Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Identification
biblio
Mathematical and Algorithmic Prevention of Biometric Data Leaks
Submitted by grigby1 on Tue, 06/14/2022 - 3:12pm
Identification
industrial plants
automation
biometric authentication
biometrics (access control)
biometric encryption
Random access memory
data storage
Metrics
encryption
Object recognition
authentication
Scalability
Resiliency
resilience
pubcrawl
information security
biblio
A Context-Policy-Based Approach to Access Control for Healthcare Data Protection
Submitted by grigby1 on Mon, 11/29/2021 - 2:49pm
Medical services
Tamper-Resistance
Tamper resistance
Sensor Systems
sensors
Scalability
pubcrawl
Protocols
Metrics
Access Control
Identification
Human Factors
Human behavior
Context modeling
computer security
authorization
authentication
biblio
Insider Threat Identification System Model Based on Rough Set Dimensionality Reduction
Submitted by grigby1 on Thu, 04/08/2021 - 4:55pm
Metrics
rough set dimensionality reduction
rough set
minimum risk Bayes decision
insider threat identification system model
impersonation detection
feedback tree
demensionality reduction
Bayes network
attribute information database
set theory
rough set theory
Accuracy
Bayes methods
User behavior
probability
insider threat
trees (mathematics)
Classification algorithms
information system security
Information systems
Identification
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
Insider Threat Detection
security
Training
security of data
biblio
Successes and Failures in Exploring Biometric Algorithms in NIST Open Source Software and Data
Submitted by grigby1 on Tue, 03/09/2021 - 3:04pm
resilience
multifactor
multimodal
NIST
NIST open source software
open-source software
password-driven methods
pubcrawl
public domain software
recognition
Metrics
Resiliency
Scalability
secure approaches
security
Software
test data
Unibiometric analysis
user authentication methods
cryptosystem
authorisation
Bio-metric
biometric algorithms
biometric authentication method
biometric data
biometrics (access control)
BIOS
Cryptography
authentication
fingerprint
Fingerprint recognition
fuzzy vault
Human behavior
Identification
internal open source utilities
Iris
Iris recognition
biblio
Biometric Authentication for Safety Lockers Using Cardiac Vectors
Submitted by grigby1 on Tue, 03/09/2021 - 3:03pm
Human behavior
security
Scalability
Safety
Resiliency
resilience
pubcrawl
Metrics
Manuals
Identification
authentication
feature extraction
Electrocardiography
ECG
Digital Lockers
control systems
BIOS
biometrics (access control)
Bio-metrics
biblio
Biometric System of Access to Information Resources
Submitted by aekwall on Tue, 03/09/2021 - 11:57am
internet
webhost web server
web resource
unauthorized access
structural schematic diagram
software and hardware complex
Scalability
Resiliency
pubcrawl
phpMyAdmin database server
PHP scripting language
personal data
online front-ends
Metrics
JavaScript
Java
biometric encryption
information resourses
information resources
information resource
Identification
hypermedia markup languages
HTML hypertext markup language
hardware complex
Google Chrome extension
fingerprint
embedded scripts
developed complex
C language
biometric system
authorisation
authoring languages
biblio
Phased-Guard: Multi-Phase Machine Learning Framework for Detection and Identification of Zero-Day Microarchitectural Side-Channel Attacks
Submitted by grigby1 on Thu, 03/04/2021 - 2:55pm
Metrics
Zero-day attacks
Zero day attacks
side-channel attacks
Resiliency
resilience
pubcrawl
Monitoring
microarchitecture
composability
machine learning
Identification
Hardware
feature extraction
Detectors
detection
defense
biblio
Investigation of an Innovative Approach for Identifying Human Face-Profile Using Explainable Artificial Intelligence
Submitted by aekwall on Mon, 03/01/2021 - 5:02pm
explanation
Pixel Segmentation
Human Profile Recognition
human face profile identification
human face identification
Geometric Ratios
geometric ratio expressions
feature vectors
feature vector
feature set diagnosis
Facial features
facial feature extraction
faces
Ear
biometric identification research
Scalability
explainable artificial intelligence
xai
Identification
Nose
face recognition
DNN
Artificial Intelligence
biometrics (access control)
image segmentation
biometrics
pubcrawl
Resiliency
feature extraction
biblio
Attack Surface Identification and Reduction Model Applied in Scrum
Submitted by grigby1 on Fri, 08/28/2020 - 11:50am
security improvement
visualization
visual model
Surface treatment
Software systems
software system
software security vulnerabilities
software prototyping
software engineering
Software
Serum
sensitive data
security of data
attack surface
scrum reduction model
Scalability
Resiliency
resilience
reduction
pubcrawl
Metrics
Identification
Data models
computer security
attack surface identification
biblio
Detection and Compensation of Covert Service-Degrading Intrusions in Cyber Physical Systems through Intelligent Adaptive Control
Submitted by grigby1 on Thu, 07/16/2020 - 11:44am
networked control systems
feedback
feedback signals
ICs
Anomaly Detection
Identification
insecure networks
intelligent adaptive control
internet
Intrusion Detection
Metrics
Detectors
pubcrawl
resilience
Resiliency
service degradation.
simulations
Steady-state
system behavior
system operation
system/plant identification
covert attacks
classic controller
compensating controller
compensation framework
compensator
composability
computer network security
computer networks
control
control engineering computing
covert
adaptive control
covert service-degrading intrusions
CPS modeling
Cyber Physical System
cyber security
cyber-physical systems
DC motors
deception signal amplification attack
Degradation
detection algorithm
1
2
next ›
last »