resilience
Resiliency
road
road safety
road vehicles
Roads
Intelligent Transportation Systems
Safety
self-driving vehicles
simulated driving
standards
Traffic flow
trust scale
trust scale validation
vehicular safety
exploring human-robot trust
automation
automobiles
Autonomous automobiles
autonomous vehicles
cars
driving domain
expanded model
exploratory factor analysis
automated vehicles
Fires
general trust theory support
Human behavior
human computer interaction
Human Factors
Human-automation interaction
human-robot interaction
human-robot interaction trust
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »