Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
message authentication
biblio
An Emulation of Sql Injection Disclosure and Deterrence
Submitted by grigby1 on Mon, 11/19/2018 - 12:24pm
password
Web applications authorization
Web applications authentication
web applications
SQL injection disclosure
SQL injection deterrence
SQL injection
SQL
security vulnerability
Scalability
Resiliency
resilience
pubcrawl
password security
authentication
message authentication
internet
information retrieval
Human Factors
honey pots
Honey pot mechanism
Honey Pot
Heisenberg analysis
Databases
data retrieval
Companies
authorisation
biblio
A Novel Privacy Technique for Augmented Reality Cloud Gaming Based on Image Authentication
Submitted by grigby1 on Mon, 11/19/2018 - 12:14pm
image authentication
Watermarking
Scalability
Resiliency
resilience
pubcrawl
privacy
positioning data privacy
mobile computing
message authentication
location-based games
Image Processing
augmented reality
Human behavior
Games
data privacy
Cryptography
Computer hacking
computer games
Cloud Computing
cheating scenario problem
authentication
augmented reality cloud gaming
biblio
An Attack-Resilient Source Authentication Protocol in Controller Area Network
Submitted by grigby1 on Wed, 09/05/2018 - 10:55am
ECU
vehicle to everything
V2X
trees (mathematics)
safety-critical software
safety-critical automotive control systems
Resiliency
resilience
pubcrawl
message authentication
invehicle network security
in-vehicle network security
electronic control units
CPS resilience
driver information systems
Cyber-Physical Systems (CPS)
Cryptographic Protocols
controller area networks
controller area network security
controller area network
CAN
automobiles
authentication
attack-resilient source authentication protocol
attack resilient tree algorithm
biblio
Investigating and securing communications in the Controller Area Network (CAN)
Submitted by grigby1 on Wed, 09/05/2018 - 10:55am
automobile
controller area network security
telecommunication networks
standard communication network
light emitting diodes
field buses
denial-of-service attacks
controller area networks
controller area network
CAN-related systems
CAN protocol security features
CAN bus nodes
CAN
broadcast communications network
broadcast communication
security
DoS attacks
telecommunication computing
resilience
automobiles
Network
computer network security
message authentication
Conferences
Protocols
communication security
authentication
Resiliency
pubcrawl
biblio
Intelligent security lock
Submitted by grigby1 on Thu, 08/23/2018 - 11:35am
intrusion detection system
software system
smart electronic/digital door locking system
Smart Door Lock
security features
Resiliency
resilience
real time camera surveillance
pubcrawl
mobile computing
Mobile app
message authentication
lock device
Live Camera Feeds
keys (locking)
Bluetooth
intrusion detection notification
Intrusion Detection
Intelligent Security Lock prototype
human factor
Human behavior
face recognition
doors
Conferences
comprehensive security requirements
composability
Cameras
bluetooth security
Bluetooth Lock
authentication
biblio
Result evaluation of field authentication based SQL injection and XSS attack exposure
Submitted by grigby1 on Thu, 06/07/2018 - 3:13pm
Servers
policy-based governance
Policy-Governed Secure Collaboration
privacy
profited businesses
pubcrawl
Resiliency
security imperatives
security issues
Policy
SQL
SQL infusion
SQL injection
Structured Query Language
web based business
web communications
Web sites
XSS attack exposure
document processing
centralized mechanism
collaboration
Computer crime
Cross Site Scripting (XSS)
cross webpage scripting
cross-site scripting
data trades
Databases
authentication
electronic framework association
electronic frameworks
field authentication
framework
Human behavior
information classification
message authentication
pattern classification
biblio
Design of Boolean Chaotic Oscillator Using CMOS Technology for True Random Number Generation
Submitted by grigby1 on Thu, 05/24/2018 - 12:16pm
random number generation
message authentication
Metrics
National Institute of Standards and Technology
NI ELVIS platform
Oscillators
pubcrawl
random cryptographic keys
random key generation
Logic gates
random number generators
random numbers
resilience
Resiliency
Ring oscillators
Scalability
security keys
45nm CMOS technology
Inverters
Human behavior
Generators
delays
data transmission security
Cryptography
CMOS integrated circuits
CMOS Boolean Chaotic Oscillator Design
CMOS
chaos
Capacitors
Cadence Virtuoso tool
cadence virtuoso
authentication security
application specific integrated circuits
biblio
Wearable Device User Authentication Using Physiological and Behavioral Metrics
Submitted by grigby1 on Mon, 04/02/2018 - 12:55pm
sensors
physiological data
Physiological Fingerprint
physiological metrics
privacy
pubcrawl
Reliable Data Collection
resilience
Resiliency
Scalability
patient monitoring
smart wearables
standards
wearable computers
wearable device user authentication
Wearable Security
Wearable-User Authentication
wearable-user authentication mechanism
wearables security
wellness-related metrics
health care
Apple Watch
authentication
authorisation
behavioral metrics
Biomedical monitoring
biometrics (access control)
coarse-grain minute-level physical activity
feature extraction
Fitbit users
Activity-based Fingerprint
Healthcare
healthcare providers
Heart rate
Human behavior
message authentication
Microsoft Band
microsoft windows
mobile computing
one-time authentication approaches
biblio
Accumulators with Applications to Anonymity-Preserving Revocation
Submitted by grigby1 on Mon, 04/02/2018 - 12:31pm
Human behavior
zero-knowledge proofs
user authentication
Theorem Proving
RSA-based dynamic accumulator
revocation functionality
revocation
Resiliency
resilience
public key cryptography
pubcrawl
Plugs
optimal communication complexity
Metrics
message authentication
membership revocation
accumulators
Heuristic algorithms
Cryptography
cryptographic applications
composability
Complexity theory
communication complexity
Braavos construction
authentication
ARC
anonymous revocation component
anonymous credentials
anonymous credential systems
anonymity-preserving revocation
anonymity
Additives
biblio
Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location
Submitted by grigby1 on Mon, 03/19/2018 - 1:37pm
Intrusion Detection
wireless LAN
Wi-Fi
Web sites
web browsing behavior
Web browsing
stylometry
Software Architecture
pubcrawl
parallel binary decision fusion architecture
online front-ends
multimodal biometric systems
Mobile handsets
Metrics
message authentication
Keyboards
Active Authentication
insider threat
Humanoid robots
Human behavior
GPS location
Global Positioning System
geographical colocation
decision fusion
biometrics (access control)
Behavioral biometrics
authentication
application usage patterns
Androids
Android mobile device
Android (operating system)
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
next ›
last »