Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security enhancement
biblio
Security Enhancement for the Network Amalgamation using Machine Learning Algorithm
Submitted by grigby1 on Tue, 03/09/2021 - 2:02pm
Human behavior
Task Analysis
Security Metrics
security enhancement
security
Scalability
resilience
pubcrawl
Protocols
network vulnerabilities
network amalgamation
Monitoring
Metrics
machine learning algorithms
learning (artificial intelligence)
machine learning
feature extraction
data transaction
Data Security
computer networks
computer network security
computer network
BIOS
biometrics (access control)
biometric authenticity
Bio-metric authenticity
privacy
composability
Resiliency
biblio
Security Enhancement in Storage Area Network
Submitted by grigby1 on Fri, 08/28/2020 - 2:55pm
security level
resilience
Resiliency
SAN
SAN Perfromance factors
SAN protocols
SAN security framework
Scalability
security
security enhancement
public clouds
security perspective
security solution
security vulnerabilities
Servers
storage area network
Storage area networks
storage management
storage technologies
information security
cashing technologies
centralized secure place
computer network security
DAS
digital transformation
direct attached storage
Distributed databases
distributed storage technology
geographical remote locations
big data security metrics
IP networks
network attached storage
Optical fiber LAN
Optical fibers
private clouds
private nodes
Protocols
pubcrawl
biblio
Mobile Ad Hoc Network for Security Enhancement
Submitted by aekwall on Mon, 08/03/2020 - 9:18am
MANET
telecommunication security
security enhancement
Secure Hashing Algorithm
Routing protocols
Resiliency
reactive method
Public key
proactive method
private key
mobile ad hoc networks
mobile ad hoc network
Metrics
Message Digest 5
pubcrawl
identification process
hackers node
game theory
game theoretical approach
encryption
decryption processes
Cryptography
Compositionality
AODV
advanced encryption standard
ad hoc on-demand distance vector routing protocol
Ad Hoc Network Security
biblio
SDNLog-Foren: Ensuring the Integrity and Tamper Resistance of Log Files for SDN Forensics using Blockchain
Submitted by grigby1 on Wed, 06/03/2020 - 11:02am
SDN security
log management
Metrics
network forensics
pubcrawl
resilience
Resiliency
Scalability
SDN forensics
log file identification
SDNLog-Foren
Secure log files
security enhancement
sensitive log data
software defined networking
Southbound interfaces
system monitoring
fine-grained access control
blockchain
Blockchain-based security
Computer crime
Computer hacking
computer network security
control systems
Cybersecurity
Digital Forensics
authorisation
global network configuration
Human behavior
Human Factors
information forensics
Integrity and Tamper Resistance.
log file analysis
log file collection
biblio
Enhanced Cryptocurrency Security by Time-Based Token Multi-Factor Authentication Algorithm
Submitted by aekwall on Mon, 02/10/2020 - 11:04am
security enhancement
wallets
transaction processing
time-based token multifactor authentication algorithm
time-based onetime password technique
single level password authentication
multifactor authentication algorithm
MFA token
MFA security scheme
Cryptocurrency security
multifactor authentication
Human Factors
security
cryptocurrency
password
cryptocurrencies
authentication
Computer hacking
Metrics
bitcoin
pubcrawl
Resiliency
authorisation
Computer crime
biblio
Enhancing Security and Scalability in Software Defined LTE Core Networks
Submitted by aekwall on Mon, 06/17/2019 - 9:29am
next generation networks
telecommunication traffic
telecommunication security
software defined networking
software defined LTE core networks
Software
security scalability
security enhancement
security
scalable tunnel establishment
scalable channel security scheme
Scalability
pubcrawl
cellular radio
Next generation networking
next generation cellular network
mobile subscribers
Mobile Security
mobile networks
mobile network design
Mobile communication
LTE core network
Long Term Evolution
Local area networks
composability
Cloud Computing
biblio
A Framework for Measurability of Security
Submitted by grigby1 on Wed, 11/14/2018 - 12:21pm
security attribute
Multi-Metrics
privacy
privacy and dependability evaluation complexity
pubcrawl
resilience
Resiliency
Scalability
security
multi metrics
security enhancement
Security Evaluation
security function
security measurability
security metric
SPD evaluation complexity
system analysis and design
Communication Systems
MM framework
Measurement
Internet of Things
internet
Human behavior
experts knowledge systematic storage
expert systems
expert knowledge retrieval
ES
Engines
embedded systems
Embedded System
Databases
data privacy
computer network security
biblio
Controlling Cloud Data Access Privilege: Cryptanalysis and Security Enhancement
Submitted by grigby1 on Wed, 05/30/2018 - 3:01pm
Gold
user collusion attacks
user authorization
user anonymity protection
user anonymity
security weaknesses
security enhancement
Resiliency
resilience
pubcrawl
policy-based governance
Outsourcing Decryption
Metrics
identity privacy
Human Factors
Human behavior
Access Control
finegrained access control
encryption
data privacy
data access privilege scheme
Cryptography
cryptanalysis
Computational modeling
collaboration
cloud data access privilege
Cloud Computing
authority collusion attacks
authorities collusion attack
authorisation
attribute-based encryption
biblio
A Factored MDP Approach to Optimal Mechanism Design for Resilient Large-Scale Interdependent Critical Infrastructures
Submitted by grigby1 on Tue, 02/27/2018 - 1:36pm
Linear programming
state spaces
security enhancement
Scalability
Resiliency
resilience
pubcrawl
power system security
power system reliability
power grids
optimal resiliency mechanism design
network theory (graphs)
network resilience
Metrics
Markov processes
Markov Decision Processes
action spaces
large-scale interdependent system
large-scale interdependent critical infrastructures
Human Factors
Human behavior
factored MDP approach
decision theory
cyber-physical dependencies
Cyber Dependencies
critical infrastructures
Control Theory
Compositionality
Cascading Failures
approximation theory
approximate linear programming
biblio
Toward objective security measurability and manageability
Submitted by grigby1 on Tue, 12/12/2017 - 12:29pm
Metrics
security metric
security measurability
security enhancement
security
Resiliency
pubcrawl
Productivity
privacy
objective metric
objective evaluation
Multi-Metrics
composability
Measurement
IoT security
Internet of Things
Human Factors
Human behavior
expert systems
Engines
encryption
embedded systems
Databases
1
2
next ›
last »