Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Fingerprint recognition
biblio
Cryptanalysis and improvement of a cloud based login and authentication protocol
Submitted by aekwall on Mon, 06/01/2020 - 10:04am
online banking system
impersonation attack
internet
medium scale banking organization
Metrics
Mobile banking
mobile computing
multifactor authentication
Online banking
Human Factors
pubcrawl
public cloud
resilience
Resiliency
security
Servers
small scale banking organization
authentication
Human behavior
high-speed online services
Fingerprint recognition
electronic banking
e-banking services
e-banking
Cryptographic Protocols
cryptanalysis
cloud server
Cloud Computing
cloud based login
Business
bank data processing
authorisation
authentication protocol
biblio
Multifactor Authentication on Mobile Secure Attendance System
Submitted by aekwall on Mon, 06/01/2020 - 10:02am
mobile
smartphone
smart phones
security of data
Secure Attendance
secure android ID
Resiliency
resilience
pubcrawl
Personnel
performance evaluation
multifactor authentication
Monitoring
mobile secure attendance system
Mobile handsets
mobile computing
android
Metrics
Human Factors
Human behavior
GPS
Global Positioning System
fraud
Fingerprint recognition
fingerprint
employee attendance system
employee activities
BYOD
bring your own device
authentication
attendance recording
attendance device
biblio
Quantitative Analysis of Network Address Randomization's Security Effectiveness
Submitted by grigby1 on Fri, 05/15/2020 - 10:57am
quantitative analysis
statistical analysis
static network address
security effectiveness analysis
Scalability
Resiliency
resilience
Reconnaissance
randomization space
randomization frequency
random processes
quantitative security effectiveness analysis
Analytical models
pubcrawl
Network reconnaissance
Network Address Translation
network address randomization techniques
network address randomization
moving target defensee
general attacks
Fingerprint recognition
computer network security
Complexity theory
biblio
Security Lock with Effective Verification Traits
Submitted by aekwall on Mon, 04/06/2020 - 9:05am
speech pattern recognition
multilevel security system
multiple layer security system
physical security
Raspberry Pi microcomputers
recognition
security lock
security locker solution
smart box
multi-layer
Speech recognition
TensorFlow
vein pattern recognition
vein recognition
Veins
verification traits
Viola and Jones
pattern locks
pubcrawl
Scalability
authorisation
Linux
feature extraction
learning (artificial intelligence)
machine learning
Resiliency
Human behavior
security
password
Cameras
Fingerprint recognition
face recognition
facial recognition
graphical user interfaces
interactive GUI
machine learning operations
biblio
An Advance Cryptographic Solutions in Cloud Computing Security
Submitted by grigby1 on Fri, 03/27/2020 - 10:28am
Human behavior
Virtualization
Safety
Safe Coding
Resiliency
resilience
pubcrawl
policy-based governance
Metrics
innovative safe cloud computing design
information management
identification mechanism
Human Factors
access management
Fingerprint recognition
encoding
Cryptography
computer security
collaboration
cloud computing security
Cloud Computing
Ciphers
biometrics (access control)
biometric knowledge
biometric coding
biometric
biblio
Authentication Protocols Based on One-Time Passwords
Submitted by aekwall on Mon, 03/02/2020 - 11:26am
cryptographic algorithms
reviewed protocols
Resistance
relatively old Lamport's hash-chain protocol
one-time passwords
one-time password
information technologies
e-commerce
complicated protocols
two factor authentication
two-factor authentication
Authentication Protocols
electronic commerce
Servers
protocol
Human Factors
Phishing
Fingerprint recognition
authentication
message authentication
Vulnerability
Cryptography
pubcrawl
information security
Cryptographic Protocols
biblio
Multi-Factor Authentication in Cyber Physical System: A State of Art Survey
Submitted by aekwall on Mon, 03/02/2020 - 11:25am
face recognition
two factor authentication
web authentication methods
user authentication
single-factor authentication
secure authentication
Digital Multifactor authentication
Cyber Physical System
two-factor authentication
multifactor authentication
Multi-factor authentication
Servers
Human Factors
Fingerprint recognition
sensors
password
message authentication
authentication
Cryptography
pubcrawl
cyber-physical systems
authorisation
biblio
IoT Devices Security Using RF Fingerprinting
Submitted by grigby1 on Mon, 02/17/2020 - 4:05pm
software defined radio
Radio frequency
Radio Frequency Fingerprinting
RF Fingerprinting
Scalability
scalability problems
SDR
security
security scalability
smart devices
pubcrawl
software radio
telecommunication security
Telecommunication standards
universal SDR-based inexpensive implementation
user-dedicated modes
Wireless communication
wireless RFF
wireless security authentication
feature extraction
authentication problem
Compositionality
computational complexity
computer network security
Cryptographic Protocols
cryptography-based authentication protocols
device identity fingerprint
emitted wireless signals
authentication
Fingerprint recognition
Internet of Things
Internet of Things devices industry
IoT
IoT devices security
mobile phone signal burst extraction
Object recognition
physical layer-based security authentication method
biblio
Multi-Factor Authentication Modeling
Submitted by aekwall on Mon, 02/10/2020 - 11:02am
multifactor authentication
risk-based authentication
risk management
Resiliency
pubcrawl
patents
password
omnifactor authentication
multiple authentication factors
multifactor authentication modeling
acceptable authentication methods
Metrics
message authentication
knowledge based systems
Human Factors
fraud detection system
Fingerprint recognition
digital fingerprint
authorisation
authentication
biblio
Location Determination by Processing Signal Strength of Wi-Fi Routers in the Indoor Environment with Linear Discriminant Classifier
Submitted by grigby1 on Mon, 11/04/2019 - 11:39am
Metrics
wireless LAN
Wireless fidelity
Wi-Fi signal values
Wi-Fi signal strength
Wi-Fi routers
Topology
statistical analysis
signal classification
Router Systems Security
Resiliency
resilience
pubcrawl
classification
Mathematical model
machine learning algorithms
location determination
linear discriminant analysis classification
Linear discriminant analysis
indoor radio
indoor location determination
Global Positioning System signals
Global Positioning System
Fingerprint recognition
Classification algorithms
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »