Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
standards
biblio
True2F: Backdoor-Resistant Authentication Tokens
Submitted by aekwall on Mon, 03/02/2020 - 12:27pm
Browsers
two-party protocols
token faults
software compromise
second-factor authentication
privacy defenses
Phishing
embedded-systems
ECDSA signatures
cross-origin token-fingerprinting attacks
conventional authentication tokens
commodity hardware tokens
Backdoors
backdoor-resistant authentication tokens
two factor authentication
cryptographic keys
security
Human Factors
public key cryptography
Public key
digital signatures
authentication
privacy
web services
Computer crime
standards
pubcrawl
Protocols
Cryptographic Protocols
Hardware
data privacy
authorisation
biblio
Optimal Cache Placement and Migration for Improving the Performance of Virtualized SAND
Submitted by grigby1 on Tue, 02/18/2020 - 11:55am
software controlled virtualized DASH environments
resilience
Resiliency
SAND
SAND architecture
Scalability
SDN
SDN controller
Servers
Software
software controlled virtualized approaches
quality of experience
standards
Streaming media
video streaming
virtualisation
virtualized caches
virtualized DANEs
virtualized SAND deployments
Web Caching
web-caches
end-users
adaptive video techniques
Bandwidth
cache location algorithm
cache migration algorithm
cache storage
DANE
DASH
DASH Aware Network Elements
dominant Internet applications
pubcrawl
good foundation
high QoE
HTTP
hypermedia
internet
Metrics
MPEG standard
optimal cache placement
optimal locations
biblio
Self-Encrypting Deception: Weaknesses in the Encryption of Solid State Drives
Submitted by grigby1 on Mon, 02/17/2020 - 5:07pm
microsoft windows
vulnerabilities
standards
SSD
solid state drives
Software
security weaknesses
security guarantees
reverse engineering
Resiliency
resilience
pubcrawl
policy-based governance
peripheral interfaces
password
bitlocker
Metrics
internal models
Human behavior
hardware-encryption
hardware full-disk encryption
Hardware
flash memories
firmware
external models
encryption software
encryption
Data protection
Cryptography
critical security weaknesses
biblio
An Extensive Formal Security Analysis of the OpenID Financial-Grade API
Submitted by grigby1 on Mon, 02/17/2020 - 5:07pm
Security-Protocols
OpenID Financial-grade API
OpenID Foundation
OpenID-Connect
policy-based governance
pubcrawl
resilience
Resiliency
security weaknesses
Open-banking-API
Servers
Single-Sign-On
standards
Web Infrastructure Model
web services
web-based APIs
web-based environment
web-security
formal security analysis
application program interfaces
authentication
authorisation
authorization
bank data processing
Banking
FAPI
Financial-grade-API
Analytical models
Formal-Analysis
Human behavior
Metrics
OAuth
OAuth 2.0 design
Open Banking APIs
Open Banking security profile
biblio
Security-Related Stress: A Perspective on Information Security Risk Management
Submitted by aekwall on Mon, 02/17/2020 - 2:28pm
information security
stress inhibitors
security-related stress
security-novice practitioners
novices
ISRM tools
Information Security Risk Management
Security Risk Management
Management
security standards
security of data
Stress
risk management
tools
standards
Compliance
Metrics
pubcrawl
Resiliency
Scalability
biblio
Cybersecurity concerns on real time monitoring in electrical transmission and distribution systems (SMART GRIDS)
Submitted by aekwall on Mon, 02/17/2020 - 2:17pm
Smart Grids
virtual world
uniform legal system
transmission and distribution systems
national borders
Information Technology Introduction
energy delivery system
electrical transmission
distribution systems
cybersecurity concerns
Communications
common perception
privacy issues
information technology
power system security
security
power engineering computing
smart grid security
smart power grids
standards
Metrics
privacy
pubcrawl
Resiliency
Software
data privacy
Scalability
Computer crime
security of data
biblio
Enabling Security-by-Design in Smart Grids: An Architecture-Based Approach
Submitted by aekwall on Mon, 02/17/2020 - 2:16pm
security goals
power engineering computing
power system security
privacy
pubcrawl
RAMI 4.0
Reference Model of I Information Assurance and Security
risk analysis
RMIAS
Scalability
Metrics
security of data
security-by-design
Smart Grid evolution
smart grid security
Smart Grids
smart power grids
sophisticated engineering practices
standards
surplus energy
distributed energy resources
Resiliency
adequate security countermeasures
architecture
architecture-based approach
computer architecture
computer security
control infrastructure
critical infrastructure
critical infrastructures
Resilient Security Architectures
distributed power generation
distributed system
distribution system operators
Energy Distribution Grids
Enterprise Architecture
Europe
grid gatekeepers
methodology
biblio
Heterogenic Multi-Core System on Chip for Virtual Based Security
Submitted by aekwall on Mon, 02/10/2020 - 11:58am
multiprocessing systems
multicore computing security
virtual-based security
the GOST
standard symmetric key block cipher
neuromatrix
neural network emulation
heterogenic multicore system on chip
heterogenic multi-core system-on-chip
GOST
coding information
Cipher
virtual reality
AES
signal processing
DES
Scalability
Image Processing
assembly language
Computers
microsoft windows
Decoding
neural nets
standards
Metrics
pubcrawl
Resiliency
Kernel
system-on-chip
Hardware
encryption
Cryptography
biblio
A Comparative Analysis of Static Code Analysis Tools That Check Java Code Adherence to Java Coding Standards
Submitted by grigby1 on Mon, 02/10/2020 - 11:34am
Java programming language
testing
style
static code analysis tool
static code analysis
static analysis
standards
software quality
software maintenance
software development
Resiliency
resilience
quality
pubcrawl
program diagnostics
JPL Coding Standards
Concurrency
Java Coding Standards Enforcing Tools
Java code analysis
Java code adherence
Java
International Java Coding Standards
Human behavior
exceptions
critical system
concurrency (computers)
composability
Comparative Analysis
Coding Standard Analyzers
analyzers
security
biblio
Tracking Sensitive Information and Operations in Integrated Clinical Environment
Submitted by aekwall on Mon, 01/27/2020 - 10:28am
integrated Clinical Environment
sensitive information
complex ICE systems
data flow
data flow analysis framework
device interoperability
dynamic analysis
high-level supervisory apps
Ice
sensitive data
low-level communication middleware
medical cyber physical system
medical cyber-physical systems
medical devices
Publishing
sensitive operations
standardized framework
security
open systems
static analysis
medical information systems
middleware
interoperability
taint analysis
privacy
data flow analysis
standards
Metrics
composability
pubcrawl
performance evaluation
data privacy
security of data
« first
‹ previous
…
15
16
17
18
19
20
21
22
23
…
next ›
last »