Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
standards
biblio
Epsilon Voting: Mechanism Design for Parameter Selection in Differential Privacy
Submitted by aekwall on Mon, 09/28/2020 - 11:55am
differential privacy
Computing Theory and Privacy
user preferences
parameter epsilon
mechanism design
epsilon voting
differentially private system
parameter selection
Aggregates
Statistics
Scalability
game theory
Companies
standards
Computational modeling
privacy
pubcrawl
Human behavior
Resiliency
data privacy
biblio
Towards Bridging the Gap between Modern and Legacy Automotive ECUs: A Software-Based Security Framework for Legacy ECUs
Submitted by aekwall on Mon, 09/28/2020 - 11:34am
microcontrollers
software-based virtualization
software-based security framework
secure software updates
pure software-based approaches
modern automotive architectures
legacy automotive ECUs
insecure legacy ECUs
hardware-based security modules
electronic engineering computing
diagnostics security services
automotive electronics
Automotive engineering
Automated Secure Software Engineering
Cyber Attacks
standards
composability
pubcrawl
Resiliency
computer architecture
embedded systems
Software
security of data
cyberattack
biblio
Cyber Security Strategy for Nuclear Power Plant through Vital Digital Assets
Submitted by aekwall on Mon, 09/14/2020 - 12:33pm
cyber attack
Vital digital asset
total digital assets
Security Control
nuclear power stations
nuclear power plants
nuclear power plant Instrumentation
nuclear power plant
nuclear engineering computing
Inductors
emergency preparedness functions
digital systems
cyber security strategy
critical digital assets
Safety
computational intelligence
power generation reliability
Compositionality
power generation
computer security
cyber-attacks
standards
Accidents
composability
pubcrawl
Cryptography
security of data
biblio
SHIELDNET: An Adaptive Detection Mechanism against Vehicular Botnets in VANETs
Submitted by grigby1 on Fri, 09/11/2020 - 12:08pm
road safety
vehicular bots
vehicular botnets
vehicular botnet communication
vehicular botnet attacks
VANET Security
SHIELDNET
Reputation-Based Security
Internet botnets
inter-vehicular communications
efficiency 77.0 percent
adaptive detection mechanism
collision avoidance
botnet
Intrusion Detection
learning (artificial intelligence)
Compositionality
Metrics
vehicular ad hoc networks
botnets
invasive software
standards
Protocols
internet
computer network security
Resiliency
pubcrawl
machine learning algorithms
machine learning
biblio
Analyzing the Security of Bluetooth Low Energy
Submitted by grigby1 on Fri, 09/04/2020 - 4:26pm
IoT
bluetooth security
Cyber Physical System
Ubertooth
malicious actors
bluetooth low energy
BLE devices
Bluetooth
Internet of Things devices
security standards
cyber physical systems
Software
sensitive information
encryption
Human behavior
resilience
Resiliency
composability
pubcrawl
standards
Hardware
Protocols
security of data
security
Internet of Things
biblio
Generic Approach to Outsource the Decryption of Attribute-Based Encryption in Cloud Computing
Submitted by grigby1 on Fri, 09/04/2020 - 4:16pm
resilience
modified decryption outsourcing mode
OD-ABE scheme
outsourced decryption
outsourcing
private key cryptography
pubcrawl
public key cryptography
public transformation key
Metrics
Resiliency
security model
selective security model
shorter bit length
standards
underlying ABE scheme
underlying standard ABE
ABE ciphertext
generic construction
generic approach
faster decryption time
encryption
efficient transformation key generation algorithm
concrete constructions
composability
Cloud Computing
black-box way
black box encryption
authorisation
attribute-based encryption
adaptive security
Adaptation models
ABE outsourcing schemes
biblio
A Big Data Storage Scheme Based on Distributed Storage Locations and Multiple Authorizations
Submitted by grigby1 on Fri, 08/28/2020 - 3:33pm
Metrics
storage management
standards
Shamir secret sharing algorithm
security property
security
secured distributed Big Data
secure hash algorithm
Scalability
retrieving phase
Resiliency
resilience
pubcrawl
authenticity properties
encryption
dividing phase
distribution phase
distributed storage locations
Distributed databases
Cryptography
cloud location
Cloud Computing
Big Data storage scheme
big data security in the cloud
Big Data
authorizations
biblio
AIS Transmission Data Quality: Identification of Attack Vectors
Submitted by grigby1 on Fri, 08/28/2020 - 12:02pm
security
obstacle avoidance
potential attack vectors
Protocols
pubcrawl
Receivers
resilience
Resiliency
Scalability
maritime sector
security of data
Signal resolution
standards
state agencies
timing
transmission data quality
Vectors
AIS
marine navigation
marine communication
legislation
Human behavior
governments
Europe
data quality
conceptual countermeasures
collision avoidance
Coast Guard
automatic identification system
Attack vectors
Artificial Intelligence
AIS networks
AIS data
biblio
Commercial Security Scanning: Point-on-Sale (POS) Vulnerability and Mitigation Techniques
Submitted by aekwall on Mon, 08/24/2020 - 12:46pm
PCI DSS
commercial security scanning
confidential customer payment information
expense management
labor reporting
mitigation techniques
on-premise POS
Payment Card Industry Data Security Standard
Payment Card Industry Data Security Standard (PCI DSS)
cloud-bases POS
penetration attacks
Point of Sale (POS)
point-on-sale vulnerability
POS system
price adjustment
Sale systems
Autonomic Security
testing
Servers
security
Resiliency
pubcrawl
composability
standards
Cybersecurity
Business
security of data
cyber-attacks
Industries
security measures
wireless networks
financial data processing
Human Errors
cash flow
biblio
Automated Synthesis of Differential Power Attack Resistant Integrated Circuits
Submitted by aekwall on Mon, 08/24/2020 - 12:41pm
Dynamic Differential Logic
cryptographic processors
cryptographic systems
differential circuit design
differential logic
Differential Power Analysis
differential power analysis attacks
differential power attack resistant integrated circuits
DPA attack resistance
DPA resistant cell designs
combinational cells
fully automated synthesis system DPA resistant integrated circuits
MDPL
multiplying circuits
RT level Verilog specifications
secret key information
Secure Differential Multiplexer Logic
sequential cells
sequential circuits
power consumption
Resiliency
pubcrawl
composability
Cryptography
standards
tools
Libraries
Automated Response Actions
Logic gates
private key cryptography
Power demand
logic design
Hardware Security
Resistance
combinational circuits
Automated Synthesis
CMOS logic circuits
CMOS synthesis
« first
‹ previous
…
11
12
13
14
15
16
17
18
19
…
next ›
last »