Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Conferences
biblio
#x201C;Role of metadata in forensic analysis of database attacks #x201C;
Submitted by BrandonB on Wed, 05/06/2015 - 1:55pm
fraudulent transaction
trail obfuscation
table storage
SQL injection
security issue
reconnaissance attack
privacy issue
open source database forensics tool
online activities
metadata
meta data
linked hash technique
Law
information retrieval
Information analysis
Handheld computers
anti-forensics attacks
forensic analysis
e-transactions
digital notarization
Digital Forensics
digital evidence
database server artifacts
database security breaches
database forensics
database attacks
data privacy
court of law
Conferences
cache
audit logs
antiforensics attacks
biblio
HMAC based one t #x0131;me password generator
Submitted by BrandonB on Wed, 05/06/2015 - 11:51am
HMAC
standards
Signal processing algorithms
signal processing
Production
One Time Passwords
one time password production methods
one tıme password generator
message authentication
Keccak digest algorithm
Keccak
authentication
hashing-based message authentication code structure
Hash-Based Message Authentication Code
Hash functions
Hash Function
hash algorithm
fixed length strings
electronic media
Cryptography
Conferences
biblio
An efficient parallel algorithm for hash computation in security and forensics applications
Submitted by BrandonB on Wed, 05/06/2015 - 11:47am
information security
standards
standard hash function
SHA-1 algorithm
SHA-1
Program processors
probability
parallel algorithms
parallel algorithm
OpenMP API
OpenMP
Multicore Processors
Multicore processing
MD5
Algorithm design and analysis
hashing algorithms
hash computation
file organisation
digital signatures
digital signature
Digital Forensics
data preservation
Cryptography
Cryptographic Hash Function
Conferences
collision probability
application program interfaces
biblio
Tutorial T4: All You Need to Know about Hardware Trojans and Counterfeit ICs
Submitted by BrandonB on Wed, 05/06/2015 - 11:35am
hardware-software codesign
Very large scale integration
vertical business model
Tutorials
Trojan horses
system integrity
original IC designs
life-critical systems
invasive software
integrated circuit testing
horizontal business model
Awards activities
Hardware Trojans
Hardware
electronic component supply chain
Educational institutions
counterfeit prevention
counterfeit IC
counterfeit electronic parts
counterfeit detection
Conferences
biblio
Efficient modular multiplication algorithms for public key cryptography
Submitted by BrandonB on Wed, 05/06/2015 - 11:07am
modular exponentiation
word length
substitute and reward algorithms
store and forward algorithms
RSA
public key cryptosystems
Public key cryptography(PKC)
public key cryptography
modular multiplication algorithms
Modular Multiplication
Algorithm design and analysis
encryption
digital signatures
digital signature schemes
cryptographic transformations
Conferences
Ciphers
bit forwarding algorithms
binary exponentiation
BFW algorithms
biblio
An efficient parallel algorithm for hash computation in security and forensics applications
Submitted by BrandonB on Wed, 05/06/2015 - 11:02am
information security
standards
standard hash function
SHA-1 algorithm
SHA-1
Program processors
probability
parallel algorithms
parallel algorithm
OpenMP API
OpenMP
Multicore Processors
Multicore processing
MD5
Algorithm design and analysis
hashing algorithms
hash computation
file organisation
digital signatures
digital signature
Digital Forensics
data preservation
Cryptography
Cryptographic Hash Function
Conferences
collision probability
application program interfaces
biblio
Reducing forwarding state in content-centric networks with semi-stateless forwarding
Submitted by BrandonB on Wed, 05/06/2015 - 9:13am
content-centric networking architecture
unicast delivery
Unicast
Topology
semi-stateless forwarding scheme
Probabilistic logic
Ports (Computers)
ISP topologies
data structures
adaptive forwarding
Conferences
Computers
computer networks
computer architecture
CCN architecture
Bloom filter-based stateless forwarding
Bandwidth
biblio
Defending packet dropping attacks based on dynamic trust model in wireless ad hoc networks
Submitted by BrandonB on Wed, 05/06/2015 - 9:02am
NS-2 simulation
wireless ad hoc networks
Wireless ad hoc network
Vectors
trust value
Trust management
telecommunication traffic
security threats
security
Routing protocols
Routing
reactive routing protocol
partial received packets
packet dropping attacks
Packet dropping
Ad hoc networks
network traffic
mobile ad hoc networks
malicious packet dropping
malicious node
low false positive probability
dynamic trust model
DoS attack
denial of service attack
Conferences
Computers
computer network security
Black hole attack
AODV
biblio
Secure fault tolerance mechanism of wireless Ad-Hoc networks with mobile agents
Submitted by BrandonB on Wed, 05/06/2015 - 9:01am
related works
wireless self-organization networks
wireless ad hoc networks
unauthorized attempts
telecommunication security
telecommunication network reliability
signal processing
security threats
security reliability
security precautions
secure mobile agent
secure fault tolerance
secure communication
Ad hoc networks
mobile nodes
mobile agents
mobile agent migration
mobile agent
mobile ad hoc networks
Fault tolerant systems
fault tolerance
fault masking
Erbium
dynamic self-organization networks
Conferences
Ad-Hoc Network
biblio
Autonomic Resilient Cloud Management (ARCM) Design and Evaluation
Submitted by BrandonB on Tue, 05/05/2015 - 11:21am
ARCM
autonomic resilient cloud management
behavior obfuscation
BO
Cloud Computing
cloud service behavior obfuscation
cloud system security
Conferences
moving target defense
Resiliency
security of data
software fault tolerance
« first
‹ previous
…
73
74
75
76
77
78
79
80
81
next ›
last »