Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
client-server systems
biblio
A Solution of Text Based CAPTCHA without Network Flow Consumption
Submitted by grigby1 on Thu, 03/18/2021 - 1:35pm
information processing
verification logic
text-based CAPTCHA
text based CAPTCHA
telecommunication traffic
software engineering
Servers
server
security risks
security
pubcrawl
network flow
information processing security issues
authorisation
Human behavior
high-security text-based CAPTCHA solution
formal verification
encryption
distributed information processing
composability
client-server systems
client malicious programs
client
captchas
CAPTCHA technology
biblio
Treats based Revisiting Defences Against Password Guessing Attacks and Phishing Data Over Different Online Records
Submitted by grigby1 on Tue, 03/09/2021 - 1:38pm
Phishing of data
Human Factors
individual data
internet
Internet clients
logins attempts
message authentication
password guessing attack
password guessing attacks resistance protocol
phishing data
Human behavior
policy-based governance
problematic endeavour
pubcrawl
real page
revisiting defences
site page
standardized savings number
uncovering delicate data
word reference ambushes
Denial of Service (DoS).
authorisation
Brute force
brute force attacks
charge card number
client-server systems
Computer crime
computer network security
cookies-based solution
Cryptographic Protocols
accommodating login
dependable page
different online records
directly wide spread
failed attempts
failed login attempt
failed login tries
full-scale number
genuine customers
biblio
A Modified Tiny Asymmetric Encryption for Secure Ftp to Network
Submitted by aekwall on Mon, 01/25/2021 - 11:56am
client-server systems
server-client innovation
secure FTP
secret key verification
modified tiny asymmetric encryption
Asymmetric Encryption
file transfer protocol
Elliptic curve cryptography
Java
Servers
Metrics
Protocols
composability
pubcrawl
Human behavior
Resiliency
private key cryptography
encryption
biblio
IoT Based Smart Video Surveillance System Using Convolutional Neural Network
Submitted by grigby1 on Mon, 01/11/2021 - 12:59pm
Raspberry Pi
microprocessor chips
Mobile Application
mobile computing
MobileNetv2-SSDLite model
object detection
object detection model
police data processing
pubcrawl
Metrics
resilience
Resiliency
Scalability
Smart video surveillance
SMS notification
video signal processing
video surveillance
Web application
crime rate
captured video
client and server architecture
client-server systems
CNN
COCO dataset
common objects in context dataset
convolutional neural nets
convolutional neural network
camera
deep learning
deep video
fully automatic video surveillance systems
image capture
Internet of Things
IoT
IoT based smart video surveillance system
learning (artificial intelligence)
biblio
Secure Federated Averaging Algorithm with Differential Privacy
Submitted by aekwall on Mon, 01/11/2021 - 12:42pm
convergence analysis
gradient methods
distributed machine learning
Gaussian noise
federated learning
message exchange
stochastic gradient descent
algorithm communication efficiency
client sensitive information
Stochastic processes
differential attacks
federating averaging algorithm
local model parameters
message obfuscation
Model averaging
secure FedAvg algorithm
secure federated averaging algorithm
composability
Scalability
Servers
data privacy
Data models
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
security of data
privacy
convergence
convergence rate
Prediction algorithms
Analytical models
client-server systems
differential privacy
biblio
Research and Implementation of Mobile Application Security Detection Combining Static and Dynamic
Submitted by aekwall on Mon, 10/05/2020 - 10:54am
automated platform for security detection of mobile application system
Dynamic Networks and Security
server security detection
security detection of mobile application
security detection combining static and dynamic
Packaging
mobile intelligent terminals trend
mobile application traffic
mobile application security detection
mobile application client
fuzzy testing method
client security detection
capture mobile application traffic
security of data
Engines
Fingerprint recognition
Mobile Applications
client-server systems
internet
Metrics
composability
pubcrawl
Resiliency
mobile computing
security
Servers
biblio
Towards Privacy in Geographic Message Dissemination for Connected Vehicles
Submitted by aekwall on Mon, 04/13/2020 - 9:06am
legal regulations
Security by Default
vehicle routing
traffic information systems
traffic information
space-filling curves
server infrastructure
Routing
road traffic
privacy-by-design principle
privacy-by-design
privacy-by-default principle
location updates
location based services
road safety
geographic relevance area
geographic message dissemination
consistent hashing
connected vehicles
Traffic Management
user privacy
client-server systems
pubcrawl
Resiliency
mobile computing
data privacy
Scalability
biblio
A Distributed Autonomic Logistics System with Parallel-Computing Diagnostic Algorithm for Aircrafts
Submitted by grigby1 on Tue, 01/21/2020 - 10:59am
pubcrawl
Logistics
machine groups
maintenance decisions-making
maintenance engineering
parallel computing
presents repairment instructions
primary control system
production engineering computing
prognostics and health management
promoted diagnostic algorithm
large-scale aircraft control center
real-time failure monitoring
real-time flight conditions
remaining life assessment
resilience
Resiliency
scale aircraft control centers
single machines
telemetry
telemetry parameters
typical diagnostic algorithms
diagnostic health assessment platform
aircraft maintenance
autonomic logistic
autonomic logistic system
client-server systems
complex operating conditions
Compositionality
computing time complexity
conceptional system
condition monitoring
dependency matrix expansion
aircraft conditions
distributed ALS
distributed autonomic logistics system
distributed system
expandability
fault diagnosis
fault location
fault points
health management system
improved diagnostic algorithm
biblio
Prevention of DDoS Attack through Harmonic Homogeneity Difference Mechanism on Traffic Flow
Submitted by grigby1 on Wed, 12/18/2019 - 1:46pm
Resiliency
internet
IP address
IP networks
malicious attackers
Metrics
numerous instances
pubcrawl
real-time systems
request packets
resilience
information technology
Servers
simple homogeneity
T-value
telecommunication traffic
time request difference
Traffic flow
transport protocol
transport protocols
zombies
distributed denial of service
CAIDA
client-server systems
composability
Computer crime
computer network security
computer networks
cyber-world
DDoS
DDoS Attack
DDoS Attack Prevention
active computer bots
distributed nature
flow count variable based prevention mechanism
harmonic homogeneity difference mechanism
homogeneity
huge financial loss
huge overhead
Human behavior
ICMP
indirect security attack
biblio
Double-Blind Reputation vs. Intelligent Fake VIP Attacks in Cloud-Assisted Interactions
Submitted by grigby1 on Fri, 04/05/2019 - 9:29am
Scalability
pubcrawl
QoS
QoS as a service paradigm
quality of service
Relays
reputation
resilience
Resiliency
probabilistic fake VIP attack strategy
Servers
signature detection cost
Stackelberg game
Stackelberg game setting
trust
trust strategy
two-dimensional Markov chains
best-response fake VIP attack strategy
Markov processes
intelligent fake VIP attacks
handwriting recognition
Games
game theory
Fake VIP attack
double-blind reputation scheme
digital signatures
demanded QoS level
demand undue QoS level
cloud-assisted interactions
Cloud Computing
client-server systems
client-server interactions
Chained Attacks
1
2
3
next ›
last »