Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
message authentication
biblio
Extending Authentication Mechanism to Cooperate with Accountable Address Assignment
Submitted by grigby1 on Fri, 05/22/2020 - 2:13pm
IPv6
wireless networks
user authentication
Source Address Validation Improvement
security problems
SAVI
Resiliency
resilience
pubcrawl
Protocols
privacy
Portals
network accountability
Metrics
message authentication
main identity authentication mechanism
802.1X
IP source addresses
IP networks
IP addresses
internet
effective accountability mechanisms
DHCP request process
computer network security
composability
CAIP
authentication
accounting ability
Accountable IP address assignment
Accountable IP
accountable identity
accountable address assignment
biblio
Trustworthy configuration management for networked devices using distributed ledgers
Submitted by aekwall on Mon, 05/11/2020 - 11:28am
distributed execution environment
network accountability
blockchain-based distributed ledger
Building automation
Byzantine fault tolerant configuration management system
CMS
Configuration Management
configuration management process
critical configurations
data leaks
distributed ledgers
individual malicious administrators
industrial sites
IT systems
multiparty authorization
networked devices
process control
strong connection
targeted devices
trustworthy configuration management
fault tolerant computing
authorisation
authorization
Organizations
Internet of Things
IoT applications
Resiliency
pubcrawl
composability
Metrics
security of data
message authentication
security threats
Proposals
control engineering computing
fault tolerance
Traceability
physical world
Fabrics
biblio
ECU Fingerprinting through Parametric Signal Modeling and Artificial Neural Networks for In-vehicle Security against Spoofing Attacks
Submitted by grigby1 on Fri, 05/08/2020 - 2:44pm
parametric signal modeling
ECU fingerprinting
eight-channel lengths
electronic control unit (ECU)
feature-set
Image edge detection
in-vehicle control networks
in-vehicle security
Intrusion Detection System (IDS)
lumped element model
Lumped element model (LEM)
machine learning (ML)
modern electric vehicles
on-board communications
data theft
performance matrix (PM)
Physical layer
received signal
receiver operating characteristic (ROC)
spoofing attacks
traditional cybersecurity methods
Transfer functions
transmitted messages
transmitter
Transmitters
transmitting electronic control unit
unique transfer function
Neural Network Security
artificial neural network (ANN)
pubcrawl
policy-based governance
collaboration
computer network security
message authentication
telecommunication security
Cryptographic Protocols
Protocols
neural nets
Metrics
confidentiality
neural network
Artificial Neural Networks
Neural networks
autonomous vehicles
basic security features
CAN messages
CAN network
channel imperfections
channel-specific step response
communication system
Connected autonomous vehicles
control system parameters
Controller area network (CAN)
controller area network protocol
controller area networks
biblio
An Innovative Model (HS) to Enhance the Security in Windows Operating System - A Case Study
Submitted by grigby1 on Fri, 04/17/2020 - 11:27am
NT LAN manager
Windows Registry
Windows Operating System Security
Windows operating system
Windows
SAM security account manager
SAM file protection
Resiliency
resilience
pubcrawl
privacy
password
NTLM
attacks
Microsoft Windows (operating systems)
Metrics
message authentication
login credentials
HS model
force attacks
dictionary attacks
Data Security
Data protection
data integrity
composability
authorisation
biblio
Machine Learning Models for Activity Recognition and Authentication of Smartphone Users
Submitted by aekwall on Mon, 04/06/2020 - 10:06am
Smartphone Authentication
pattern locks
technological advancements
smartphone users
smartphone embedded sensor data
personal identification numbers
daily physical activity
daily activities
Behavioral biometrics
authentication scheme
Activity Recognition
Scalability
private data
biometrics (access control)
message authentication
machine learning model
smart phones
machine learning
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
biblio
Encrypted QR Code Based Optical Challenge-Response Authentication by Mobile Devices for Mounting Concealed File System
Submitted by aekwall on Mon, 03/30/2020 - 11:39am
QR codes
QR code technologies
QR code exchanges
Portable computers
optical challenge-response authentication
optical challenge response
mounting concealed file system
mounting authentication scheme
mounting authentication
encrypted QR code
Data Breach
challenge-response scheme
mobile devices
private key cryptography
smart phones
public key cryptography
Mobile Security
cyber physical systems
message authentication
authentication
Cryptography
Ransomware
pubcrawl
Resiliency
mobile computing
invasive software
biblio
A Secure Blockchain-Based Group Mobility Management Scheme in VANETs
Submitted by grigby1 on Fri, 03/27/2020 - 11:28am
Security analysis
Protocols
pubcrawl
resilience
Resiliency
Safe Coding
safe transportation
secure blockchain-based group mobility management scheme
secure group mobility management scheme
security
policy-based governance
security functionalities
significant overload
smooth handovers
telecommunication security
VANET
VANETs
vehicular ad hoc networks
Vehicular Ad-hoc Network
high mobility
blockchain
collaboration
Distributed Mobility Management
distributed mobility management protocol
DMM solutions
frequent handovers
group communication scenario
Handover
handover authentication
authentication
Human behavior
Human Factors
message authentication
Metrics
mobility management (mobile radio)
network architecture
network entities
next generation mobile network
biblio
RFID-assisted Continuous User Authentication for IoT-based Smart Farming
Submitted by aekwall on Mon, 03/23/2020 - 1:32pm
machine data
agricultural contractors
agricultural machines
collaborative agricultural processes
farm management information systems
farm-internal interconnection
FMIS
in-field data exchange
interconnected machinery
IoT-based smart Farming
electronic data interchange
Machinery
Management information systems
NFC
Radio Frequency Identification-based continuous user authentication
RFID-assisted continuous user authentication
Smart Farming
sustainable resource management
RFIDs
authentication
authorization
Internet of Things
security
Resiliency
Human behavior
pubcrawl
Business
sustainable development
Servers
public domain software
message authentication
security architecture
radiofrequency identification
RFID
Agriculture
groupware
Decision support systems
biblio
NAuth: Secure Face-to-Face Device Authentication via Nonlinearity
Submitted by grigby1 on Wed, 03/18/2020 - 12:27pm
mobile computing
Secure File Sharing
resilience
Resiliency
pubcrawl
user intervention
telecommunication security
size 20.0 cm
short distance file transfer
secure face-to-face device authentication
secure authentication
pairing schemes
Nonlinear distortion
Nhuth
mobile devices
authentication
microphones
message authentication
location-sensitive authentication mechanism
location-based-validation model
Harmonic analysis
face-to-face scenarios
face-to-face device-to-device communication
face-to-face D2D
Device-to-device communication
device legitimacy
device authentication consistency
critical security problem
Acoustics
acoustic nonlinearity patterns
biblio
Towards Achieving a Secure Authentication Mechanism for IoT Devices in 5G Networks
Submitted by aekwall on Mon, 03/16/2020 - 10:34am
Internet of Things
telecommunication security
security mechanisms
secure authentication mechanism
Scalable Security
Scalability
pubcrawl
NB-IOT
Narrowband IoT
mobile network infrastructure
Mobile Identity Management
message authentication
IoT security
IoT platform
IoT device
composability
Identity provider
Identity management
edge computing
Cross-Layer Security
Conferences
Computer crime
Cloud Computing
cellular radio
cellular network architecture
cellular IoT
5G networks
5G mobile communication
Cross Layer Security
Resiliency
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »