Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
message authentication
biblio
CAN FD Message Authentication Enhances Parallel in-vehicle Applications Security
Submitted by grigby1 on Fri, 05/12/2023 - 9:12am
masquerade attack
Space vehicles
security
Resiliency
resilience
real-time systems
pubcrawl
parallel In-vehicle applications
message authentication
application security
Human Factors
Human behavior
embedded systems
Costs
controller area network
CAN FD
automobile security
authentication
biblio
Proposal of HMAC based Protocol for Message Authenication in Kerberos Authentication Protocol
Submitted by grigby1 on Fri, 03/03/2023 - 4:16pm
telecommunication traffic
kerberos security
symmetric cryptography
Key Distribution System
codes
unauthorized access
HMAC
Electronic mail
Public key
Servers
Protocols
authentication
message authentication
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Finding Runtime Usable Gadgets: On the Security of Return Address Authentication
Submitted by grigby1 on Mon, 06/06/2022 - 11:09am
security
pubcrawl
Resiliency
message authentication
authentication
Runtime
Compositionality
memory security
codes
Return address authentication
reuse attack
Information Reuse
biblio
Systematically Encoded Polynomial Codes to Detect and Mitigate High-Status-Number Attacks in Inter-Substation GOOSE Communications
Submitted by grigby1 on Mon, 10/04/2021 - 2:04pm
Metrics
Substations
substation automation
Resiliency
pubcrawl
power system security
Payloads
parity check codes
object oriented security
network security
multicast communications
Communication system security
message authentication
linear codes
information security
Industrial Communication
Generators
encoding
cyber-physical systems
Cryptography
composability
biblio
VALID: Voltage-Based Lightweight Intrusion Detection for the Controller Area Network
Submitted by aekwall on Tue, 09/07/2021 - 10:11am
security
Hardware
privacy
Intrusion Detection
pubcrawl
Resiliency
Internet of Things
controller area network
automotive security
message authentication
Voltage control
Voltage fluctuations
controller area network security
cyber-physical systems
biblio
Avoidance of Replay attack in CAN protocol using Authenticated Encryption
Submitted by grigby1 on Tue, 06/01/2021 - 1:51pm
Protocols
vulnerabilities
Tiny Encryption Algorithm (TEA)
timestamp
standards
spoofing attacks
sensors
Secure Hash Algorithm (SHA)
Resiliency
resilience
replay attacks
pubcrawl
advanced encryption standard (AES)
privacy
Message Authentication Algorithm (MAC)
message authentication
encryption
Cryptography
Counter
confinement
composability
CAN protocol
authentication
authenticated encryption
biblio
Insider Threat Detection with Face Recognition and KNN User Classification
Submitted by grigby1 on Thu, 04/08/2021 - 3:53pm
image authenticity
face recognition
authentication mechanism
Face
security concerns
Facial features
cloud insider
Cloud Penetration
cloud user community
Degree of Trust
factor authentication
nearest neighbour methods
kNN classification algorithm
KNN Classification and QoS
KNN user Classification
private cloud deployments
Security Method
threat detection model
Threat detection module
threat detection QoS
insider threat
policy-based governance
authorisation
Cloud Computing
information security
Insider Threat Detection
machine learning
Monitoring
Insider Threats
pubcrawl
Human behavior
security of data
resilience
Resiliency
message authentication
authentication
quality of service
cloud storage
pattern classification
sensitive information
Metrics
biblio
Artificial-Noise-Aided Message Authentication Codes With Information-Theoretic Security
Submitted by aekwall on Thu, 04/08/2021 - 3:38pm
Performance Metrics
information theoretic security
standard authentication tags generation
Rijndael cipher
quantization
packet-based transmission
message authentication codes
Information-theoretic authentication codes
false acceptance probability
conditional equivocation
complexity-theoretic MAC
completeness error
channel coding and decoding
artificial-noise-aided message authentication codes
ANA-MAC
cryptographic primitive
Scalability
key recovery attack
Transmitters
Physical layer
information-theoretic security
channel coding
message authentication
information theory
authentication
Metrics
policy-based governance
pubcrawl
Human behavior
Resiliency
Receivers
Cryptography
biblio
An Empirical Analysis on the Usability and Security of Passwords
Submitted by aekwall on Thu, 04/08/2021 - 3:34pm
empirical analysis
phonemes
passwords
password-based authentication systems
password security
password creation strategies
Information Reuse and Security
Guidelines
Compositionality
password
security
security experts
message authentication
usability
Entropy
authentication
NIST
pubcrawl
Resiliency
authorisation
biblio
Research on Decentralized Identity and Access Management Model Based on the OIDC Protocol
Submitted by grigby1 on Mon, 03/29/2021 - 1:24pm
Identity management
unified authentication service
Scalability
Resiliency
resilience
reliable authentication service
pubcrawl
personal security information
personal information security problems
personal identity access management model
OIDC protocol
message authentication
access management application cluster
identity information
Human behavior
encryption services
decentralized identity authentication
Decentralized ID
Cryptographic Protocols
certificate authority
authorisation
authentication rules
application system
1
2
3
4
5
6
7
8
9
…
next ›
last »