Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security level
biblio
Identifying Security Requirements for Smart Grid Components: A Smart Grid Security Metric
Submitted by grigby1 on Fri, 01/13/2023 - 4:20pm
critical infrastructure
risk management
security
pubcrawl
Metrics
Smart Grids
Measurement
Security Metrics
power systems
risk assessment
Costs
metric
Securitisation Need
security level
SGAM
biblio
How to Quantify the Security Level of Embedded Systems? A Taxonomy of Security Metrics
Submitted by grigby1 on Mon, 08/02/2021 - 3:40pm
assurance
Conferences
embedded systems
evaluation
Hardware
Measurement
Metrics
metrics testing
pubcrawl
Quantitative Security
security
security level
security measurement
Security Metrics
Software
taxonomy
biblio
Performance Analysis on Enhanced Round Function of SIMECK Block Cipher
Submitted by grigby1 on Tue, 03/09/2021 - 2:39pm
enhanced round function
policy-based governance
Human Factors
security measurements
Performance analysis
lightweight block ciphers
security requirements
resource-constrained devices
Internet of Things technologies
security level
algorithm design
enhanced ARX structure
Cryptography
LBC
IoT
encryption time
SIMON
SIMECK family block cipher
avalanche effect
Brute-force Attack
brute force attacks
software performance evaluation
Internet of Things
biblio
Dynamic Model of Cyber Defense Diagnostics of Information Systems With The Use of Fuzzy Technologies
Submitted by aekwall on Mon, 01/18/2021 - 11:34am
fuzzy technologies
cryptographic level
cyber defense diagnostics
cyber defense systems
cyberattack intensity
cybersecurity status
delayed differential equation theory
dynamic model
fuzzy function
differential equations
information activity
logical fuzzy function
membership function
negative consequence probability
probability distribution density.
security status diagnosis
Fuzzy Cryptography
Trojan horses
Scalability
Cryptography
Task Analysis
information security
Resiliency
pubcrawl
Metrics
Cybersecurity
cyberattack
Fuzzy logic
probability
fuzzy set theory
security level
Information systems
information system
cyberattacks
biblio
The Cryptocurrency Simulation using Elliptic Curve Cryptography Algorithm in Mining Process from Normal, Failed, and Fake Bitcoin Transactions
Submitted by grigby1 on Fri, 09/04/2020 - 3:59pm
ECC algorithm
transaction process
total processing time
time 6.0 s
time 152.0 s
securing transactions
scenario
RSA processing time
RSA algorithm
normal bitcoin transactions
mining process
high-level security
fake bitcoin transactions
Elliptic Curve Cryptography algorithm
Elliptic curve cryptography (ECC)
efficient processing time
Scalability
cryptography algorithms
cryptocurrency transaction
cryptocurrency simulation
Cryptocurrency security
appropriate algorithm
transaction processing
bitcoin security
bitcoin
cryptocurrency
security level
Human behavior
pubcrawl
public key cryptography
digital signatures
Cryptography
biblio
Security Enhancement in Storage Area Network
Submitted by grigby1 on Fri, 08/28/2020 - 3:55pm
security level
resilience
Resiliency
SAN
SAN Perfromance factors
SAN protocols
SAN security framework
Scalability
security
security enhancement
public clouds
security perspective
security solution
security vulnerabilities
Servers
storage area network
Storage area networks
storage management
storage technologies
information security
cashing technologies
centralized secure place
computer network security
DAS
digital transformation
direct attached storage
Distributed databases
distributed storage technology
geographical remote locations
big data security metrics
IP networks
network attached storage
Optical fiber LAN
Optical fibers
private clouds
private nodes
Protocols
pubcrawl
biblio
Research on Security Self-defense of Power Information Network Based on Artificial Intelligence
Submitted by grigby1 on Thu, 08/13/2020 - 5:06pm
power system
artificial intelligence security
self-defense research
self-defense
power information network security
network security attack
defense drills
security level
Clustering algorithms
power system stability
Monitoring
network security
information networks
Communication networks
power system security
power engineering computing
electricity
computer network security
pubcrawl
Artificial Intelligence
biblio
Fault tolerant non-linear techniques for scalar multiplication in ECC
Submitted by aekwall on Mon, 07/06/2020 - 9:57am
asymmetric cryptography algorithms
shorter key length
Scalar multiplication point
nonlinear error detection codes
injected faults
faulty results
fault tolerant nonlinear techniques
Fault Tolerant
false information
error detection codes
elliptic curve scalar multiplication point
cryptographic computations
case channel error detection codes
Scalability
cryptology
ECC
Elliptic curve cryptography
security level
public key cryptography
fault tolerant computing
Metrics
policy-based governance
pubcrawl
Human behavior
Resiliency
encryption
biblio
Security Analysis of Forward Error Correction Codes in Relay Aided Networks
Submitted by aekwall on Mon, 04/06/2020 - 9:56am
relay aided networks
Metrics
network coding
nonfunctional requirements
physical layer security
physical layer security scheme
physical layer security techniques
Predictive Metrics
pubcrawl
random error vector
Receivers
relay aided network security
McEliece cryptosystem.
Relays
Reliability
Resiliency
secure communication
security
security level
security performance
transmission
transmitted information
wireless sensor networks
Error control codes
composability
cryptographic methods
Cryptography
cyber physical systems
data confidentiality
decentralized relay nodes
Decoding
eavesdropper
encoding
energy efficiency requirements
Channel models
error correction codes
error probability
error statistics
FEC coding schemes
forward error correction
forward error correction codes
Golay codes
industrial wireless sensor networks
IWSN setups
iwsns
biblio
Metrics and Techniques for Early Detection in Communication Networks
Submitted by grigby1 on Mon, 03/09/2020 - 2:38pm
Anomaly Detection
Communication networks
early detection
early detection anomaly technique evaluation
Information systems
Measurement
Medical services
pubcrawl
security
security level
Security Metrics
security of data
time aware metrics
time-aware metrics
1
2
3
next ›
last »