Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security mechanism
biblio
Research on RFID Information Security Technology Based on Elliptic Curve Algorithms
Submitted by aekwall on Mon, 03/23/2020 - 12:33pm
security mechanism
RFIDs
traditional RSA public key cryptography
storage space
RFID system
RFID information security technology
RFID information security
potential security hazard
hardware conditions
elliptic curve algorithms
elliptic curve algorithm
encryption
radiofrequency identification
Elliptic curves
Elliptic curve cryptography
security problem
public key cryptography
Mathematical model
pubcrawl
Human behavior
Resiliency
telecommunication security
biblio
Modeling Virtual Machine Migration as a Security Mechanism by using Continuous-Time Markov Chain Model
Submitted by grigby1 on Mon, 03/09/2020 - 12:26pm
Migration
VM migration
Virtual machining
virtual machines
virtual machine security
virtual machine migration modeling
static security measures
sophisticated methods
Servers
security of data
security mechanism
security
pubcrawl
probability
network topology
model migration
Adaptation models
Markov processes
intrusion
dynamic security measure
dynamic security
dynamic attack surface
destination server parameters
Destination Server
continuous-time Markov Chain model
Computational modeling
complex networks
complex network
cloud environment
cloud computing environment
Cloud Computing
biblio
Model for Study of Malware Propagation Dynamics in Wireless Sensor Network
Submitted by aekwall on Mon, 02/17/2020 - 1:35pm
Wireless Sensor Network
Susceptible-Exposed-Infectious-Recovered-Dead model
Propagation
neighboring sensor nodes
malware status
malware spread
malware propagation dynamics
malicious signals presence
Grippers
Equilibrium points
epidemiology basic reproduction number
Epidemic model
early detection method
critical security challenges
computer viruses
WSN
telecommunication security
security mechanism
Stability analysis
sensor security
detection
Analytical models
Metrics
Computational modeling
wireless sensor networks
composability
pubcrawl
Human behavior
Resiliency
invasive software
malware
biblio
A new Security Mechanism for Vehicular Cloud Computing Using Fog Computing System
Submitted by aekwall on Mon, 12/30/2019 - 11:15am
UBP
privacy
pubcrawl
Resiliency
Scalability
secure vehicular platform
security mechanism
Traffic congestion
traffic engineering computing
Prediction algorithms
user behavior profiling
VANET
VCC
vehicle computing service requests
vehicle storing service requests
vehicular cloud computing
vehicular cloud servers
Vehicular fog computing
edge computing
security
Cloud Computing
computer architecture
data privacy
Data processing
data servers
Decoy technology
distributed processing
Fog computing
encryption
energy consumption reduction
Fog Computing and Security
fog computing architecture
fog computing system
Monitoring
power aware computing
biblio
A Security Mechanism in DSR Routing for MANET
Submitted by grigby1 on Mon, 09/09/2019 - 9:56am
Resiliency
mobile ad hoc networks
mobile ad-hoc network
mobile nodes
prevention mechanism
Proposals
pubcrawl
radio range
reactive routing protocols
resilience
Metrics
route diversion
Routing Protocol
Routing protocols
RREP
security mechanism
security threads
source address
telecommunication security
wrong destination address
GDH
bandwidth constraint multihop wireless network
Compositionality
Conferences
Cryptographic Protocols
data communication
Destination address
Dsr
DSR Routing
dynamic source routing
autonomous collection
group Diffie-Hellman key management
Hash Function
intended required destination
intermediate node
intermediate trusted node start
malicious node
MANET
MANET routing
MANET security
biblio
An enhanced three-layer clustering approach and security framework for battlefeld surveillance
Submitted by grigby1 on Wed, 02/21/2018 - 12:41pm
protocol architecture
wireless sensor networks (WSNs)
wireless sensor networks
time division multiple access
three-layer hierarchical clustering approach
three-layer clustering approach
telecommunication security
security mechanism
security framework
security
Routing protocols
Routing
Resiliency
resilience
residual energy routes
pubcrawl
battlefeld surveillance
pattern clustering
network lifetime
military computing
Microelectronic Security
Metrics
malicious node
layered architectures
hierarchical works
hierarchical clustering based approach
hierarchical based formation
Energy Efficiency
energy consumption
EHCA
composability
Clustering algorithms
biblio
Collaborative security attack detection in software-defined vehicular networks
Submitted by grigby1 on Fri, 02/02/2018 - 12:14pm
security attacks
wireless communication technologies
Wireless communication
vehicular environment
vehicular ad hoc networks
VANET
V2X communication
Training
Support vector machines
support vector machine
software-defined vehicular networks
Software-defined vehicular cloud
software defined networking
short connection time
security threats
security mechanism
Ad Hoc Network Security
security
safety services
Safety
Resiliency
pubcrawl
multiclass support vector machine
Human Factors
Human behavior
computer network security
composability
Communication system security
communication devices
collaborative security attack detection mechanism
collaboration
automotive industry
biblio
Response and reconfiguration of cyber-physical control systems: A survey
Submitted by grigby1 on Mon, 02/27/2017 - 11:53am
Games
Sensor Systems
security of data
security mechanism
security
Reliability
Redundancy
pubcrawl170107
isolation mechanism
actuators
game theory
embedded systems
embedded computer
distributed embedded computing
detection mechanism
cyber-physical control system
attack protection
biblio
Improving security mechanism to access HDFS data by mobile consumers using middleware-layer framework
Submitted by BrandonB on Tue, 05/05/2015 - 7:38am
public cloud
Mobile communication
mobile computing
mobile consumers
OAuth 2.0
OAuth 2.0 protocol
one-time password generation technique
online data storage system
online stored data
Permission
Protocols
MiLAMob model
security
security mechanism
Social network services
social networking (online)
Social networking sites
storage management
Token
tokens
Yahoo
flexible user based policies
authentication
authorisation
authorization
authorization process
Cloud Computing
computing
Cryptography
Data models
encryption
Facebook
AES method
Gmail
HDFS
HDFS data access
information retrieval
IT resources
middleware
middleware-centric framework
middleware-layer framework
MiLAMob
biblio
Improved privacy-preserving authentication scheme for roaming service in mobile networks
Submitted by BrandonB on Mon, 05/04/2015 - 1:07pm
Password authentication
user authentication
user anonymity
telecommunication security
symmetric-key techniques
smart cards
Smart card
security-related issues
security mechanism
roaming service
Roaming
Protocols
authentication
offline password guessing attacks
nontamper-resistant assumption
mobile users
mobile radio
mobile networks
mobile computing
Mobile communication
message authentication
improved privacy-preserving two-factor authentication scheme
Cryptography
« first
‹ previous
1
2