Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security threat
biblio
Prevention of denial of service attack over vehicle ad hoc networks using quick response table
Submitted by grigby1 on Wed, 06/20/2018 - 12:39pm
Throughput
Resiliency
Routing
Routing protocols
secure communication
Secure Routing
security
security mechanisms
security threat
Sybil attack
threats
resilience
tunnels
V2I
V2V
VANET
vehicle ad hoc networks
vehicular ad hoc networks
wireless
wireless adhoc network
Wireless communication
gray hole
attack prevention
black hole
Bridges
common attacks
Compositionality
computer network security
delays
denial of service attack
DoS
dynamic topology
Analytical models
high mobility environment
infrastructure based network
MANET
Metrics
Mobile adhoc Network
network performance
packet drop
pubcrawl
quick response table
biblio
Ransomware: The CryptoVirus Subverting Cloud Security
Submitted by grigby1 on Tue, 02/06/2018 - 1:54pm
security
malware
Metrics
pubcrawl
Ransomware
ransomware attack
ransomware vulnerabilities
Resiliency
Scalability
IT security specialists
security effectiveness
security threat
Servers
threats
ubiquitous computing
Ubiquitous Computing Security
ubiquitous environment
vulnerabilities
cloud threat mechanisms
business enterprises
cloud
Cloud architecture
Cloud Computing
cloud network
cloud platforms
Cloud Security
cloud technology
Business
computer architecture
computer viruses
Cryptography
CryptoVirus
disparate locations
Human behavior
Human Factors
information technology
biblio
Redesigning QR Code Ecosystem with Improved Mobile Security
Submitted by grigby1 on Wed, 03/08/2017 - 2:24pm
mobile marketing
Software
security threat
security risks
risk analysis
redesigned QR code ecosystem
QR codes
QR code
public key infrastructure
Public key
pubcrawl170112
Mobile Security
advertising
mobile computing
life cycle
information system
Ecosystems
Ecosystem
digital signatures
digital signature mechanism
digital signature
Decoding
authentication
advertising campaigns
biblio
Improving security decision under uncertainty: A multidisciplinary approach
Submitted by grigby1 on Tue, 03/07/2017 - 1:43pm
requirements engineering
uncertainty
software engineering
security threat
security risk
security of data
security decision-making
security
risk management
risk assessment
Risk
Companies
quantitative decision analysis
pubcrawl170109
modelling language
identity theft
decision-making
Decision Making
crime script
crime science
Credit cards
biblio
An intelligent system for user behavior detection in Internet Banking
Submitted by grigby1 on Tue, 03/07/2017 - 1:36pm
security
Internet-based development
loyal customers
Online banking
online banking systems
prosperity
pubcrawl170109
receiver operating characteristic curve
Receivers
Internet fraud
security of data
security threat
sensitivity analysis
suspicious behaviors
Suspicious Financial Transactions
user abnormal behavior
user behavior detection
virtual societies
financial crime
Banking
banking profitability
behavioural sciences computing
Credit cards
customer satisfaction
Cyber Attacks
e-banking services security
expert systems
Anti-money Laundering
fraud
fuzzy expert system
fuzzy systems
fuzzy theory
intelligent system
Intelligent systems
internet
Internet banking
biblio
Key Management for Static Wireless Sensor Networks With Node Adding
Submitted by BrandonB on Wed, 05/06/2015 - 1:44pm
random processes
wireless sensor networks (WSNs)
wireless sensor networks
transitory master key
telecommunication security
telecommunication network management
symmetric key management scheme
symmetric encryption
static wireless sensor network
security threat
secure communication
random seed distribution
Cryptographic Protocols
random key distribution
Protocols
protocol
Materials
Knowledge engineering
key management
Informatics
hardware tampering
eavesdropping
Cryptography
biblio
A Finite State Hidden Markov Model for Predicting Multistage Attacks in Cloud Systems
Submitted by BrandonB on Thu, 04/30/2015 - 2:16pm
risk model
multistaged cloud attack
occurrence probability
Prediction algorithms
prediction of multi-staged attacks
Predictive models
probability
risk analysis
risk assessment
multistage attacks
security
security of data
security risk
security technology
security threat
sensors
Vectors
early warning alerts
adaptive risk approach
auto response controller
autonomous cloud intrusion detection framework
Cloud Computing
cloud resources
cloud systems
Correlation
DARPA 2000 dataset
ACIDF
early warnings
finite state hidden Markov model
finite state hidden Markov prediction model
Hidden Markov models
HMM
intrusion prevention
LLDDoS1.0 attack
« first
‹ previous
1
2