Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Law
biblio
White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively
Submitted by aekwall on Mon, 07/20/2020 - 9:55am
outsourced data
white box cryptography
white-box traceablity
white-box traceable CP-ABE
outsourced data security
original key owner
malicious cloud users
fully secure traceable CP-ABE system
commitment
catch people
access credentials
cloud storage service
Context
Law
fine-grained access control
Cloud Computing
outsourcing
Metrics
composability
pubcrawl
Resiliency
cloud storage
Access Control
encryption
encrypted data
Data Security
Cryptography
authorisation
ciphertext-policy attribute-based encryption
biblio
Digital Forensics: Maintaining Chain of Custody Using Blockchain
Submitted by grigby1 on Wed, 06/03/2020 - 11:02am
Human behavior
security
Scalability
Resiliency
resilience
Reliability
pubcrawl
participants
Metrics
legislation
Law
information forensics
hyperledger composer
Human Factors
assets
encryption
distributed ledger
Distributed databases
Digital Forensics
digital evidence
Cybercrime
Cryptography
Conferences
Computer crime
chain of custody maintenance
chain of custody
blockchain
Base64
biblio
Cuckoo-RPL: Cuckoo Filter based RPL for Defending AMI Network from Blackhole Attacks
Submitted by grigby1 on Mon, 06/01/2020 - 2:58pm
Law
Wireless communication
version number attack
smart power grids
smart meters
Smart Grid
Scalability
RPL
Routing protocols
routing protocol for low-power and lossy networks
Routing
Resiliency
resilience
pubcrawl
power system security
advanced metering infrastructure
IETF ROLL working group
filtering theory
Cyber Attacks
cuckoo-RPL
cuckoo filter.
cuckoo filter based RPL
computer network security
computer network reliability
Blackhole attack
authorisation
authentication
AMI network
Advanced Metering Infrastructure (AMI)
biblio
Towards a Holistic Privacy Engineering Approach for Smart Grid Systems
Submitted by grigby1 on Mon, 03/09/2020 - 1:56pm
Privacy Engineering
smart power grids
Smart Grids
smart grid system development process
Smart Grid Privacy
smart grid engineers
Smart Grid
security of data
security
Scalability
Resiliency
resilience
pubcrawl
privacy principles
privacy enhancing technologies
collaboration
privacy
power engineering computing
Positron emission tomography
policy-based governance
Metrics
Law
Human Factors
Human behavior
holistic privacy engineering approach
energy consumers privacy
energy consumers data
data privacy
Context
composability
biblio
Smart Grid Cyber Security and Substation Network Security
Submitted by grigby1 on Mon, 03/09/2020 - 1:56pm
Smart Grid Cyber Security
NIST interoperability framework process
personnel training
policy-based governance
power system security
power system simulation
pubcrawl
resilience
Resiliency
Scalability
security architecture
Metrics
Smart Grid Privacy
smart grid-related data privacy
Smart Grids
smart power grids
standards
substation network security
substation protection
Substations
ZigBee Smart Energy
Data Minimization
Advanced Metering Infrastructure (AMI)
Advanced Security Acceleration Project for the Smart Grid
Automated Data Exchange (ADE)
collaboration
composability
computer security
consumer privacy
consumer privacy audits
cyber security controls
cyber vulnerability assessments
(ASP-SG)
data privacy
Data Security
Demand Response and Smart Grid Coalition (DRSG)
electric power infrastructure
Home Area Network (HAN)
Human behavior
Human Factors
IP Security (IPSec)
Law
biblio
WC-PAD: Web Crawling based Phishing Attack Detection
Submitted by aekwall on Mon, 03/09/2020 - 10:12am
Web crawler
nonphishing websites
phase attack detection
phishing attack detector
phishing detection approach
phishing occurrence
phishing Websites
WC-PAD
web content
Heuristics
Web crawling
Web traffics
Zero-day phishing
zero-day phishing attack detection
zero-day phishing website attacks
Security Heuristics
predictability
IP networks
government websites
cloud storage hosting sites
attackers
blacklisting
Law
Uniform resource locators
Phishing
unsolicited e-mail
Web sites
Crawlers
Computer crime
pubcrawl
Resiliency
feature extraction
Scalability
biblio
Take the rein of cyber deterrence
Submitted by aekwall on Wed, 12/18/2019 - 1:36pm
escalation control
uncertainty
surprising effect
security of data
Scalability
resilience
pubcrawl
learning (artificial intelligence)
Law
Human behavior
Complexity theory
employment law
Economics
dynamic retaliation
deterrence strategies
Deterrence
Cyberspace
cyber domain
cyber deterrence
cyber conflicts
biblio
Intrusion Detection Model of SCADA Using Graphical Features
Submitted by aekwall on Mon, 12/02/2019 - 11:04am
information scanning
time series
command injection attacks
classification model
command injection
denial of service
graphic area features
graphical features
iec 60870-5-104
message transmission
intrusion detection experiment environment
intrusion detection model
Intrusion Detection System (IDS)
Law
response injection
supervisory control and data acquisition (SCADA)
supervisory control and data acquisition system
time series features
Metrics
Protocols
Industrial Control Systems
SCADA
SCADA systems
feature extraction
Resiliency
pubcrawl
composability
security of data
pattern classification
production engineering computing
Mathematical model
Intrusion Detection
data set
power systems
data visualisation
industrial control
biblio
Secure Sign: Signing Document Online
Submitted by grigby1 on Tue, 10/15/2019 - 1:45pm
secure sign
legal offices
main security goals
Metrics
online
pubcrawl
Repudiation
resilience
Resiliency
Secure
Law
SecureSign system
sign
signatories
signatory
signature
signing documents
signing parties
user fingerprint
digital signatures
authenticity
authorisation
biometric
component
composability
contracts
Cryptography
data integrity
authentication
document
document online
electronic signature tablet
face-to-face
fingerprint reader
Fingerprint recognition
fraud
Human behavior
biblio
Central Audit Logging Mechanism in Personal Data Web Services
Submitted by grigby1 on Mon, 07/01/2019 - 9:03am
personal data Web services
web services
Web service platform
Web Service
Simple object access protocol
Servers
security of data
Security Audits
Scalability
Routing
Resiliency
resilience
pubcrawl
personal information
access logs
personal data
Law
internet
Human Factors
Human behavior
Databases
data source
central audit logging mechanism
auditing
Audit Logging
application program interfaces
API Policy
API
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »