Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authorisation
biblio
Game-Like Captchas for Intrusion Detection
Submitted by grigby1 on Thu, 03/18/2021 - 1:36pm
Games
user interactions
user authentication
Support vector machines
pubcrawl
IP networks
intrusion detection system
Intrusion Detection
internet
Human behavior
Google re-captcha
authentication
game-like captchas
game play
game choices
credential stuffing
composability
captchas
biometrics (access control)
biometric authentication
authorisation
biblio
A Solution of Text Based CAPTCHA without Network Flow Consumption
Submitted by grigby1 on Thu, 03/18/2021 - 1:35pm
information processing
verification logic
text-based CAPTCHA
text based CAPTCHA
telecommunication traffic
software engineering
Servers
server
security risks
security
pubcrawl
network flow
information processing security issues
authorisation
Human behavior
high-security text-based CAPTCHA solution
formal verification
encryption
distributed information processing
composability
client-server systems
client malicious programs
client
captchas
CAPTCHA technology
biblio
IoTCMal: Towards A Hybrid IoT Honeypot for Capturing and Analyzing Malware
Submitted by grigby1 on Mon, 03/15/2021 - 12:11pm
IoTC-MAL
vulnerabilities
virtualisation
virtual environment
video surveillance
Servers
Resiliency
resilience
pubcrawl
network-connected devices
Metrics
malware
malicious samples
low-interactive IoT honeypots
IoTCMal
authentication
IoT device
IoT
invasive software
Internet of Things
hybrid IoT honeypot
honeypot
homology analysis
Computer hacking
composability
command injection attacks
Bridges
authorisation
authentication services
biblio
A Novel Group-Based Authentication and Key Agreement Protocol for IoT Enabled LTE/LTE–A Network
Submitted by grigby1 on Tue, 03/09/2021 - 2:05pm
Long Term Evolution
telecommunication security
security
Scalability
Resiliency
resilience
pubcrawl
Protocols
Performance analysis
MTCD
Metrics
Machine Type Communication Devices
LTE/LTE–A
LTE/LTE-A network
authentication
IoT
Internet of Things
Human behavior
heterogeneous devices
group-based authentication and key agreement protocol
Gold
Cryptographic Protocols
Complexity theory
BIOS
biometric authentication
Bio-metric
authorisation
biblio
Successes and Failures in Exploring Biometric Algorithms in NIST Open Source Software and Data
Submitted by grigby1 on Tue, 03/09/2021 - 2:04pm
resilience
multifactor
multimodal
NIST
NIST open source software
open-source software
password-driven methods
pubcrawl
public domain software
recognition
Metrics
Resiliency
Scalability
secure approaches
security
Software
test data
Unibiometric analysis
user authentication methods
cryptosystem
authorisation
Bio-metric
biometric algorithms
biometric authentication method
biometric data
biometrics (access control)
BIOS
Cryptography
authentication
fingerprint
Fingerprint recognition
fuzzy vault
Human behavior
Identification
internal open source utilities
Iris
Iris recognition
biblio
Implementation and Analysis of USB based Password Stealer using PowerShell in Google Chrome and Mozilla Firefox
Submitted by grigby1 on Tue, 03/09/2021 - 1:39pm
Software
password management feature
passwordfox
PasswordFox program
policy-based governance
powershell
powershell script
pubcrawl
rubber ducky
password
stored data
time 14.0 s
tools
Universal Serial Bus
USB password stealer
user interfaces
usernames
Windows operating system
Google Chrome
Arduino Pro Micro Leonardo device
authorisation
badusb
browser applications
Browsers
brute force attacks
chromepass
Computer crime
arduino pro micro leonardo
Hardware
Human behavior
Human Factors
internet
Mozilla Firefox login data
operating systems
operating systems (computers)
biblio
Treats based Revisiting Defences Against Password Guessing Attacks and Phishing Data Over Different Online Records
Submitted by grigby1 on Tue, 03/09/2021 - 1:38pm
Phishing of data
Human Factors
individual data
internet
Internet clients
logins attempts
message authentication
password guessing attack
password guessing attacks resistance protocol
phishing data
Human behavior
policy-based governance
problematic endeavour
pubcrawl
real page
revisiting defences
site page
standardized savings number
uncovering delicate data
word reference ambushes
Denial of Service (DoS).
authorisation
Brute force
brute force attacks
charge card number
client-server systems
Computer crime
computer network security
cookies-based solution
Cryptographic Protocols
accommodating login
dependable page
different online records
directly wide spread
failed attempts
failed login attempt
failed login tries
full-scale number
genuine customers
biblio
Individualization of Anonymous Identities Using Artificial Intelligence (AI)
Submitted by aekwall on Tue, 03/09/2021 - 10:57am
data privacy
unique identity
stereo image processing
standards
specific personal characteristics
Scalability
Resiliency
Reliability
Regulation
pubcrawl
Metrics
individualization
identity anonymization
Human-computer interaction
human body measures
Fingerprint recognition
biometric encryption
Cryptography
COVID-19
computer vision
communication
but still anonymous
blockchain
biometrics (access control)
biometric identity
biometric footprint
authorisation
Artificial Intelligence (AI)
Artificial Intelligence
anonymous identity
anonymous identities
additional personal information being
biblio
Biometric System of Access to Information Resources
Submitted by aekwall on Tue, 03/09/2021 - 10:57am
internet
webhost web server
web resource
unauthorized access
structural schematic diagram
software and hardware complex
Scalability
Resiliency
pubcrawl
phpMyAdmin database server
PHP scripting language
personal data
online front-ends
Metrics
JavaScript
Java
biometric encryption
information resourses
information resources
information resource
Identification
hypermedia markup languages
HTML hypertext markup language
hardware complex
Google Chrome extension
fingerprint
embedded scripts
developed complex
C language
biometric system
authorisation
authoring languages
biblio
Three-Factor Authentication Scheme Based on Searchable Encryption and Biometric Fingerprint
Submitted by aekwall on Tue, 03/09/2021 - 10:56am
mistrust server
token ID
three-factor authentication scheme
three factor authentication
Source code analysis
Software
Servers
searchable encryption scheme
searchable encryption
Scalability
RSA
Resiliency
pubcrawl
password
pass-code
multi-factor
biometric encryption
Metrics
fingerprint identification
fingerprint
encryption
encrypted content
decryption
Cryptography
cloud server
Cloud Computing
biometrics
biometric fingerprint
authorisation
authentication
3FA
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »