Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
digital signatures
biblio
A Hybrid Solution for Confidential Data Transfer Using PKI, Modified AES Algorithm and Image as a Secret Key
Submitted by aekwall on Mon, 01/25/2021 - 12:58pm
PKI
symmetric encryption technologies
secure transfer
modified AES algorithm
key generation server
insecure network
confidential information trading
confidential information leakage
confidential data transfer
asymmetric encryption technologies
Asymmetric Encryption
online services
modified AES
sensitive information
digital signatures
Servers
cyber threats
public key cryptography
Public key
internet
Metrics
composability
pubcrawl
Human behavior
Resiliency
data encryption
data integrity
Receivers
hybrid encryption
encryption
biblio
Potential Barriers to Music Fingerprinting Algorithms in the Presence of Background Noise
Submitted by grigby1 on Wed, 01/20/2021 - 4:07pm
iKala dataset
song identification
signal classification
Shazam
Resiliency
resilience
pubcrawl
MusicBrainz dataset
music fingerprinting algorithms
music fingerprint classification
music
MIR-1K dataset
MFP
learning (artificial intelligence)
Image Processing
acoustic feature modeling
Human behavior
Hashing curve detection
digital signatures
digital signature
deep learning techniques
condensed signature
composability
classification
audio signal processing
audio signal
audio sample identification
Acoustic signal processing
Acoustic Fingerprints
Acoustic Fingerprint
biblio
New Secret Key Management Technology for Blockchains from Biometrics Fuzzy Signature
Submitted by aekwall on Mon, 01/18/2021 - 11:25am
Cryptography
user authentication
Servers
security
secret key management technology
secret key management issues
Secret key management
public key cryptography
pubcrawl
key management devices
Fuzzy signature
fuzzy set theory
Fuzzy Cryptography
digital signatures
decentralized payments
key management
blockchain technology
blockchain system
biometrics-based digital signature scheme
biometrics fuzzy signature
Biometrics authentification
biometrics (access control)
biometric information
authorisation
authentication
Human behavior
Metrics
Resiliency
Scalability
biblio
Head(er)Hunter: Fast Intrusion Detection using Packet Metadata Signatures
Submitted by aekwall on Mon, 01/11/2021 - 1:35pm
fast intrusion detection
Internet traffic
prevention systems
deep packet inspection
current network encryption trends
DPI implementations
DPI tools
encrypted network traffic
encryption protocols
Payloads
fast signature-based intrusion detection system
network packet metadata
network speeds
network traffic inspection
packet contents
packet headers
packet metadata signatures
packet payload content
internet
Scalability
telecommunication traffic
Cryptographic Protocols
Protocols
Resiliency
pubcrawl
Cryptography
malicious activities
computer network security
Internet users
metadata
pattern matching
Intrusion Detection
digital signatures
packet forwarding
Engines
biblio
Efficient Keyword Matching for Deep Packet Inspection based Network Traffic Classification
Submitted by aekwall on Mon, 01/11/2021 - 1:34pm
telecommunication network management
traffic classification techniques
subsequent signature matching
string matching
State Transition Machine
potential application signature
Network traffic classification
good classification accuracy
flow payloads
efficient keyword matching
dpi
deep packet inspection based network traffic classification
deep packet inspection
application signatures
network flows
Inspection
network management
Payloads
security monitoring
Complexity theory
quality of service
digital signatures
pattern matching
testing
pattern classification
pubcrawl
Resiliency
Protocols
telecommunication traffic
Scalability
biblio
Evaluating Bad Hosts Using Adaptive Blacklist Filter
Submitted by grigby1 on Mon, 12/28/2020 - 12:47pm
incident evaluation
unreliable alerts
telecommunication traffic
Scalability
Resiliency
resilience
publicly available blacklists
pubcrawl
network flow data
national backbone network
Metrics
internet
adaptive blacklist filter
flow-based monitoring
false positives
evidence capture
evaluator module
digital signatures
computer network security
blacklists
bad hosts
automated evaluation techniques
adaptive filters
adaptive filtering
biblio
Mediating Data Trustworthiness by Using Trusted Hardware between IoT Devices and Blockchain
Submitted by aekwall on Mon, 12/21/2020 - 1:36pm
Data Transmission
trusted hardware
physically unclonable function
data analysis methods
blockchain ledger
authenticated encryption method
AI technology
data trustworthiness
Trusted Execution Environment
artificial intelligence technology
TEE
IoT device
digital signatures
Artificial Intelligence
smart cities
IoT
Relays
trustworthiness
secure protocol
data analysis
blockchain
composability
pubcrawl
Trusted Computing
Protocols
Cryptographic Protocols
Internet of Things
encryption
Servers
computer network security
biblio
Using Format Migration and Preservation Metadata to Support Digital Preservation of Scientific Data
Submitted by grigby1 on Fri, 12/11/2020 - 2:59pm
metadata
valuable scientific data
Systems architecture
system architecture
Software Architecture
Software
scientific information systems
Scalability
Resiliency
resilience
pubcrawl
preservation metadata
PREMIS
object transformation
Metadata Discovery Problem
Chemicals
meta data
mapping rules
Grammar
format verification
format migration
e-science
digital signatures
digital signature
digital preservation
data intensive scientific discovery
data integrity
data fixity
data authenticity
Compositionality
biblio
A Symbolic Analysis of ECC-Based Direct Anonymous Attestation
Submitted by aekwall on Mon, 12/07/2020 - 12:25pm
symbol manipulation
Predictive Metrics
privacy
pubcrawl
public key cryptography
Resiliency
Scalability
secrecy
secrecy properties
neural style transfer
symbolic analysis
symbolic verification
Tamarin modelling
Tamarin prover
tpm
Trusted Computing
trusted platform module TPM-backed anonymous credentials
trusted platform modules
ECC-based version
authentication
composability
Cryptographic Protocols
cryptographic scheme
cyber-physical system security
digital signatures
direct anonymous attestation
ECC-based direct anonymous attestation
Analytical models
ECC-DAA
expected authentication
formal analysis
formal verification
IEC standards
ISO standards
mechanised analysis
biblio
Physical Unclonable Functions (PUFs) Entangled Trusted Computing Base
Submitted by aekwall on Mon, 12/07/2020 - 12:23pm
Predictive Metrics
trusted platform modules
trusted computing base
Trusted Computing
SW-PUF measurements
software measurement physical unclonable function
Software measurement
software instruction
Software
Semiconductor device measurement
Scalability
Resiliency
Reliability
pubcrawl
program execution
processor chip ALU silicon biometrics
Clocks
Pollution measurement
physical unclonable functions
particular program instruction
neural style transfer
microprocessor chips
logic design
logic circuits
field programmable gate arrays
digital signatures
delays
data-dependent delay
cyber-physical system security
copy protection
composability
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »