Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
digital signatures
biblio
Post quantum hash based digital signatures comparative analysis. Features of their implementation and using in public key infrastructure
Submitted by grigby1 on Fri, 09/28/2018 - 3:12pm
Public key
XMSS algorithm implementation
XMSS algorithm
Ukrainian hash function national standard
Telecommunications
system analysis and design
SPHINCS algorithm
Scalability
resilience
Quantum-safe digital signatures
public key infrastructure
public key cryptography
computer science
pubcrawl
post quantum hash based digital signatures
post quantum cryptography
perspective digital signatures algorithms
Merkle algorithm
Leighton-Micali algorithm
hash functions analysis
Hash based digital signatures
digital signatures
cybernetics
biblio
Deep packet inspection Management application in SDN
Submitted by grigby1 on Wed, 09/12/2018 - 11:24am
resilience
JSON-Java Script Object Notation
nonrelational data base
north-bound application
Open vSwitch-Open Virtual Switch
pubcrawl
QoS-Quality of Service
quality of service
real-time systems
JSON format
Resiliency
Scalability
SDN architecture
SDN-Software Defined Networking
SNMP trap notifications
software defined networking
Switches
application signature data analysis
Inspection
flow provisioning behavior
Engines
DPI-Deep Packet Inspection
DPI management application
digital signatures
deep packet inspection management
deep packet inspection
Databases
data representation
data flows
data analytic engine
data analysis
computer network security
application threshold
biblio
Efficient tamper-evident logging of distributed systems via concurrent authenticated tree
Submitted by grigby1 on Thu, 08/23/2018 - 11:57am
Merkle history tree
Chameleon hash
chameleon hashing
concurrent authenticated tree
Concurrent Authentication
concurrent large-scale log streams
cryptographic hashing
discrete log
highly concurrent scale log streams
large-scale distributed applications
large-scale distributed systems
log data
log management tools
logarithmic number
Cats
Merkle-tree approach
providing security
public verifiability
resource-constrained systems
secure audit logging schemes
Secure logging
secure logging system
security community
space-efficiency
tamper-evident logging
tree data structures
untrusted machine
History
Concurrency
cyber-physical systems
pubcrawl
composability
Cryptography
system monitoring
distributed processing
Servers
authentication
Analytical models
tools
data structure
data structures
security
resilience
data integrity
Metrics
program verification
Resiliency
forward security
integrity verification
digital signatures
distributed system
integrity
concurrency control
audit logs
biblio
Attribute-based Concurrent Signatures
Submitted by grigby1 on Thu, 08/23/2018 - 11:56am
digital signatures
composability
Concurrency
concurrent signatures
cyber-physical systems
fair exchange
Metrics
network security
pubcrawl
resilience
Resiliency
security
biblio
Multi-level Anomaly Detection in Industrial Control Systems via Package Signatures and LSTM Networks
Submitted by grigby1 on Wed, 07/18/2018 - 10:05am
resilience
multilevel anomaly detection method
network package content analysis
package content level anomaly detection
package signatures
package traffic
pattern classification
production engineering computing
Protocols
pubcrawl
recurrent neural nets
LSTM networks
Resiliency
SCADA systems
Scalability
signature database
software packages
stacked long short term memory network-based softmax classifier
time series
time-series anomaly detection
time-series structure
field devices
baseline signature database
Bloom filter
Bloom filters
communication patterns
control engineering computing
data structures
database management systems
Databases
Detectors
digital signatures
Anomaly Detection
gas pipeline SCADA system
ICS Anomaly Detection
ICS networks
industrial control
Industrial Control Systems
integrated circuits
Intrusion Detection
learning (artificial intelligence)
long short term memory networks
biblio
Group signature based privacy protection algorithm for mobile ad hoc network
Submitted by grigby1 on Wed, 06/20/2018 - 12:27pm
mobile computing
vehicular ad hoc networks
vehicular ad hoc network
Time delay
signature length
short group signature
Resiliency
resilience
pubcrawl
privacy protection issues
privacy protection
privacy
Packet loss rate
network model
anonymous verification
mobile ad hoc network
Metrics
message verification
MANET
group signature based privacy protection algorithm
digital signatures
Data protection
Compositionality
BBS algorithm
Batch verification
automobiles
authentication
biblio
Data management and searching system and method to provide increased security for IoT platform
Submitted by grigby1 on Mon, 06/11/2018 - 3:37pm
Peer-to-peer computing
telecommunication security
simulation
signature
Servers
Security Properties
searching system
Scalability
Resiliency
resilience
Public key
pubcrawl
Proof-of-work
Ports (Computers)
blockchain
Named Data Network Security
IP networks
Internet of Things
Human behavior
Hash Function
file organisation
digital signatures
Databases
data management system
data management
data integrity
Cryptography
biblio
CAre: Certificate Authority Rescue Engine for Proactive Security
Submitted by grigby1 on Thu, 06/07/2018 - 3:14pm
online front-ends
Web site security
Web servers
web security
SSL Trust Models
SSL technology
Scalability
Resiliency
resilience
public key infrastructure
public key cryptography
Public key
pubcrawl
proactive security
Browsers
Metrics
internet
Human behavior
encryption
digital signatures
Data Security
Cryptography
certification
Certificate Authority Rescue Engine
certificate authority
certificate authorities
centralized system
CAre
biblio
Detecting Periodic Subsequences in Cyber Security Data
Submitted by grigby1 on Wed, 05/30/2018 - 4:05pm
identifyingautomated network events
traditional signature-based detection systems
statistical analysis
signature based defense
Scalability
Resiliency
resilience
pubcrawl
probability models
probability
maximum likelihood estimation
Los Alamos National Laboratory's enterprise computer network
invasive software
Anomaly Detection
digital signatures
data sets
Data models
cyber-security defence
cyber security data
computer networks
computer network security
computer network behaviour
Computational modeling
changepoint detection framework
automated network events
authentication
biblio
Enhancing Anonymity of Bitcoin Based on Ring Signature Algorithm
Submitted by grigby1 on Wed, 05/30/2018 - 4:04pm
input addresses
signature based defense
Servers
Scalability
ring signature algorithm
ring signature
Resiliency
resilience
Public key
pubcrawl
Protocols
perceived anonymity property
output addresses
mixing service provider
mixing server
anonymity
financial data processing
electronic money
double-spending attack
digital signatures
decentralized digital currency
Cryptographic Protocols
complete transaction history
coin mixing service
coin mixing scheme
coin mixing
central authority
Bitcoin users
Bitcoin protocol
bitcoin
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
…
next ›
last »