Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authorisation
biblio
Enhanced Secure Mechanism for Virtual Machine Migration in Clouds
Submitted by grigby1 on Tue, 10/15/2019 - 2:44pm
source nonrepudiation
Metrics
mutual authentication
pubcrawl
replay protection
Repudiation
resilience
Resiliency
Software as a service
malicious viruses
unauthorized access
Virtualization
virtual machine migration
Virtual machine monitors
virtual machines
VM disk images
vulnerabilities
authentication
live VM migration
live migration
Human behavior
enhanced secure mechanism
DDoS Attacks
data integrity
data confidentiality
computer viruses
Computational modeling
composability
Cloud federations
Cloud Computing
AVISPA tool
authorization
authorisation
biblio
Blockchain-Based Mutual Authentication Security Protocol for Distributed RFID Systems
Submitted by grigby1 on Wed, 10/02/2019 - 3:03pm
potential attacks
Supply Chain
SQL injection attack
SQL
Servers
security
RFIDs
RFID
Resiliency
resilience
radiofrequency identification
radio frequency identification technology
pubcrawl
Protocols
privacy
access control system
identity related information
Human Factors
Human behavior
high security demand
distributed system
distributed RFID systems
distributed environment
Cryptographic Protocols
credit card
Computers
blockchain-based mutual authentication security protocol
blockchain
authorisation
authentication
biblio
A Blockchain-Based Secure Cloud Files Sharing Scheme with Fine-Grained Access Control
Submitted by grigby1 on Thu, 09/26/2019 - 10:43am
decentralized safety administration
Security analysis
Secure File Sharing
Safety
Resiliency
resilience
pubcrawl
Peer-to-peer computing
outsourcing data
outsourcing
Metrics
Human Factors
Human behavior
fine-grained data access control
encryption
Distributed databases
Access Control
Data Security
data integrity
Cryptography
CP-ABE
composability
cloud storage
cloud service provider
cloud server
Cloud Computing
ciphertext-policy attribute based encryption
blockchains
blockchain-based secure cloud file sharing scheme
blockchain technology
blockchain
authorisation
biblio
An Attribute-Based Searchable Encryption Scheme Supporting Trapdoor Updating
Submitted by grigby1 on Thu, 09/26/2019 - 10:27am
cloud computing environment
searchable encryption
trapdoor updating
online/offline keyword guessing attack
online-offline keyword guessing attack
data files
CSES-TU
Ciphertext
attribute-based searchable encryption schemes
attribute-based searchable encryption scheme
attribute-based searchable encryption
fine-grained access control
search problems
Cloud Computing
authorisation
Cryptography
Servers
encryption
composability
Resiliency
pubcrawl
resilience
data privacy
cloud storage
Access Control
biblio
A Design and Implementation Method of IPSec Security Chip for Power Distribution Network System Based on National Cryptographic Algorithms
Submitted by grigby1 on Wed, 09/11/2019 - 2:44pm
Predictive Metrics
national cryptographic algorithm
network layer communication security
network security
Networked Control Systems Security
power distribution automation system
power distribution network system
power distribution protection
power engineering computing
power system security
Microelectronics Security
Protocols
pubcrawl
resilience
Resiliency
security protection scheme
sercurity chip
the power distribution automation system
Virtual private networks
VPN gateway
Distribution system
authentication function
authentication gateway
authorisation
composability
computer network security
Cryptographic Protocols
distribution application layer encryption authentication device
distribution master station
distribution network system
authentication
Dual Encryption
encryption
IP networks
IPSec protocol
IPSec security chip
Logic gates
master cipher machine
master system
Metrics
biblio
Architectural Security Weaknesses in Industrial Control Systems (ICS) an Empirical Study Based on Disclosed Software Vulnerabilities
Submitted by aekwall on Mon, 08/26/2019 - 10:07am
industrial control
supervisory control
Software
security weaknesses
security of data
security
SCADA systems
SCADA configuration
resilience
pubcrawl
policy-based governance
PLC
Metrics
internet
integrated circuits
Industrial Control Systems
architectural root cause
industrial automation
improper input validation
ICS systems
human-machine interfaces
Human Factors
Human behavior
disclosed software vulnerabilities
Data mining
data acquisition
control systems
computer architecture
component-based architectures
common security architectural weaknesses
common architectural security weaknesses
authorisation
biblio
Access Control Policy Enforcement for Zero-Trust-Networking
Submitted by grigby1 on Mon, 08/05/2019 - 11:39am
Scalability
policy enforcement
policy enforcement framework
policy-based governance
Production
pubcrawl
resilience
Resiliency
rigorous access control
risk-based access control
risk-based access control decision making
network zone
securing computer networks
Software
transaction-based interactions
trust
virtualized infrastructures
zero trust
zero trust networking
zero-trust-networking
zone resources
ZTN networks
Firewalls (computing)
access control process
authorisation
authorization
computer network management
computer network security
computer networks
Decision Making
dynamicity
enterprise computing landscape
firewall
access control policy enforcement
fog/edge computing
generic firewall policy language
heterogeneous user contexts
Human behavior
Human Factors
industrial internet
Internet of Things
micro-segment
network topology
biblio
Wireless Security Audit Penetration Test Using Raspberry Pi
Submitted by grigby1 on Mon, 07/01/2019 - 10:03am
Scalability
wireless technology
wireless security audit
Wireless Protected Access
wireless networks
wireless LAN
Wireless fidelity
Wired Equivalent Privacy
WiFi testing tools
WiFi network
WiFi Auditor
WiFi attacks
tools
telecommunication security
Security Audits
auditing
Resiliency
resilience
Raspberry Pi 3 module
pubcrawl
Penetration Testing
penetration tester
man in the middle
Jamming
Human Factors
Human behavior
deliberate jamming
Communication system security
authorized wireless communications
authorisation
biblio
IDS Based Network Security Architecture with TCP/IP Parameters Using Machine Learning
Submitted by grigby1 on Mon, 06/10/2019 - 1:55pm
security actions
networks
normal threats data sets
pattern classification
privacy
Protocols
pubcrawl
regular traffic pattern
Reinforcement algorithm
Reliability
resilience
Resiliency
securities threats
security
Network Security Architecture
security devices
security of data
security problems
server based access
TCP-IP packets
TCP-IP parameters
TCP/IP Protocols
TCPIP
telecommunication traffic
transport protocols
vulnerable sites
WEKA and Snoor tools
data confidentiality
authentication
authorisation
Classification algorithms
Communication networks
composability
computer access
computer architecture
computer network security
computer security
Confidentiality and Vulnerabilities
crypto algorithms
Cryptography
authentic data
data reliability
data set
internet
Intrusion Detection
IoT (Internet of Things)
IP networks
IPsec
KNN classification
kNN classification algorithm
learning (artificial intelligence)
machine learning
network access
biblio
Performance evaluation of an authentication mechanism in time-triggered networked control systems
Submitted by willirn1 on Fri, 05/31/2019 - 11:18am
networked control systems
Vanderbilt
TTEthernet network
TTEthernet
timing behavior
time-triggered networked control systems
Time-Trigger Architectures
time triggered architectures
Synchronization
Switches
security mechanisms
Secure Messages
safety property
reliability property
Receivers
performance evaluation
System-security co-design
network data communication
message integrity
message confidentiality
message authentication
Local area networks
HMAC
hash based message authentication
fault tolerance property
Cryptography
computer network security
computation overhead
communication overhead
authorisation
authentication mechanism
« first
‹ previous
…
21
22
23
24
25
26
27
28
29
…
next ›
last »