Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security threats
biblio
A Survey on Blockchain for Bitcoin and Its Future Perspectives
Submitted by grigby1 on Fri, 03/31/2023 - 11:29am
education
user privacy
blockchain security
bitcoin security
Bitcoin Attacks
Proof of Work
security threats
Hazards
Human Factors
blockchain
Technological innovation
Online banking
bitcoin
smart contracts
Scalability
Human behavior
pubcrawl
biblio
PortSec: Securing Port Knocking System using Sequence Mechanism in SDN Environment
Submitted by grigby1 on Fri, 01/13/2023 - 12:49pm
security
pubcrawl
resilience
Resiliency
Scalability
Protocols
Wireless communication
control systems
SDN
Firewalls (computing)
Security by Default
security threats
Behavioral sciences
P4 programming
Port knocking Security
Ports (Computers)
biblio
Vulnerabilities and Security Threats for IoT in Transportation and Fleet Management
Submitted by grigby1 on Fri, 05/20/2022 - 3:46pm
Internet of Things
security
pubcrawl
Human behavior
resilience
Resiliency
privacy
Metrics
Intelligent Transportation Systems
Transportation
Automobiles Tracker
Fleet Management
GPS/GPRS
real-time
security threats
threat mitigation
biblio
Using Machine Learning for Intrusion Detection System in Wireless Body Area Network
Submitted by aekwall on Wed, 08/11/2021 - 2:30pm
wireless sensor networks
security threats
machine learning
machine learning algorithms
Wireless communication
pubcrawl
Resiliency
composability
Noise measurement
Artificial Neural Networks
intrusion tolerance
body area networks
denial of service
Intrusion Detection Systems
wireless body area network
biblio
Security Issues With Fog Computing
Submitted by aekwall on Mon, 06/28/2021 - 12:34pm
Fog computing
security
Cloud Computing
computer architecture
edge computing
Fog Computing and Security
Medical services
pubcrawl
quality of service
Resiliency
Scalability
security threats
Servers
solutions
biblio
Study of Security Flaws in the Linux Kernel by Fuzzing
Submitted by aekwall on Thu, 06/24/2021 - 11:54am
Kernel
vulnerabilities
use-after-free
tools
Syzkaller
stack overflow
security threats
security
Protocols
Linux Operating System Security
Linux
Operating systems security
Industrial engineering
fuzzing
composability
Automated Response Actions
pubcrawl
Metrics
composabilty
resilience
Resiliency
biblio
Media Forensics and DeepFakes: An Overview
Submitted by grigby1 on Thu, 04/08/2021 - 5:11pm
fake media
Media
multimedia computing
Deepfakes
Information integrity
data-driven forensic methods
deep learning tools
digital image forensics
elections
Videos
false multimedia content
forensic tools
Media Forensics
real media
realistic fake images
synthetic media
Video Forensics
visual media integrity verification
fraud
learning (artificial intelligence)
Digital Forensics
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
deep learning
security threats
neural nets
Forensics
software packages
public opinion
information forensics
generative adversarial networks
biblio
Safe and secure software updates on high-performance embedded systems
Submitted by grigby1 on Mon, 03/29/2021 - 11:56am
Metrics
traditional certification practices
system dependability
standards
security threats
security of data
security
secure software updates
Safety
Resiliency
resilience
regular software updates
pubcrawl
potentially infinite scenarios
post-deployment evidence
OTASU
Artificial Intelligence
interconnected system resilient
high-performance embedded systems
high performance scale
high computing demands
hardware platform
hardware complexity
extended networking technologies
embedded systems
dependable embedded systems
computational complexity
composability
certification
autonomous systems
automobiles
artificial intelligence algorithms
biblio
Covert Channels of Data Communication
Submitted by grigby1 on Wed, 02/10/2021 - 12:50pm
Compositionality
protected operating system
mandatory access control
Linux operating system
Linux kernel
data communication
covert channels
covert storage channels
confidential information
authorisation
Linux
security threats
Access Control
Scalability
Resiliency
resilience
pubcrawl
biblio
Preventive Techniques of Phishing Attacks in Networks
Submitted by grigby1 on Wed, 02/03/2021 - 2:02pm
malware
Web sites
spam
social engineering
security threats
Scalability
Resiliency
resilience
pubcrawl
phishing attack preventive techniques
Phishing
online businesses
online applications
network security
Anti-phishing
machine learning
internet
information technology
information security
Human Factors
Human behavior
honey pots
Honey Pot
fake Websites
fake applications
Electronic mail
e-hunting websites
Computer crime
1
2
3
4
5
6
7
8
9
next ›
last »