Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
user authentication
biblio
Keystroke Dynamics based User Authentication using Deep Learning Neural Networks
Submitted by grigby1 on Fri, 03/03/2023 - 4:17pm
Neural networks
pubcrawl
Human behavior
Metrics
security
authentication
user authentication
Industries
Time series analysis
Three-dimensional displays
convolutional neural networks
keystroke analysis
passwords
keystroke dynamics
Behavioral biometrics
biblio
Security Analysis of Blockchain-based User Authentication for Smart Grid Edge Computing Infrastructure
Submitted by grigby1 on Tue, 03/22/2022 - 12:50pm
pubcrawl
user authentication
Smart Grids
smart grid security
Smart Grid
side-channel attacks
Scalability
Resiliency
resilience
ubiquitous computing
Protocols
Metrics
Internet of Things
edge computing
blockchain
authentication
security
biblio
Analysis and Evaluation of Keystroke Dynamics as a Feature of Contextual Authentication
Submitted by grigby1 on Tue, 08/17/2021 - 3:18pm
Anomaly Detection
authentication
behavioural biometrics
Context modeling
Contextual Authentication
Data models
Human behavior
keystroke analysis
keystroke dynamics
machine learning
Mathematical model
Metrics
password
pubcrawl
Urban areas
user authentication
biblio
User behavior Pattern -Signature based Intrusion Detection
Submitted by grigby1 on Mon, 03/29/2021 - 12:28pm
Intrusion Detection using Statistics
user suspicious behavior
user behavior Pattern -signature
user authentication
Statistical Based Intrusion Detection
security
Scalability
SBID model
Resiliency
resilience
pubcrawl
PIDE model
pattern recognized engine
Pattern Based Intrusion Detection
particular procedure
main concerned area
authentic user
intrusion detection system
Intrusion Detection
Human behavior
host-based IDS monitors user behavior
extensive system
expert systems
expert system
Engines
digital signatures
computer system
computer network security
Computer hacking
Computational modeling
biometrics (access control)
biometric applications
biblio
A Captcha-Based Graphical Password With Strong Password Space and Usability Study
Submitted by grigby1 on Thu, 03/18/2021 - 1:37pm
human computer interaction
visualization
visual symbols
user personal information security
user authentication
usability
smartphone
smart phones
pubcrawl
password
mobile device
mobile computing
message authentication
alphanumeric symbols
Human behavior
graphical user interfaces
Graphical Password
Entropy
composability
click symbols alphabet
captchas
Captcha-based password
Captcha security
captcha based graphical password
authorisation
authentication
biblio
Game-Like Captchas for Intrusion Detection
Submitted by grigby1 on Thu, 03/18/2021 - 1:36pm
Games
user interactions
user authentication
Support vector machines
pubcrawl
IP networks
intrusion detection system
Intrusion Detection
internet
Human behavior
Google re-captcha
authentication
game-like captchas
game play
game choices
credential stuffing
composability
captchas
biometrics (access control)
biometric authentication
authorisation
biblio
A Privacy and Authentication Scheme for IoT Environments Using ECC and Fuzzy Extractor
Submitted by aekwall on Mon, 01/18/2021 - 10:26am
IoT environments
Fuzzy Cryptography
user authentication
user anonymity
use cases
Privacy.
popular attacks
negative horizon
LightPriAuth
key establishment
insider attack
complementary elements
fuzzy extractor
authentication scheme
Smart card
IoT
ECC
Logic gates
smart cards
password
message authentication
authentication
Metrics
privacy
pubcrawl
Resiliency
Internet of Things
data privacy
Cryptography
Scalability
biblio
New Secret Key Management Technology for Blockchains from Biometrics Fuzzy Signature
Submitted by aekwall on Mon, 01/18/2021 - 10:25am
Cryptography
user authentication
Servers
security
secret key management technology
secret key management issues
Secret key management
public key cryptography
pubcrawl
key management devices
Fuzzy signature
fuzzy set theory
Fuzzy Cryptography
digital signatures
decentralized payments
key management
blockchain technology
blockchain system
biometrics-based digital signature scheme
biometrics fuzzy signature
Biometrics authentification
biometrics (access control)
biometric information
authorisation
authentication
Human behavior
Metrics
Resiliency
Scalability
biblio
Study of Trust at Device Level of the Internet of Things Architecture
Submitted by aekwall on Mon, 12/07/2020 - 11:23am
security risks
Logic gates
neural style transfer
Object recognition
Predictive Metrics
pubcrawl
Resiliency
Scalability
security risk
IoT security solutions
tamper proof
telecommunication security
Trusted Computing
Trusted Platform Module
trusted platform modules
unique device identifier
user authentication
authentication
IoT devices
IoT architecture model
Internet of Things
general Internet of Things architecture
examined IoT solutions
encryption
device management
device level encryption
cyber-physical system security
Cryptography
computer architecture
Computational modeling
composability
built-in security features
basic firewall protection
biblio
Enhancing the Performance Analysis of LWA Protocol Key Agreement in Vehicular Ad hoc Network
Submitted by aekwall on Mon, 08/03/2020 - 9:18am
telecommunication security
Resiliency
restricted lightweight authentication protocol
road accidents
road safety
road side units
Roads
RSU
Security Arrangements
Protocols
user authentication
V2CH
V2V
VANET
vehicle-to-vehicle communication
vehicular ad hoc network
vehicular ad hoc networks
pubcrawl
private key cryptography
password
NS2 simulation
NS-2 simulation
mystery keys
Metrics
LWA protocol key agreement
key agreement
India
Cryptographic Protocols
Compositionality
car safety
automobiles
authentication
Ad Hoc Network Security
1
2
3
4
next ›
last »