Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
human factor
biblio
Decoding of Mind-Generated Pattern Locks for Security Checking Using Type-2 Fuzzy Classifier
Submitted by grigby1 on Tue, 11/26/2019 - 2:34pm
resilience
Human Factors
Interval Type-2 Fuzzy Classifier
mind-generated pattern locks
neurological disorder
neuromuscular disability
P300 signals
pattern locks
pubcrawl
human factor
Resiliency
Scalability
security
security checking
signal classification
Training
type-2 fuzzy classifier
electroencephalography
BCI paradigm
BCI system
biometric security option
biometrics (access control)
brain-computer interface system
brain-computer interfaces
Decoding of Pattern Locks
electroencephalogram signals
Band-pass filters
Event RelatedPotentials
feature extraction
Firing
fuzzy set theory
Fuzzy sets
handicapped aids
Human behavior
biblio
An Implementation and Evaluation of Progressive Authentication Using Multiple Level Pattern Locks
Submitted by grigby1 on Tue, 11/26/2019 - 2:34pm
multiple pattern scheme
user authentication
Usable Security
usability
statistical analysis
Sensitivity
sensitive applications
Scalability
Resiliency
resilience
pubcrawl
progressive authentication
Pins
pattern locks
pattern lock
password
access levels
multiple level pattern
mobile computing
message authentication
median unlock times
low-security applications
Human Factors
human factor
Human behavior
higher-complexity pattern
graphical passwords
geriatrics
generic applications
consecutive user survey
authentication
Android pattern lock
biblio
A Social Engineer in Terms of Control Theory
Submitted by grigby1 on Thu, 09/05/2019 - 10:27am
password
tools
terminal model
telecommunication control
social engineering
social engineer
security of data
security
Resiliency
resilience
pubcrawl
psychology
Planning
communication algorithms
nonstochastic communication object
information security specialists
information security
human model
human factor
Handheld computers
effective communication
Control Theory
contracts
composability
communication process
communication control system
biblio
Practical and Secure Outsourcing of Discrete Log Group Exponentiation to a Single Malicious Server
Submitted by grigby1 on Wed, 09/05/2018 - 9:45am
exponentiation
Control Theory
Cryptography
discrete logarithms
group theory
Human behavior
human factor
modular exponentiations
privacy
pubcrawl
resilience
Resiliency
Scalability
secure delegation
secure outsourcing
biblio
Design-time Quantification of Integrity in Cyber-physical Systems
Submitted by grigby1 on Wed, 09/05/2018 - 9:45am
Control Theory
cyber-physical systems
Human behavior
human factor
Information Flow
non-interference
privacy
pubcrawl
resilience
Resiliency
Scalability
security
biblio
Synthesis of Probabilistic Privacy Enforcement
Submitted by grigby1 on Wed, 09/05/2018 - 9:45am
Bayesian inference
Control Theory
Human behavior
human factor
privacy
Privacy Enforcement
Program Synthesis
pubcrawl
resilience
Resiliency
Scalability
biblio
Classifying and Comparing Attribute-Based and Relationship-Based Access Control
Submitted by grigby1 on Wed, 09/05/2018 - 9:45am
ABAC
Access Control
attribute
Control Theory
Human behavior
human factor
privacy
pubcrawl
rebac
relationship
resilience
Resiliency
Scalability
biblio
A Type System for Privacy Properties
Submitted by grigby1 on Wed, 09/05/2018 - 9:44am
Control Theory
Human behavior
human factor
privacy
Protocols
pubcrawl
resilience
Resiliency
Scalability
Symbolic models
type systems
biblio
Privacy Protection Dashboard: A Study of Individual Cloud-Storage Users Information Privacy Protection Responses
Submitted by grigby1 on Wed, 09/05/2018 - 9:44am
pubcrawl
Cloud Computing
Control Theory
Human behavior
human factor
information privacy
item response theory
Metrics
privacy
protection motivation theory
resilience
Resiliency
Scalability
User behavior
user privacy in the cloud
biblio
An Optimal Fully Homomorphic Encryption Scheme
Submitted by grigby1 on Wed, 09/05/2018 - 9:39am
Kronecker product
user data protection
tensor theory
system analysis and design
security concern
Scalability
Resiliency
resilience
pubcrawl
privacy concern
privacy
optimal fully homomorphic encryption scheme
O-FHE scheme
Mathematical model
Algorithm design and analysis
KP
human factor
Human behavior
fully homomorphic encryption
FHE scheme
encryption
distributed computing
Data processing
Cybersecurity
Cryptography
Computing Theory
Cloud Computing
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »