Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authorisation
biblio
A distributed biometric authentication scheme based on blockchain
Submitted by aekwall on Tue, 03/09/2021 - 10:56am
homomorphically encrypted form
wearable computers
usability
smart contracts
sensitive users
sensitive biometric data
secure authentication
Scalability
Resiliency
pubcrawl
privacy
nonencrypted form
modern computing systems
Metrics
message authentication
biometric encryption
Homomorphic encryption
enhanced usability
encryption
Distributed databases
distributed biometric authentication
Cryptography
cautious handling
blockchain
biometrics (access control)
biometric templates
biometric
authorisation
authentication
biblio
Secure Biometric Lock System for Files and Applications: A Review
Submitted by aekwall on Tue, 03/09/2021 - 10:55am
fingerprint identification
user access information
Software
security system
secure biometric lock system
Scalability
Resiliency
pubcrawl
multifactor authentication
Metrics
Fingers
Fingerprint recognition
biometric encryption
fingerprint biometric systems
finger recognition
Face
encryption algorithms
Cryptography
biometrics (access control)
biometric system
biometric fingerprint sensor
authorisation
authentication
Access Control
biblio
Securing Trajectory based Operations Through a Zero Trust Framework in the NAS
Submitted by grigby1 on Thu, 03/04/2021 - 2:07pm
TBO infrastructure
network perimeter
operating costs
policy-based governance
pubcrawl
resilience
Resiliency
Scalability
strong boundary security protections
national airspace system
TBO objectives
time-based management data
tool availability
trajectory based operations
verify approach
zero trust
zero trust framework
ZTF theory
FAA systems
aerospace computing
air traffic control
aircraft communication
authorisation
boundary protections
castle-moat approach
critical data
ever-evolving threat sophistication
access network data
FAA Telecommunications Infrastructure network
Human Factors
hybrid ZTX approach
Insider Threats
internal network devices
NAS Zero Trust
NAS.ZTF
biblio
Stable cryptographic key generation using SRAM based Physical Unclonable Function
Submitted by grigby1 on Thu, 03/04/2021 - 2:06pm
SRAM fingerprint
random pattern
resilience
Resiliency
Scalability
secure IoT devices
SRAM
SRAM cells
SRAM chips
random number generation
SRAM physical unclonable function
SRAM PUF
Stability analysis
Static Random-Access Memory based PUFs
Threshold voltage
Transistors
Trusted Computing
zero trust
integrated circuits
Cadence Virtuoso tool
cryptographic key generation stability
cryptographic key sequence
Cryptography
digital fingerprint
fingerprint identification
hardware root-of-trust
Human Factors
authorisation
Internet of Things
IoT
MOS devices
Physical Unclonable Function
policy-based governance
power aware computing
pubcrawl
pufs
biblio
Trusted Connect Technology of Bioinformatics Authentication Cloud Platform Based on Point Set Topology Transformation Theory
Submitted by grigby1 on Thu, 03/04/2021 - 2:06pm
Point Set Topology
zero trust
zero knowledge proof technology
trusted credentials
trusted connect technology
Trusted Computing
Topology
topological group transformation
Scalability
Resiliency
resilience
Public key
pubcrawl
policy-based governance
point set topology transformation theory
authentication
pattern recognition technology
Human Factors
Fractals
format conversion
Fingerprint recognition
feature data
digital coding
Cryptography
cloud platform
Cloud Computing
bioinformatics features
bioinformatics authentication cloud platform
bioinformatics
authorisation
biblio
Analysis of the Most Common Software and Hardware Vulnerabilities in Microprocessor Systems
Submitted by grigby1 on Thu, 03/04/2021 - 1:45pm
resilience
Metrics
microcomputers
microprocessor systems
Microsoft Windows (operating systems)
network access
Production
Program processors
pubcrawl
remote attack
local computer calculation network
Resiliency
Server Message Block service
Silicon
Software Vulnerability
Transistors
WannaCry trojan encoder
Windows Operating System Security
Windows OS
encryption program
security
authorisation
composability
Computer crime
computer viruses
Computers
Cryptography
Data protection
Windows operating system
File systems
Hardware
hardware algorithm protection
hardware vulnerabilities
hardware vulnerability
information protection
information security
invasive software
biblio
Fooling A Deep-Learning Based Gait Behavioral Biometric System
Submitted by grigby1 on Thu, 03/04/2021 - 1:34pm
Metrics
FGSM
FGSM iterations
gait behavioral biometrics
gradient methods
LSTM
machine learning algorithms
machine learning model
mature techniques
fast gradient sign method
privacy
pubcrawl
resilience
Resiliency
shadow model
Training
user behavioral information
white-box attacks
black-box attack
white box
security
adversarial learning attacks
Adversarial Machine Learning
authentication
authorisation
Biological system modeling
biometrics (access control)
White Box Security
Classification algorithms
composability
counter spoofing threats
deep learning (artificial intelligence)
Deep-learning
deep-learning based gait behavioral biometric system
end-user devices
extent FGSM
biblio
A Scalable Blockchain-based Approach for Authentication and Access Control in Software Defined Vehicular Networks
Submitted by grigby1 on Tue, 02/23/2021 - 1:58pm
security
Resiliency
Scalability
scalable architecture
scalable blockchain-based approach
SDN
SDN controllers
SDVN devices
SDVN features
SDVN requirements
resilience
security issues
software defined networking
software defined vehicular networking
software defined vehicular networks
telecommunication network planning
telecommunication security
unauthorized SDN controller
unauthorized switch
vehicular ad hoc networks
control systems
access control issues
access control mechanism
authentication
authorisation
authorization
blockchain
blockchain ledger
blockchain technology
computer architecture
Access Control
cryptocurrencies
Distributed databases
heterogeneous networks
interconnected blockchain sub-networks
IoV
message authentication
Network reconnaissance
open systems
pubcrawl
biblio
POLANCO: Enforcing Natural Language Network Policies
Submitted by aekwall on Mon, 02/22/2021 - 12:39pm
campus network
public university Websites
printers
policy language for campus operations
POLANCO
network policy
Natural languages
natural language policies
natural language network policies
human-readable network policy definition language
high-level language
high-level human-readable natural language
high-level human readable language
high level languages
campus networks
computer network security
Educational institutions
Software Defined Networks
Complexity theory
SDN
natural language processing
pubcrawl
Human behavior
Resiliency
software defined networking
Software
security
authorisation
Servers
Scalability
biblio
Towards a Dynamic Policy Enhanced Integrated Security Architecture for SDN Infrastructure
Submitted by grigby1 on Tue, 02/16/2021 - 11:42am
SDN infrastructure
Network Security Architecture
networking arena
Performance analysis
policy-based approach
Policy-based Security Architecture
pubcrawl
resilience
SDN based enterprise networks
network devices
SDN security
secure SDN
security attacks
security measures
security policies
software defined networking
telecommunication security
Dynamical Systems
network attacks
Metrics
Enterprise Network Security
dynamic policy framework
dynamic policy enhanced integrated security architecture
dynamic networks
dynamic changes
different security mechanisms
computer network security
computer network management
business communication
authorisation
composability
Predictive Metrics
Resiliency
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »