Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
fraud
biblio
The Use of Blockchain for Digital Identity Management in Healthcare
Submitted by grigby1 on Thu, 08/17/2023 - 4:39pm
Protocols
KYC
digital identification
fraud
blockchains
Memory
Self-Sovereign Identity
standardization
Industries
blockchain
Medical services
Identity management
Scalability
Resiliency
resilience
Human behavior
pubcrawl
biblio
Digital Forensic Analysis on Caller ID Spoofing Attack
Submitted by grigby1 on Wed, 08/16/2023 - 3:38pm
IDS
SIM card forensic
NIST SP 800-101R1
mobile forensic
caller ID spoofing
fraud
digital forensic
Oxygen
digital evidence
information security
Digital Forensics
composability
Big Data
NIST
Conferences
Resiliency
resilience
pubcrawl
biblio
A Novel Blockchain-Driven Framework for Deterring Fraud in Supply Chain Finance
Submitted by grigby1 on Fri, 06/30/2023 - 2:35pm
finance
airflow
Agent-based modeling
fraud
supply chain finance
Deterrence
Hyperledger Fabric
fraud detection
Fabrics
pubcrawl
supply chains
Licenses
blockchain
real-time systems
Scalability
Resiliency
resilience
Human behavior
biblio
Security Assessment of Android-Based Mobile Terminals
Submitted by grigby1 on Fri, 03/31/2023 - 11:21am
security
pubcrawl
resilience
Scalability
Wireless communication
Measurement
Mobile Applications
Online banking
big data security metrics
analytic hierarchy process
security metric
Resiliency
fraud
analytical hierarchy process (AHP)
relative weight
security assessment
biblio
The DecCert PKI: A Solution to Decentralized Identity Attestation and Zooko’s Triangle
Submitted by grigby1 on Fri, 02/03/2023 - 5:26pm
Economics
Zooko’s triangle
identity attestation
fraud
decentralized applications
public key infrastructure
PKI Trust Models
decentralization
blockchains
cryptocurrency
pubcrawl
Public key
smart contracts
blockchain
Scalability
Resiliency
resilience
Metrics
Human behavior
biblio
Media Forensics and DeepFakes: An Overview
Submitted by grigby1 on Thu, 04/08/2021 - 5:11pm
fake media
Media
multimedia computing
Deepfakes
Information integrity
data-driven forensic methods
deep learning tools
digital image forensics
elections
Videos
false multimedia content
forensic tools
Media Forensics
real media
realistic fake images
synthetic media
Video Forensics
visual media integrity verification
fraud
learning (artificial intelligence)
Digital Forensics
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
deep learning
security threats
neural nets
Forensics
software packages
public opinion
information forensics
generative adversarial networks
biblio
Blockchain and the Identity based Encryption Scheme for High Data Security
Submitted by grigby1 on Mon, 03/29/2021 - 2:24pm
file organisation
storage management
Scalability
Resiliency
resilience
pubcrawl
private document storage
message authentication
Identity management
identity based encryption management
identity based encryption
Human behavior
high data security
hash algorithms
fraud
authentication
document handling
Distributed databases
data storage
Data protection
data privacy
data integrity
Cryptography
Consensus algorithm
Consensus
blockchain technology
blockchain
authorization
authorisation
biblio
Identity management using permissioned blockchain
Submitted by grigby1 on Mon, 03/29/2021 - 2:23pm
public key cryptography
identity cards
Identity management
identity management capabilities
identity thefts
India
permissioned blockchain
person identity authentication
personal data hashing
privacy
privacy concepts
private key cryptography
pubcrawl
Human behavior
public-private keys
resilience
Resiliency
Scalability
score-card
security
Self-Sovereign Identity
smart cards
smart contracts
unauthorized hands
US Home Land Security
efficient identity management
authorisation
Bitnation
blockchain technology
contracts
cryptocurrencies
data privacy
design information security
Digital India
distributed ledger
Distributed trust model
distribution control
e-Residency
Aadhar-card
Estonia
ethereum
Fabrics
financial data processing
fraud
fraud cases
Government
government agencies
government data processing
hashing algorithms
homeland security enterprise
biblio
Robust Early Stage Botnet Detection using Machine Learning
Submitted by grigby1 on Tue, 03/09/2021 - 2:22pm
pubcrawl
invasive software
learning (artificial intelligence)
machine learning classifiers
malware
Metrics
PCA
principal component analysis
Protocols
identity theft
Random Forest
resilience
Resiliency
robust early stage botnet detection
security of data
Servers
Support vector machines
telecommunication security
cyberattacks
Botnet detection
botnet detection techniques
botnets
click fraud
Command and Control Channel (C&C)
composability
Computer crime
computer network security
botnet
Cybersecurity
DDoS
early-stage botnet detection
efficient detection rate
feature extraction
feature selection techniques
fraud
biblio
E-Voting System In Smart Phone Using Mobile Application
Submitted by grigby1 on Thu, 01/28/2021 - 1:32pm
Humanoid robots
Web technologies
voting process
smart phones
smart phone
Servers
Scalability
Resiliency
resilience
pubcrawl
polling booth
OTP
mobile computing
Mobile Application
Metrics
internet
android encryption
Human behavior
government data processing
fraud voters
fraud
encryption
electronic voting
e-voting system
Cryptography
computer science
casted vote count
biometric
Androids
Android platform
AES256 algorithm
Aes256
1
2
3
4
next ›
last »