Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security risks
biblio
A Meta-Analysis of Efficient Countermeasures for Data Security
Submitted by grigby1 on Fri, 07/14/2023 - 10:48am
Training data
encryption audits
sensitive data
security risks
data attacks
threats
Resiliency
Data protection
renewable energy sources
feature extraction
Compositionality
Data Security
security vulnerabilities
Companies
resilience
Metrics
pubcrawl
machine learning algorithms
biblio
Security Controls for Smart Buildings with Shared Space
Submitted by grigby1 on Fri, 01/20/2023 - 5:06pm
Smart Grids
smart building
smart buildings
smart cities
Aerospace electronics
smart grid security
security controls
Metrics
security risks
security
architecture
Object recognition
Scalability
Resiliency
resilience
pubcrawl
IoT
biblio
Risk and Compliance in IoT- Health Data Propagation: A Security-Aware Provenance based Approach
Submitted by aekwall on Fri, 02/25/2022 - 10:45am
Provenance
Senior citizens
security services
security risks
security evidence
security
Resiliency
Regulation
real-time systems
pubcrawl
Security Risk Estimation
Protocols
Metrics
Internet of Things-Health
Insurance
Human behavior
estimation
data propagation
composability
Compliance
biblio
Copyright Protection for Online Text Information : Using Watermarking and Cryptography
Submitted by grigby1 on Fri, 04/09/2021 - 11:24am
Syntactics
pubcrawl
resilience
Resiliency
Scalability
security risks
Semantic
Semantics
Syntactic
policy-based governance
text analysis
text documents
visible watermarking techniques
Watermarking
web page watermarking
Web pages
Web text
web-based text
information security
composability
copyright
Cryptography
digital watermarking
HTML
Human behavior
hypertext markup language
Information Assurance
collaboration
intellectual copyright protection
internet
Internet technologies
Metrics
online content copyright protection
online information sharing
online text information
biblio
Hardware Security Vulnerability Assessment to Identify the Potential Risks in A Critical Embedded Application
Submitted by grigby1 on Mon, 03/29/2021 - 12:02pm
microcontrollers
similar MCU-based applications
security risks
security of data
security challenges
secure embedded IoT applications
safety-critical software
safety-critical applications
resilient applications
Resiliency
resilience
pubcrawl
power system security
physical attacks
patient care
composability
Metrics
Internet of Things (IoT)
Internet of Things
hardware security vulnerability assessment
hardware security assessment approach
Hardware Security
fault injection attacks
fault injection attack
Fault Attacks
embedded systems
embedded software developers
Detection and Mitigation
critical medical IoT device
critical embedded application
biblio
A Solution of Text Based CAPTCHA without Network Flow Consumption
Submitted by grigby1 on Thu, 03/18/2021 - 2:35pm
information processing
verification logic
text-based CAPTCHA
text based CAPTCHA
telecommunication traffic
software engineering
Servers
server
security risks
security
pubcrawl
network flow
information processing security issues
authorisation
Human behavior
high-security text-based CAPTCHA solution
formal verification
encryption
distributed information processing
composability
client-server systems
client malicious programs
client
captchas
CAPTCHA technology
biblio
Reliability Analysis of Concurrent Data based on Botnet Modeling
Submitted by grigby1 on Tue, 03/09/2021 - 2:23pm
network modelling
unsolicited e-mail
time series
telecommunication traffic
spam
security risks
security of data
Resiliency
resilience
reliability analysis
Reliability
pubcrawl
pattern clustering
network traffic time series
botnet modeling
multidimensional permutation entropy
Metrics
invasive software
high-privilege systems
Entropy
detection methods
data complex structure analysis
concurrent data
computer network security
composability
clustering variance method
botnets
biblio
Study of Trust at Device Level of the Internet of Things Architecture
Submitted by aekwall on Mon, 12/07/2020 - 12:23pm
security risks
Logic gates
neural style transfer
Object recognition
Predictive Metrics
pubcrawl
Resiliency
Scalability
security risk
IoT security solutions
tamper proof
telecommunication security
Trusted Computing
Trusted Platform Module
trusted platform modules
unique device identifier
user authentication
authentication
IoT devices
IoT architecture model
Internet of Things
general Internet of Things architecture
examined IoT solutions
encryption
device management
device level encryption
cyber-physical system security
Cryptography
computer architecture
Computational modeling
composability
built-in security features
basic firewall protection
biblio
Enforcing a Risk Assessment Approach in Access Control Policies Management: Analysis, Correlation Study and Model Enhancement
Submitted by grigby1 on Fri, 11/20/2020 - 2:27pm
Information systems
Servers
security risks
Security Policies Analysis
risk management
risk assessment model
risk assessment approach
risk assessment
RBAC
pubcrawl
policy-based governance
model enhancement
Access Control
information system security
Databases
Database Security
correlation links
Correlation
authorisation
Anomalies Correlation
access control service
access control policy
access control policies management
biblio
Safe and Secure Data Fusion — Use of MILS Multicore Architecture to Reduce Cyber Threats
Submitted by aekwall on Mon, 11/16/2020 - 2:58pm
multicore-based real-time operating system
data fusion-based systems
flexible software architectures
functional assurance capabilities
High Robustness
high-robustness separation kernel certification
INTEGRITY-178 tuMP
MILS multicore architecture
multicore
multicore processor
cyber-attack space
multiple independent levels
restricted hardware access
RTOS
Separation Kernel
single-core processors
system providers
system security architecture
Resilient Security Architectures
operating systems (computers)
Resiliency
pubcrawl
Software Architecture
sensor fusion
data flows
aerospace computing
safety-critical software
scheduling
telecommunication security
security risks
multiprocessing systems
MILS
air traffic safety
architecture configurations
civil aircraft systems safety
covert channel prevention
cyber threats reduction
1
2
3
4
next ›
last »