Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
human factor
biblio
Strategic Aspects of Cyber Risk Information Sharing
Submitted by grigby1 on Wed, 01/10/2018 - 11:20am
collaboration
composability
cyber risk management
Human behavior
human factor
information theoretic security
Metrics
Policy
pubcrawl
Resiliency
Scalability
Security information sharing
biblio
Secure Group Information Exchange Scheme for Vehicular Ad Hoc Networks
Submitted by grigby1 on Wed, 01/10/2018 - 11:20am
collaboration
composability
Direction rotation alignment
Group information exchange
Human behavior
human factor
information theoretic security
Metrics
physical layer security
Policy
pubcrawl
Resiliency
Scalability
VANETs
biblio
Geometric group key-sharing scheme using euclidean distance
Submitted by grigby1 on Wed, 01/10/2018 - 11:20am
information theoretic security
wireless sensor networks
Wireless Sensor Network
sensor network
Scalability
Resiliency
pubcrawl
Policy
multicast communication
Metrics
Internet of Things
information-theoretic security
Broadcasting
human factor
Human behavior
group key sharing
geometric group key-sharing scheme
Euclidean distance
Elliptic curve cryptography
Cryptography
computational complexity
composability
collaboration
biblio
Interactive message transmission over adversarial wiretap channel II
Submitted by grigby1 on Wed, 01/10/2018 - 11:20am
Scalability
Policy
Protocols
pubcrawl
public key infrastructure
quantum computers
Random variables
Reliability
Resiliency
perfectly secure protocol family
security
telecommunication security
two-way wiretap II channel
Upper bound
wireless channels
wireless setting
Wyner wiretap II model
information theoretic security
adversarial noise
adversarial wiretap channel II
collaboration
composability
Conferences
Cryptographic Protocols
Human behavior
human factor
active adversary
interactive message transmission
interactive protocols
Jamming
jamming signal
Metrics
Mobile communication
perfect information theoretic security
biblio
Towards Information-Theoretic Security in Optical Networks
Submitted by grigby1 on Wed, 01/10/2018 - 11:20am
collaboration
composability
Human behavior
human factor
information theoretic security
Metrics
Policy
pubcrawl
Resiliency
Scalability
biblio
Mechanizing the Proof of Adaptive, Information-Theoretic Security of Cryptographic Protocols in the Random Oracle Model
Submitted by grigby1 on Wed, 01/10/2018 - 11:20am
pubcrawl
information-theoretic security
Metrics
multiparty cryptographic protocols
nonprogrammable random choices
oracle knowledge
party private count retrieval protocol
Policy
Protocols
information theoretic security
random oracle model
real-ideal paradigm
Resiliency
Scalability
security of data
Servers
Upper bound
adaptive adversaries
human factor
Human behavior
honest-but-curious security
games approach sequence
Games
game theory
game parameters
EASYCRYPT proof assistant
Databases
Cryptography
Cryptographic Protocols
concrete upper bounds
composability
Complexity theory
collaboration
biblio
An Effective Immersive Cyber Security Awareness Learning Platform for Businesses in the Hospitality Sector
Submitted by K_Hooper on Wed, 01/10/2018 - 10:11am
pubcrawl
Human Factors
immersive cyber security awareness learning platform
immersive systems
Industries
industry requirement
learning management system
paper-based training
Personnel
potential attackers
human factor
rapid digitalisation
Resiliency
secured interaction
security breaches
security of data
Systematic Requirement Engineering
threat analysis
Training
gamification elements
composability
computer games
computer science education
computer security
cyber-attacks
cyber security awareness
cyber security program
E-Learning
Gamification
Companies
Hospitality
hospitality businesses
hospitality employees
hospitality industry
hospitality sector
hotel industry
Human behavior
human error
biblio
SPICE: A Software Tool for Bridging the Gap Between End-user's Insecure Cyber Behavior and Personality Traits
Submitted by grigby1 on Mon, 04/24/2017 - 10:45am
computer security
Human behavior
human factor
personality traits
Phishing
phishing attack
pubcrawl
software psychology
test-bed
biblio
Security configuration analytics using video games
Submitted by BrandonB on Mon, 05/04/2015 - 1:26pm
security of data
NetMaze
network configuration verification problem
network topology
provable mapping
provable verification
security
Security analysis
security configuration analytics
security configuration settings
Human Factors
security property
simulation tool
special languages
specification languages
system robustness
Topology
user interfaces
video games
Vulnerability
crowdsourcing
attack analysis
attack attribution
Communication networks
Computational modeling
computer games
computing systems
Conferences
configuration conflict
courseware
3D game object
educational software
formal methods
formal verification
game educational value
game interface
gameplay scenario
Games
human factor
« first
‹ previous
…
9
10
11
12
13
14
15
16
17