Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Identification
biblio
Countermeasure for Identification of Controlled Data Injection Attacks in Networked Control Systems
Submitted by aekwall on Mon, 05/04/2020 - 11:22am
countermeasure
Networked Control Systems Security
Transfer functions
System Identification
Networked Control System
man-in-the-middle
malicious agent
link monitoring strategy
linear time-invariant transfer functions
Linear systems
industrial control system
Gaussian noise
data injection attack
security of data
controlled data injection attack identification
Identification
networked control systems
Predictive Metrics
Communication networks
production engineering computing
Industry 4.0
composability
pubcrawl
Resiliency
security
Monitoring
biblio
Risk-Based Attributed Access Control Modelling in a Health Platform: Results from Project CityZen
Submitted by grigby1 on Mon, 01/27/2020 - 12:33pm
privacy
trust
supply chain risk assessment
security
Scalability
Risk
Resiliency
resilience
pubcrawl
Access Control
policy-based governance
Metrics
Identification
Human Factors
Human behavior
composability
collaboration
authentication
biblio
Weighted LS-SVMR-Based System Identification with Outliers
Submitted by aekwall on Mon, 01/27/2020 - 10:19am
Support vector machines
Resiliency
pubcrawl
composability
Predictive Metrics
Identification
LS-SVM
Outliers
Weighted LS-SVMR
biblio
From Data-Driven to Intelligent-Driven: Technology Evolution of Network Security in Big Data Era
Submitted by aekwall on Mon, 01/20/2020 - 11:44am
security assurance strategy
Identification
Information systems
information technology
intrusion prevention
network security technology
Organizations
Predictive Metrics
pubcrawl
security
Human behavior
security audit
Security Audits
security category
security principles
security technology evolution
Standards organizations
System recovery
system virtualization
big data security technologies
Intelligent Data Security
Compositionality
Resiliency
Scalability
Access Control
authentication
authorisation
Big Data
big data era
Intelligent Data and Security
Communication networks
computer network security
Cryptography
data encryption
data privacy
disaster recovery
DT security principles
encryption audits
biblio
Security of Okamoto Identification Scheme: A Defense Against Ephemeral Key Leakage and Setup
Submitted by grigby1 on Thu, 05/24/2018 - 12:19pm
composability
Compositionality
ephemeral random values
GDH
Identification
impersonation
leakage
Metrics
Okamoto scheme
provable security
pubcrawl
resilience
Resiliency
security reduction
simulatability
biblio
Group Testing for Identification with Privacy
Submitted by grigby1 on Wed, 08/02/2017 - 1:28pm
Identification
Metrics
nearest neighbor search
privacy
pubcrawl
biblio
Privacy Issues in Identity Verification
Submitted by BrandonB on Wed, 05/06/2015 - 1:25pm
identity proofing
wide-scale identity systems
verification
trust creation
privacy issues
privacy
national identity systems
knowledge-based authentication
knowledge management
KBA
imposter fraud
identity verification
identity scoring
biometrics
Identity management
identity fraud
identity document security
identity document fraud
identity credential
Identification
economic system
data privacy
computer security
commercial applications
business data processing
biometrics (access control)
« first
‹ previous
1
2