Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Information systems
biblio
On the Feasibility of Attribute-Based Encryption on Constrained IoT Devices for Smart Systems
Submitted by aekwall on Mon, 08/17/2020 - 11:42am
ABE adoption
smart objects
Information systems
smart phones
Constrained Devices
performance evaluation
fine-grained access control
security challenges
Smart Systems
policy-based governance
ABE schemes
battery-powered devices
constrained IoT devices
flexible access policies
privacy challenges
public-key encryption
Sugar
data privacy
computer network security
Scalability
authorisation
Cryptography
encrypted data
encryption
Access Control
attribute-based encryption
security
attribute based encryption
Internet of Things
Protocols
embedded systems
mobile computing
Human behavior
pubcrawl
biblio
Construction of Network Active Security Threat Model Based on Offensive and Defensive Differential Game
Submitted by grigby1 on Fri, 07/24/2020 - 1:01pm
Mathematical model
traditional network active security threat model
security
Safety
pubcrawl
process control
offensive differential game
network security threat
network security target
network attack and defense
network active security threat process
attack defense differential equation
Information systems
Games
Differential Games
Differential game
differential equations
defensive differential game
defense differential game theory
Control Theory
computer network security
Communication networks
biblio
PRETSA: Event Log Sanitization for Privacy-aware Process Discovery
Submitted by grigby1 on Thu, 07/09/2020 - 1:57pm
PRETSA
sensitive information
security of data
Scalability
Resiliency
resilience
pubcrawl
pseudonymized employee information
process model discovery
process execution
process discovery
privacy-disclosure attacks
Privacy-aware Process Mining
privacy-aware process discovery
privacy guarantees
privacy
Analytical models
Personnel
performance-annotated process model
Information systems
Human Factors
Human behavior
event log sanitization
event data
differential privacy
Data Sanitization
data privacy
Data mining
data deletion
Compositionality
business data processing
Business
biblio
Modeling Cyber Security of Information Systems Smart City Based on the Theory of Games and Markov Processes
Submitted by aekwall on Mon, 07/06/2020 - 10:14am
Markov processes
Cyber Dependencies
town and country planning
smart city systems
likelihood of cyber threats
information systems smart city
information security circuits
cybernetic risk
Cyber Security Systems
Communication Systems
information technologies
Smart City
cyber threats
Compositionality
smart cities
security of data
Human Factors
Games
Information systems
probability
Mathematical model
Computer hacking
Metrics
Computational modeling
component
pubcrawl
Resiliency
cyber security
game theory
Scalability
biblio
Implement Time Based One Time Password and Secure Hash Algorithm 1 for Security of Website Login Authentication
Submitted by aekwall on Mon, 06/08/2020 - 11:33am
process user authentication
hash algorithms
word length 160.0 bit
Website login authentication
website
username
user passwords
user access rights
time-based one time password
time limit
Time Based One Time Password
time 30.0 s
SHA1
Secure Hash Algorithm 1 generate code
Secure Hash Algorithm 1
authorisation
information system access
factor authentication method
authentication process
account number
two-factor authentication
Compositionality
Information systems
message authentication
authentication
Web sites
pubcrawl
Resiliency
Cryptography
biblio
High-risk Problem of Penetration Testing of Power Grid Rainstorm Disaster Artificial Intelligence Prediction System and Its Countermeasures
Submitted by aekwall on Mon, 06/01/2020 - 10:54am
resilience
power engineering computing
power grid rainstorm disaster artificial intelligence prediction system
power grid storm disasters
power grids
power Internet of Things
power meteorological service technology support
power system security
power transformer testing
program debugging
pubcrawl
policy-based governance
Resiliency
security of data
SQL
SQL blind bug
SQL injection
SQL injection attack behavior
SQL injection penetration test
Storms
system penetration testing
Vulnerability
host security
Artificial Intelligence
artificial storm prediction system
Companies
composability
disaster prediction information systems
disasters
electric power information system security defense work
electrical safety
energy Internet disaster safety
energy internet disaster security
application security
information security
Information systems
internet
Internet of Things
middleware
middleware security
network security
password
Penetration Testing
PGRDAIPS
biblio
Distributed SDN-Based C4ISR Communications: A Delay-Tolerant Network for Trusted Tactical Cloudlets
Submitted by grigby1 on Fri, 05/15/2020 - 11:36am
software defined networking
Mobile Edge Computing
Network reconnaissance
network resource allocation
pubcrawl
realistic tactical scenarios
resource allocation
resource management
SDN architecture
short message service
mobile computing
software-defined radio networking
Tactical cloudlets
tactical environments
tactical SMS
tactical traffic flow
telecommunication traffic
trusted tactical cloudlets
trusted third-part authority
unmanned vehicle patrol deployment
distributed SDN-based C4ISR communications
centralized SDN controller
Cloud Computing
computerized-command-control-communications-intelligence- surveillance reconnaissance infrastructure
decentralized cloudlets layer
decentralized MEC layer
Delay-Tolerant Network
delays
distributed cloudlets
distributed SDN
C4ISR
end-to-end delay
generation military environment
high bite rate ISR
Information systems
intelligence-surveillance-reconnaissance video
MEC
military communication
military computing
biblio
Security Analysis of Intelligent Transportation Systems Based on Simulation Data
Submitted by grigby1 on Fri, 05/08/2020 - 4:40pm
threat model
resilience
road safety
road traffic
roadside infrastructure units
security
Security analysis
security model
security of data
pubcrawl
traffic control
traffic engineering computing
Transportation
transportation efficiency
transportation security
vehicle ad hoc networks
Veins
Information systems
Intelligent Data Security
Compositionality
Resiliency
Scalability
Analytical models
Buildings
composability
information security
Intelligent Data and Security
Intelligent Transportation Systems
ITS
ITS system
layered network security model
malicious node threat
Metrics
Networked Control Systems Security
biblio
Information Systems and Network Technologies for Personal Data Cyber Security in Public Health
Submitted by aekwall on Mon, 05/04/2020 - 11:22am
Organizations
Standards organizations
security of data
Resiliency
public healthcare
public health sector
public health enterprises
public health
pubcrawl
Predictive Metrics
personal data cyber security systems
personal data cyber security legislation
personal data
composability
Networked Control Systems Security
network technologies
medical information systems
legislation
Insurance
Information systems
information system
information management
health information management systems
health care
cyber security
computer security
biblio
Design and Realization of a Computer Security Control Circuit for Local Area Network
Submitted by aekwall on Mon, 05/04/2020 - 11:22am
control unit
Networked Control Systems Security
security threat
secure hard disk
ordinary hard disk
new technology challenge
network attack
management defect
local area network computer security control circuit
LAN security
LAN computers
LAN computer security control circuit
Hard disks
cyberattack
Circuit synthesis
circuit design
Predictive Metrics
security management
Local area networks
Information systems
composability
pubcrawl
Resiliency
information security
computer network security
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »