Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malicious users
biblio
White-box traceable dynamic attribute based encryption
Submitted by aekwall on Mon, 07/20/2020 - 10:45am
Silicon
white box cryptography
white-box traceable dynamic attribute based encryption
white-box traceability
user revocation
out-sourcing decryption
multiple users
decryption keys
CP-ABE scheme
ciphertext policy
access policy
malicious users
fine-grained access control
Cloud Computing
Secret key
pubcrawl
Games
Metrics
composability
Resiliency
private key cryptography
attribute-based encryption
encryption
authorisation
Servers
biblio
FalconEye: A High-Performance Distributed Security Scanning System
Submitted by grigby1 on Fri, 04/10/2020 - 12:53pm
secure practices
great precision
high-performance distributed security scanning system
human society
important transactions
input module
input source module
malicious users
open source framework
public domain software
scanner module
generic vulnerabilities scanning
sensitive data
Spider
support platform module
Vulnerability Scanning System
web applications
Web developers
web vulnerabilities
Pervasive Computing Security
Human Factors
Human behavior
Servers
Monitoring
Scalability
computer architecture
internet
Task Analysis
pubcrawl
Metrics
Resiliency
resilience
security of data
Uniform resource locators
web security
application security
common vulnerabilities test environment
conventional platform
detection systems
distributed scanning system
existing security vulnerabilities
FalconEye system
biblio
Keystroke Analysis for User Identification Using Deep Neural Networks
Submitted by grigby1 on Tue, 01/28/2020 - 2:36pm
malicious users
user identification
typing style
typing dynamics
supervised learning
pubcrawl
pattern classification
neural network
neural net architecture
multilayer perceptrons
MLP deep neural network
Metrics
message authentication
Artificial Intelligence
learning (artificial intelligence)
keystroke analysis
keystroke
Human Factors
Human behavior
feature model
deep neural network architecture
deep learning-based classifiers
deep learning
decision-trees machine learning algorithm
Decision trees
authentication systems
biblio
On Integrating Lightweight Encryption in Reconfigurable Scan Networks
Submitted by aekwall on Mon, 01/20/2020 - 12:01pm
RSN
intellectual property
Lightweight Ciphers
lightweight stream cipher
logic testing
maintenance
malicious users
novel hardware
on-chip instrumentation
pubcrawl
PUF
reconfigurable scan networks
Resiliency
integrating lightweight encryption
Scalability
seamless integration
secret keys
Secure Wrapper
self-test
sensitive data
Software
software combined approach
system-on-chip
testing workflow
versatile software toolchain
flexible access
appropriate counter-measures
Ciphers
Cryptographic Protocols
Cryptography
data integrity
data privacy
debug modules
embedded instrumentation
embedded systems
encryption
field programmable gate arrays
-play instrument wrapper
FPGA-based implementation
Hardware
Hardware Security
IEEE standards
IEEE Std 1687
IEEE Std 1687 RSNs
IJTAG
industrial property
instrument wrapper
Instruments
integrated circuit testing
biblio
De-identifying facial images using projections on hyperspheres
Submitted by grigby1 on Wed, 03/08/2017 - 2:13pm
facial image recognition
visualization
video sharing
social media
pubcrawl170113
privacy
Media
mass visual media distribution
malicious users
image classification
hyperspheres
automatic facial image identification
facial image deidentification
facial image classification
face recognition
Face
Error analysis
Databases
data privacy
common automatic identification algorithm
cloud services
biblio
Forensic investigation framework for VoIP protocol
Submitted by grigby1 on Tue, 03/07/2017 - 1:40pm
packet reordering
VoIP-SIP
VoIP-RTP
VoIP traffic
VoIP protocol
VoIP
Voice over Internet Protocol
Streaming media
SIP
signalling protocols
Servers
RTP
reconstruction algorithm
pubcrawl170109
Protocols
Ports (Computers)
communication facilities
next generation communication services-based IP
network pattern analysis
network forensic investigation framework
malicious users
malicious content
law enforcement system
Internet telephony
Forensics
forensic analysis
Electronic mail
Digital Forensics
cyber criminals
content level observation
Computer crime
biblio
Static analysis approaches to detect SQL injection and cross site scripting vulnerabilities in web applications: A survey
Submitted by BrandonB on Tue, 05/05/2015 - 10:40am
SQLI
social communications
Software
software development life cycle
software maintenance
software reliability
source code
source code (software)
SQL
SQL injection
Servers
static analysi
static analysis
testing
vulnerabilitie
vulnerability detection
web applicatio
web applications
XSS
legacy Web applications
attack prevention
Cross Site Scripting
cross site scripting vulnerabilities
defensive programming
financial transaction
Guidelines
health problem
internet
Analytical models
malicious users
Manuals
program diagnostics
programming
programming mistakes
security of data
security vulnerabilities
security weaknesses
« first
‹ previous
1
2