Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
message authentication
biblio
A deep learning-based RNNs model for automatic security audit of short messages
Submitted by grigby1 on Mon, 11/20/2017 - 12:20pm
short message security audit
pubcrawl
recurrent neural nets
recurrent neural networks (RNNs)
Resiliency
security
Semantics
sentence feature vector
sentiment analysis
sentiment classification
prisons
short messages automatic security audit
Support vector machines
text categorization
text classification
Training
Vectors
word order information
Word2Vec
Governance
Artificial Neural Networks
bag of words
binary classification
collaboration
deep learning
deep learning-based recurrent neural networks
deep learning-based RNN model
electronic messaging
feature extraction
artificial neural network
Government
learning (artificial intelligence)
Logic gates
message authentication
pattern classification
police data processing
Policy
policy-based governance
biblio
Scalable and privacy-preserving authentication protocol for secure vehicular communications
Submitted by grigby1 on Fri, 11/03/2017 - 11:31am
Safety
vehicular communications security
vehicular ad hoc networks
vehicle to vehicle communications
vehicle to infrastructure communications
VANETs
VANET
V2V
V2I
symmetric hash message authentication code
symmetric cryptography
security
Scalable Security
scalable and privacy-preserving authentication protocol
Scalability
asymmetric cryptography
public-key infrastructure
public key cryptography
pubcrawl
Protocols
privacy-preserving authentication protocol
privacy
PKI-based authentication protocols
PKI
message authentication
ESPA protocol
efficient
Cryptography
Cryptographic Protocols
authentication
biblio
Context independent continuous authentication using behavioural biometrics
Submitted by grigby1 on Wed, 03/08/2017 - 2:45pm
authentication
behavioural biometrics
behavioural sciences computing
biometrics (access control)
context independent continuous authentication
continuous authentication system
data collection software
feature extraction
keystroke
Mathematical model
message authentication
Mice
mouse usage behaviour patterns
Presses
pubcrawl170115
Training
biblio
On Accuracy of Classification-Based Keystroke Dynamics for Continuous User Authentication
Submitted by grigby1 on Wed, 03/08/2017 - 2:45pm
learning (artificial intelligence)
word total time duration
user active authentication
Training data
Training
timing
SVM
Support vector machines
support vector machine
security
pubcrawl170115
Performance
pattern classification
natural language processing
message authentication
machine learning techniques
authentication
keystroke features
keystroke dynamics authentication systems
keystroke dynamics
key duration
Kernel
K-NN
k-nearest neighbor classifier
flight time latency
feature extraction
English words
directed graphs
diagraph time latency
continuous user authentication
classification-based keystroke dynamics
biblio
Ensemble of Adaptive Algorithms for Keystroke Dynamics
Submitted by grigby1 on Wed, 03/08/2017 - 2:45pm
data streams
Training
Stacking
pubcrawl170115
message authentication
machine learning
learning (artificial intelligence)
keystroke dynamics
Ensemble
Adaptation models
biometrics (access control)
biometric system authentication
Biological system modeling
authorisation
adaptive systems
adaptive biometric systems
adaptive algorithm
biblio
Highly robust analysis of keystroke dynamics measurements
Submitted by grigby1 on Wed, 03/08/2017 - 2:44pm
Particle measurements
typing characteristics
statistical analysis
robust classification performance analysis
regularized linear discriminant analysis
pubcrawl170115
principal component analysis
Pollution measurement
pattern classification
Atmospheric measurements
MWCD-L2-LDA
minimum weighted covariance determinant estimator
message authentication
keystroke dynamics measurements
implicit weight assignment
Covariance matrices
authentication method
biblio
An efficient remote mutual authentication scheme using smart mobile phone over insecure networks
Submitted by grigby1 on Tue, 03/07/2017 - 1:37pm
session key agreement scheme
password change operation
Protocols
pubcrawl170109
remote mutual authentication protocol
remote server
secure connection
security attacks
Servers
OFMC
smart cards
smart mobile phone
Smart Mobile Phones
smart phones
telecommunication security
user anonymity
user-server impersonation attacks
Law
AVISPA
AVISPA simulator tool
CL-AtSe back-ends
Computer crime
Cryptographic Protocols
insecure networks
insider attack
key secrecy
authentication
MAS
message authentication
mobile application software
mobile computing
mobile radio
mobile user
off-line identity-password guessing attacks
biblio
Integrity Assurance in Resource-bounded Systems Through Stochastic Message Authentication
Submitted by Katie Dey on Thu, 11/12/2015 - 1:53pm
Resilient Systems
Science of Security
Foundations
SURE Project
Cyber risk analysis and incentive design
economics of security
foundations
game theory
Hierarchical Coordination and Control
message authentication
Resilient Monitoring and Control
Resilient Systems
Science of Security
Cyber risk analysis and incentive design
Hierarchical Coordination and Control
Resilient monitoring and control
biblio
Cryptanalysis of a Remote User Authentication Protocol Using Smart Cards
Submitted by BrandonB on Wed, 05/06/2015 - 2:44pm
message authentication
Yung-Cheng-Lee's protocol
verification table
user impersonation attack
smart cards
Smart card
session key
Servers
server impersonation attack
remote user authentication protocol
Protocols
password change phase
authentication
legitimacy verification
insider attacks
insecure channel
dynamic id
denial-of-service attack
Cryptography
Cryptographic Protocols
cryptanalysis
computer network security
Bismuth
biblio
Secure key management scheme based on ECC algorithm for patient's medical information in healthcare system
Submitted by BrandonB on Wed, 05/06/2015 - 1:45pm
medical information systems
wireless sensor networks
Wireless body area networks
WBAN
sensors
secure key management scheme
secure communication
public key cryptography
patient medical information protection
message authentication
Medical services
authenticated message exchange
key management
healthcare system
healthcare security
health care
Elliptic curves
Elliptic curve cryptography
ECC algorithm
body area sensor network security
body area networks
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
next ›
last »