Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information protection
biblio
Access Distribution to the Evaluation System Based on Fuzzy Logic
Submitted by grigby1 on Fri, 07/28/2023 - 3:33pm
information technology
mamdani fuzzy inference
fuzzy system
MATLAB
information protection
Fuzzy logic
computer security
real-time systems
information system
security
Computational modeling
Hardware
Software
Resiliency
resilience
Metrics
pubcrawl
biblio
Expert Assessment of Information Protection in Complex Energy Systems
Submitted by grigby1 on Fri, 07/21/2023 - 1:29pm
security
pubcrawl
Human behavior
resilience
Resiliency
Scalability
Decision Making
Data processing
expert systems
information protection
energy system
expert assessment
biblio
Acceptable Variants Formation Methods of Organizational Structure and the Automated Information Security Management System Structure
Submitted by grigby1 on Fri, 09/30/2022 - 10:29am
Information systems
automated control systems
Resiliency
information protection
control
information theoretic security
Compositionality
Cybersecurity
Task Analysis
control systems
computer security
information security
composability
Scalability
Instruments
resilience
collaboration
policy-based governance
Human Factors
Human behavior
pubcrawl
biblio
Information Protection of International Students Based on Network Security
Submitted by grigby1 on Wed, 07/13/2022 - 1:16pm
International Students in China
security management
Scalability
Resiliency
resilience
pubcrawl
process control
policy governance
network security
Metrics
collaboration
information security
information protection
Human behavior
education
data privacy
cybersecurity education
cyber security
composability
Companies
biblio
Analysis of the Most Common Software and Hardware Vulnerabilities in Microprocessor Systems
Submitted by grigby1 on Thu, 03/04/2021 - 2:45pm
resilience
Metrics
microcomputers
microprocessor systems
Microsoft Windows (operating systems)
network access
Production
Program processors
pubcrawl
remote attack
local computer calculation network
Resiliency
Server Message Block service
Silicon
Software Vulnerability
Transistors
WannaCry trojan encoder
Windows Operating System Security
Windows OS
encryption program
security
authorisation
composability
Computer crime
computer viruses
Computers
Cryptography
Data protection
Windows operating system
File systems
Hardware
hardware algorithm protection
hardware vulnerabilities
hardware vulnerability
information protection
information security
invasive software
biblio
Analysis of key Factors for Organization Information Security
Submitted by grigby1 on Fri, 11/20/2020 - 2:26pm
Organizations
User training
User awareness
Training
Standards organizations
Security Policies Analysis
security of data
security culture
pubcrawl
policy-based governance
outsider attack
Data protection
organization information security
organisational aspects
insiders misuse
information security system
information security structure
Information Security Culture
information security
information protection
Human Factors
biblio
Two-Factor Authentication Protocol Using Physical Unclonable Function for IoV
Submitted by aekwall on Mon, 03/02/2020 - 12:25pm
minimum human interventions
vehicle sensors
Physical Unclonable Function
two-factor authentication
AKA protocol
elaborate security analysis
ever-increasing penetration
factor authentication protocol
Internet of Vehicles
IoV
key agreement protocol
Physical attack
mutual authentication
onboard sensors
physically secure authentication
route planning
secret information
transportation sector
user device
vehicle management
two factor authentication
authentication
authorisation
data privacy
Internet of Things
telecommunication security
Cryptographic Protocols
Protocols
pubcrawl
vehicular ad hoc networks
privacy
Servers
message authentication
password
public key cryptography
physical attacks
sensors
information protection
Human Factors
Security Properties
PUF
biblio
Faster-Than-Nyquist Signaling for Physical Layer Security on Wireless Smart Grid
Submitted by aekwall on Mon, 02/17/2020 - 2:22pm
physical layer security
wireless smart grid
wireless network segment
faster-than-Nyquist signaling
faster-than-Nyquist
coding
artificial noise
signal processing
encoding
wireless networks
information protection
signal processing security
security of data
power engineering computing
smart grid security
security mechanisms
smart power grids
privacy
Metrics
composability
pubcrawl
Resiliency
information security
biblio
Detection of the Information Hidden in Image by Convolutional Neural Networks
Submitted by grigby1 on Mon, 02/10/2020 - 11:45am
hidden information
steganography detection
Steganography
steganalysis
pubcrawl
privacy
object detection
Metrics
information protection
Image Processing
high probability
basic data
hidden communication
Data mining
convolutional neural networks
convolutional neural network
convolutional neural nets
convolution
computer architecture
composability
Brightness
biblio
Modeling Cryptographic Protocols Using the Algebraic Processor
Submitted by aekwall on Mon, 05/20/2019 - 10:02am
Human behavior
Resiliency
remote modeling
remote computers
pubcrawl
private key cryptography
MPEI algebraic processor
Metrics
Mathematical model
key distribution protocols functionality
Key Distribution
Kerberos protocol
Kerberos
internet
information protection
algebra
El Gamal signature
education-oriented capabilities
Department of Mathematical Modeling
Data models
cryptograthic protocol
Cryptography
Cryptographic Protocols
cryptographic primitives
computer network
Computational modeling
chosen cipher text attack
automata theory
automata models
automata
1
2
next ›
last »