Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Analytical models
biblio
A Review of Mobile Forensic Investigation Process Models
Submitted by grigby1 on Thu, 04/08/2021 - 4:11pm
information forensics
reviews
redundant investigation processes
mobile-based services
mobile scenarios
mobile forensics field
mobile forensics
mobile forensic tools
mobile forensic investigation process models
MFIPMs
MF transitions
MF field
forensic practitioners
investigation process model
tools
mobile devices
Unified modeling language
smart phones
mobile computing
Scalability
Analytical models
Resiliency
resilience
Metrics
Human behavior
pubcrawl
Digital Forensics
biblio
Relating the Empirical Foundations of Attack Generation and Vulnerability Discovery
Submitted by aekwall on Thu, 04/08/2021 - 3:34pm
Payloads
vulnerability discovery
information foraging
automatic exploit generation
automatic attack generation
antivirus tool
Information Reuse and Security
security testing
security auditing
Trojan detection
Compositionality
anti-virus
security
computer viruses
Trojan horses
Data mining
Analytical models
program testing
tools
software security
pubcrawl
Resiliency
Data models
malware detection
biblio
Analysis of Content Availability at Network Failure in Information-Centric Networking
Submitted by aekwall on Thu, 04/08/2021 - 3:28pm
computer network reliability
random node removal
nodes reachability
node removal
network robustness
network failure
information-centric net-working (ICN)
host-centric networks
contents server
content availability
cluster-based node removal
caching contents
average content availability
cache storage
Scalability
Information Centric Networks
information-centric networking
telecommunication network topology
Measurement
Routing protocols
network topology
Mathematical model
Analytical models
internet
Robustness
pubcrawl
Resiliency
biblio
Trust Management in Social Internet of Things: Architectures, Recent Advancements and Future Challenges
Submitted by grigby1 on Tue, 03/30/2021 - 11:05am
Analytical models
Challenges.
Cybersecurity
Human behavior
Human Factors
Internet of Things
pubcrawl
Scalability
search problems
security
Social Internet of Things
social networking (online)
Social Objects
Social Relationships
Trust management
vehicle dynamics
biblio
Governing Principles of Self-Sovereign Identity Applied to Blockchain Enabled Privacy Preserving Identity Management Systems
Submitted by grigby1 on Mon, 03/29/2021 - 1:22pm
IdM
uPort
SSI ecosystem
SSI
Sovrin
Self-Sovereign Identity
Scalability
Resiliency
resilience
Reliability
pubcrawl
privacy
Principles of SSI
numerous governing principles
IDM systems
IDM system
Analytical models
identity management system
Identity management
Human behavior
federated identity management
Ecosystems
distributed ledger
digital transformation
digital services
Digital identity
digital form
data privacy
Cryptography
blockchain enabled privacy preserving identity management systems
blockchain
authorisation
biblio
A Study of Evaluation Methods of WEB Security Threats Based on Multi-stage Attack
Submitted by grigby1 on Wed, 03/17/2021 - 11:43am
Formal Specification
Chained Attacks
Web security threats
Web application services
security vulnerability model
security specification
Security Evaluation
multistage attack
Measures
Kill Chain
Classified protection
Reconnaissance
Internet services
tools
web services
internet
Data models
Scalability
Analytical models
Resiliency
resilience
pubcrawl
Servers
security
security of data
biblio
Data-driven fault model development for superconducting logic
Submitted by grigby1 on Tue, 03/16/2021 - 1:10pm
Analytical models
Circuit faults
clean slate
collaboration
fault diagnosis
Human behavior
Integrated circuit modeling
Manuals
Metrics
policy-based approach
pubcrawl
resilience
Resiliency
Semiconductor device modeling
simulation
biblio
Modeling the Impact of Network Connectivity on Consensus Security of Proof-of-Work Blockchain
Submitted by grigby1 on Tue, 03/09/2021 - 1:50pm
proof-of-work blockchain
honest-majority
Human behavior
modeling analysis
network connectivity
network modeling
node behavior
Peer-to-peer computing
PoW blockchain
Probabilistic logic
honest-but-potentially-colluding
Protocols
pubcrawl
Scalability
security
security impact
security of data
Security Properties
telecommunication security
consensus voting power
Analytical models
bitcoin
blockchain
blockchain forks
blockchain system
central trusted authority
consensus protocol
consensus security
analytical model
Cryptographic Protocols
Cryptography
Data mining
design system
different adversary models
distributed consensus system
electronic money
financial data processing
biblio
Botnet Defense System and Its Basic Strategy Against Malicious Botnet
Submitted by grigby1 on Tue, 03/09/2021 - 1:22pm
malicious botnet detection
white-hat worms
white-hat botnets
software agents
Servers
sensors
Resiliency
resilience
pubcrawl
Petri nets
Monitoring
Metrics
agent oriented Petri nets
IoT systems
invasive software
Internet of Things
Grippers
cybersecurity system
composability
botnets
botnet defense system
botnet
Analytical models
biblio
Introducing Code Assets of a New White-Box Security Modeling Language
Submitted by grigby1 on Thu, 03/04/2021 - 1:35pm
Metrics
white-box security modeling language
White-box security
WB security analysis
testing
specification languages
source code (software)
software protection technologies
software protection solutions
Software
Security modeling language
reverse engineer
Resiliency
resilience
pubcrawl
White Box Security
i-WBS
Data protection
Conferences
Computer crime
Computational modeling
composability
code security
code assets
Binary codes
binary code
attacker
Analytical models
security
white box
« first
‹ previous
…
20
21
22
23
24
25
26
27
28
…
next ›
last »