Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Force
biblio
Secure Hashing using BCrypt for Cryptographic Applications
Submitted by grigby1 on Fri, 08/11/2023 - 1:55pm
reliability theory
SHA hashing
Rainbow Attack
MD5 hash
dictionary attack
Blowfish cipher
Bcrypt
passwords
hash algorithms
pubcrawl
Force
Data Breach
Compositionality
Production
Industries
Cryptography
Resiliency
resilience
biblio
Ibn Omar Hash Algorithm
Submitted by grigby1 on Fri, 08/11/2023 - 1:54pm
Hash functions
SHA-512
MD5
Ibn Omar
SHA-256
passwords
Linguistics
hash algorithms
hash
information security
Force
Compositionality
Complexity theory
privacy
Resiliency
resilience
pubcrawl
biblio
Comparative Analysis of Password Storage Security using Double Secure Hash Algorithm
Submitted by grigby1 on Fri, 08/11/2023 - 1:53pm
Hash functions
password security
Message Digest (MD)
collision attack
Brute Force Attack
passwords
Spraying
Secure Hash Algorithm (SHA)
hash algorithms
Computer hacking
Force
Compositionality
Companies
Databases
Resiliency
resilience
pubcrawl
biblio
Security Authentication Scheme for Low Earth Orbit Satellites Based on Spatial Channel Characteristics
Submitted by grigby1 on Fri, 07/14/2023 - 10:49am
pubcrawl
Metrics
resilience
authentication
Software Defined Network
Compositionality
Resistance
Software algorithms
Force
simulation
security authentication
Satellites
Resiliency
channel characteristics
Low earth orbit satellites
encryption audits
biblio
Sequential Statistical Analysis-Based Method for Attacks Detection in Cognitive Radio Networks
Submitted by aekwall on Fri, 04/28/2023 - 9:41am
Force
statistical analysis
radio transmitters
Intrusion Detection
pubcrawl
machine learning
information security
Resiliency
emulation
cognitive radio networks
Sequential analysis
sequential statistical analysis
Cognitive Radio Security
biblio
A Novel Password Secure Mechanism using Reformation based Optimized Honey Encryption and Decryption Technique
Submitted by grigby1 on Fri, 04/14/2023 - 4:09pm
Resistance
Reformation-based scheme
Password authentication
optimized honey encryption and decryption
Brutal force attack
passwords
codes
brute force attacks
Force
collaboration
control systems
Protocols
authentication
policy-based governance
Human Factors
Human behavior
pubcrawl
security
biblio
Secure Two-Factor Authentication for IoT Device
Submitted by grigby1 on Fri, 04/14/2023 - 4:09pm
Protocols
Constraint device
Force measurement
two-factor authentication
mutual authentication
brute force attacks
MQTT
Force
Fingerprint recognition
Internet of Things
authentication
IoT device
policy-based governance
Human Factors
Human behavior
pubcrawl
security
collaboration
biblio
Analyzing SocialArks Data Leak - A Brute Force Web Login Attack
Submitted by grigby1 on Fri, 04/14/2023 - 4:09pm
Cloud Computing
collaboration
Intrusion Detection
pubcrawl
Human behavior
Human Factors
policy-based governance
Databases
Companies
Firewalls (computing)
Force
ethics
brute force attacks
Data Breach
elasticsearch
SocialArks
biblio
Consensus-based Frequency Control of a Cyber-physical Power System under Two Types of DDoS Attacks
Submitted by grigby1 on Fri, 04/14/2023 - 4:08pm
collaboration
pubcrawl
Human behavior
Human Factors
policy-based governance
Computer crime
Smart Grid
DDoS Attacks
Force
simulation
denial-of-service attack
Microgrids
power systems
brute force attacks
Communication Systems
cyber-physical power system
biblio
Analysis of the random shuffling of message blocks as a low-cost integrity and security measure
Submitted by grigby1 on Fri, 04/14/2023 - 4:08pm
Memory management
Shuffling
Low cost
Brute force
Force measurement
brute force attacks
integrity
Current measurement
Force
Proposals
collaboration
Information systems
Cryptography
privacy
policy-based governance
Human Factors
Human behavior
pubcrawl
IoT
security
1
2
3
4
5
6
7
8
9
next ›
last »