Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security systems
biblio
Methods for Determining a Quantitative Indicator of Threats to Information Security in Telecommunications and Industrial Automation Systems
Submitted by grigby1 on Fri, 08/26/2022 - 9:57am
objects of industrial automation systems
threat assessment
Telecommunications
telecommunication systems
security systems
security
Scalability
Resiliency
resilience
Probabilistic logic
pubcrawl
methods for assessing information security threats
Mathematical model
information security threats
information security
Human behavior
expert systems
Communications technology
automation
biblio
Hardware Implementation of Cancellable Biometric Systems
Submitted by aekwall on Tue, 03/09/2021 - 10:56am
FPGA model
Watermarking
Three-dimensional displays
security systems
security applications
Scalability
Resiliency
pubcrawl
one-way cancellable biometric template system
Metrics
Information encryption
Hardware Implementation
Hardware
biometric encryption
FPGA
fingerprint encryption
field programmable gate arrays
face encryption
encryption
Cryptography
Cancellable biometrics
biometrics (access control)
Biological system modeling
3D chaotic mapping
3D chaotic map
biblio
End-to-End Voice Encryption Based on Multiple Circular Chaotic Permutation
Submitted by grigby1 on Fri, 01/22/2021 - 12:52pm
military radio
wireless mobile communication
voice encryption
voice data security
voice communication
trunked radio
telecommunication technology
telecommunication security
security systems
Receivers
multiple circular chaotic permutation
multiple circular
multicircular permutations
chaotic cryptography
GSM network
GSM
Global System for Mobile
end-to-end voice encryption
encryption
dynamic keys
Cryptography
chaotic communication
chaotic algorithm
cellular technologies
cellular radio
pubcrawl
biblio
Design of a Smart Home System Using Bluetooth Protocol
Submitted by grigby1 on Mon, 12/28/2020 - 11:28am
security systems
unit system
Sensor
printed circuit layout
peripheral interfaces
Peripheral interface controller microcontroller
PCB layout design
Micro-controller
main processer
home processes
fully functional smart home prototype
Diptrace software
centralized control unit
Bluetooth protocol
Bluetooth based smart home automation system
bluetooth security
Bluetooth
Home appliances
Bars
relay
mobile phones
Smart homes
microcontrollers
Switches
home automation
composability
Protocols
Resiliency
resilience
Human behavior
pubcrawl
biblio
Chirp Rate Estimation and micro-Doppler Signatures for Pedestrian Security Radar Systems
Submitted by grigby1 on Fri, 12/11/2020 - 1:41pm
security
radar antennas
radar detection
radar receivers
radar resolution
radar sensors
resilience
Resiliency
saturated accelerograms
Scalability
Radar
security systems
signal classification
Spectrogram
target classification
target detection
Time Frequency Analysis
Time-frequency Analysis
time-frequency domain
high-resolution radar
chirp modulation
chirp rate estimation
chirp rate estimators
CW radar
Doppler radar
estimation
FM radar
FMCW
FMCW radar
Chirp
linear frequency modulated continuous wave
Metrics
micro-Doppler
microDoppler signal analysis
microDoppler signatures
object detection
pedestrian security radar systems
pubcrawl
biblio
End-to-End Voice Encryption Based on Multiple Circular Chaotic Permutation
Submitted by aekwall on Tue, 09/08/2020 - 9:13am
chaotic algorithm
wireless mobile communication
voice encryption
voice data security
trunked radio
telecommunication technology
security systems
multiple circular chaotic permutation
multiple circular
multicircular permutations
military radio
GSM network
Global System for Mobile
end-to-end voice encryption
dynamic keys
Cryptography
cellular technologies
voice communication
chaotic cryptography
chaotic communication
Predictive Metrics
GSM
cellular radio
composability
pubcrawl
Resiliency
telecommunication security
Receivers
encryption
biblio
A survey of zero-day malware attacks and its detection methodology
Submitted by grigby1 on Fri, 07/10/2020 - 12:08pm
invasive software
zero-days
zero-day malware attacks
security systems
Resiliency
resilience
pubcrawl
Privacy-invasive software
Metrics
malware outbreaks
malware developers
malware detection
malware
large-scale attacks
advanced persistent threats
Human Factors
Human behavior
end-point security solutions
Electronic mail
detection methodology
detection
cryptojacking
Cryptography
Code Obfuscation
botnets
botnet
APT
analysis
biblio
An Adaptive Real-Time Architecture for Zero-Day Threat Detection
Submitted by grigby1 on Mon, 12/10/2018 - 10:38am
online trained supervised classification schemes
zero-day threats learning
zero-day threat detection
Zero-day attacks
Zero day attacks
Training
Support vector machines
stream processing technology
security systems
security of data
security
Resiliency
resilience
real-time systems
pubcrawl
online trained unsupervised anomaly detection schemes
Adaptation models
network operator
Metrics
legitimate user behavior
learning (artificial intelligence)
honeypots
Distributed databases
detection models training
defense
composability
attacker behavior
Anomaly Detection
adaptive threat detection architecture
adaptive real-time architecture
adaptive detection schemes
biblio
Testing Techniques and Analysis of SQL Injection Attacks
Submitted by grigby1 on Thu, 05/24/2018 - 11:08am
SQL Injection vulnerability
resilience
Resiliency
security of data
security systems
security testing
sensitive data
sensitive information
SQL
SQL injection
SQL Injection attacks
SQL injection problems
relational databases
SQL query
testing techniques
three-tier-architecture
traditional security policies
user interfaces
users
Web application vulnerabilities
web applications
Web sites
website
handy interface
attackers
Cogeneration
commonly used Web application attacks
composability
Data protection
database-driven Web applications
DH-HEMTs
different security systems
effective data protection systems
good target
governmental organizations
attack
Human behavior
integrated circuits
internet
Knowledge engineering
Metrics
penetration testing technique
program testing
proper data protection
pubcrawl
relational database security
biblio
Cyber Situational Awareness Enhancement with Regular Expressions and an Evaluation Methodology
Submitted by grigby1 on Tue, 02/06/2018 - 1:07pm
Metrics
Sniffles
situational awareness
security systems
Resiliency
Regular expressions
regular expression processing capability
Regexbench
pubcrawl
performance evaluation
PCRE
pattern matching
composability
Handheld computers
deep packet inspection
decision maker mission completeness
Cybersecurity
cyber threats
cyber situational awareness enhancement
cyber situational awareness
Cyber Operations
computer security
computer network security
1
2
next ›
last »