Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security level
biblio
Local-Encoding-Preserving Secure Network Coding for Fixed Dimension
Submitted by grigby1 on Thu, 12/05/2019 - 10:47am
linear codes
telecommunication security
SLNC
security-level pairs
security level
secure linear network code
Resiliency
resilience
Random variables
pubcrawl
polynomial-time algorithm
network coding
Metrics
lower bound
local-encoding-preserving secure network coding
local encoding kernel
edge detection
Kernel
information-theoretic security
information theoretic security
Information rates
information rate
Image edge detection
fixed dimension
field size
encoding
Cryptography
computational complexity
Compositionality
coding theory
security
biblio
Security Assessment of Libyan Government Websites
Submitted by grigby1 on Wed, 10/23/2019 - 12:39pm
security issues
Reconnaissance
resilience
Resiliency
Safety
Scalability
secure programming practices
security assessment
security assessment results
pubcrawl
security level
security of data
security policies
SSL Trust Models
vulnerability assessment
Web sites
Website Vulnerability
internet
Cryptography
data privacy
E-Government
encryption
Government
government data processing
Human behavior
In formation Security
Computer crime
Libya E-government
Libyan government websites
Metrics
Penetration Testing
privacy
privacy polic
Privacy Policy
biblio
Security-Enhanced Signaling Scheme in Software Defined Optical Network
Submitted by grigby1 on Wed, 09/11/2019 - 2:44pm
security level
pubcrawl
public key cryptography
public key infrastructure
resilience
Resiliency
SDON
security
security improvement
Protocols
security-enhanced signaling
security-enhanced signaling procedure
Software
software defined networking
Software Defined Networks
software defined optical network
telecommunication security
telecommunication signalling
internet
communication security issue
composability
connection success rate performance
Cryptographic Protocols
current OpenFIow protocol
digital signatures
end-to-end trusted service connection
Energy Internet services
backbone optical networks
large-scale optical network
message feedback
Metrics
Microelectronics Security
openflow protocols
Optical feedback
Optical fiber networks
optical switches
biblio
Cybersecurity assurance control baselining for smart grid communication systems
Submitted by aekwall on Mon, 08/05/2019 - 10:42am
Smart Grid
Resiliency
security assurance controls
security baseline
security categorization
security impact levels
security level
security levels
security of data
Security Technical Implementation Guides
security zone
recent innovative risk-based approaches
smart grid communication networks
smart grid communication systems
smart grid security architecture
smart grid system architecture
Smart Grids
standards
Systems Security
technical functional controls
US Defense Information Systems Agency
Human behavior
assurance
assurance baseline
Business
composability
computer security
control systems
cybersecurity assurance base lining concepts
cybersecurity assurance control baselining
cybersecurity assurance controls
Networked Control Systems Security
IEC standards
industrial automation
Information Assurance
Information systems
key cybersecurity control baselining
Metrics
national security systems
policy-based governance
pubcrawl
biblio
A Dynamic-Key Secure Scan Structure Against Scan-Based Side Channel and Memory Cold Boot Attacks
Submitted by grigby1 on Fri, 04/05/2019 - 10:29am
memory attack
Side-channel attack
side channel attack
security level
security
secure scan architecture
scan design key generator
Scalability
Resiliency
resilience
Random access memory
pubcrawl
memory cold boot attack
memory attacks
Chained Attacks
integrated circuit testing
Hardware Security
Generators
flip-flops
dynamic-key secure scan structure
dynamic-key secure DFT structure
dynamic key generation
Discrete Fourier transforms
design for testability
design for test technology
Cryptography
Controllability
Clocks
biblio
A Proposed Security Evaluation Method for Bluetooth E0Based on Fuzzy Logic
Submitted by aekwall on Mon, 04/01/2019 - 10:06am
Fuzzy logic
transmitted data
telecommunication security
security level
security evaluation method
secure communication
Resiliency
pubcrawl
Human behavior
Fuzzy sets
fuzzy set theory
fuzzy logic technique
attacks
Entropy
encryption
eavesdropping
E0
cryptosystem designers
Cryptography
Correlation
composability
bluetooth security
Bluetooth E0encryption system
Bluetooth
biblio
Lightweight Security Signaling Mechanism in Optical Network for Smart Power Grid
Submitted by aekwall on Mon, 03/18/2019 - 9:54am
Protocols
trusted connection
smart power grids
smart power grid environment
Smart Grids
smart grid security
Smart Grid
signaling interaction
signaling encryption
security signaling
security level
security improvement
security
Scalability
Resiliency
pubcrawl
backbone optical networks
power engineering computing
optical receivers
optical fibre networks
Optical fiber networks
multidomain communication services
multi-domain optical network
Metrics
lightweight security signaling protocol
lightweight security signaling mechanism
large-scale multidomain optical network
internet
computer network security
communication security issue
Bandwidth
biblio
Cryptographic protocol for multipart missions involving two independent and distributed decision levels in a military context
Submitted by grigby1 on Wed, 05/16/2018 - 1:47pm
Metrics
security levels
security level
secure protocol
secure cryptographic protocol
secrecy
Resiliency
resilience
Repudiation
pubcrawl
non-repudiation
multipart missions
multipart military missions
military mission
military context
military computing
authentication
man-in-the-middle attack
Logistics
internet
independent distributed decision levels
independent decision
human factor
Human behavior
encryption
distributed decision
digital signatures
decision level
Cryptographic Protocols
cryptographic protocol
critical military missions
composability
biblio
Multidimensional Diversity Employment for Software Behavior Encryption
Submitted by BrandonB on Wed, 05/06/2015 - 9:54am
multidimensional software diversity employment
system resilience
System recovery
spatiotemporal software behavior encryption
Spatiotemporal phenomena
software monoculture
software fault tolerance
Software
security provisioning
security level
Runtime
resilience
online programmable software-execution foundation separating logic
multidimensional systems
autonomic failure recovery mechanism
moving target defense
encryption
Employment
diffusion levels
Cryptography
confusion levels
computational cost
computational complexity
ChameleonSoft recovery mechanisms
ChameleonSoft Behavior Encryption
CBE mechanism
behaviorally-mutated functionally-equivalent code variants
avalanche effect percentage
biblio
Multidimensional Diversity Employment for Software Behavior Encryption
Submitted by BrandonB on Tue, 05/05/2015 - 11:22am
multidimensional software diversity employment
system resilience
System recovery
spatiotemporal software behavior encryption
Spatiotemporal phenomena
software monoculture
software fault tolerance
Software
security provisioning
security level
Runtime
resilience
online programmable software-execution foundation separating logic
multidimensional systems
autonomic failure recovery mechanism
moving target defense
encryption
Employment
diffusion levels
Cryptography
confusion levels
computational cost
computational complexity
ChameleonSoft recovery mechanisms
ChameleonSoft Behavior Encryption
CBE mechanism
behaviorally-mutated functionally-equivalent code variants
avalanche effect percentage
« first
‹ previous
1
2
3
next ›
last »