Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
microsoft windows
biblio
Automated IT Audit of Windows Server Access Control
Submitted by aekwall on Mon, 03/09/2020 - 11:05am
Scalability
IT Audit
IT auditing process
microsoft windows
Microsoft Windows (operating systems)
Object recognition
password
pubcrawl
Resiliency
ISO/IEC 27002:2013
Security Audits
security controls
security policies
security weaknesses
Servers
Windows Server
Windows server access control
Windows server operating system
automated IT audit
Access Control
access control violations
audit checklist
audit objectives
auditing
auditing processes
authorisation
automated audit tool
Windows Operating System Security
automated process
business data processing
data breach incidents
Human behavior
IEC standards
intrusion incidents
ISO standards
biblio
Self-Encrypting Deception: Weaknesses in the Encryption of Solid State Drives
Submitted by grigby1 on Mon, 02/17/2020 - 5:07pm
microsoft windows
vulnerabilities
standards
SSD
solid state drives
Software
security weaknesses
security guarantees
reverse engineering
Resiliency
resilience
pubcrawl
policy-based governance
peripheral interfaces
password
bitlocker
Metrics
internal models
Human behavior
hardware-encryption
hardware full-disk encryption
Hardware
flash memories
firmware
external models
encryption software
encryption
Data protection
Cryptography
critical security weaknesses
biblio
Heterogenic Multi-Core System on Chip for Virtual Based Security
Submitted by aekwall on Mon, 02/10/2020 - 11:58am
multiprocessing systems
multicore computing security
virtual-based security
the GOST
standard symmetric key block cipher
neuromatrix
neural network emulation
heterogenic multicore system on chip
heterogenic multi-core system-on-chip
GOST
coding information
Cipher
virtual reality
AES
signal processing
DES
Scalability
Image Processing
assembly language
Computers
microsoft windows
Decoding
neural nets
standards
Metrics
pubcrawl
Resiliency
Kernel
system-on-chip
Hardware
encryption
Cryptography
biblio
A New Information Extractor for Profiled DPA and Implementation of High Order Masking Circuit
Submitted by aekwall on Mon, 02/10/2020 - 11:44am
extracting information
Microelectronics Security
time reduction
space reduction
side channel attack
security circuit implementation
profiled stage
profiled DPA
new information extractor
machine learning method
information retrieval
high order masking scheme
high order masking circuit
high order masking
Cryptography
explained local variance
ELV
CHES 2015
Predictive Metrics
computer science
principal component analysis
microsoft windows
Data mining
composability
pubcrawl
Resiliency
learning (artificial intelligence)
Hardware
biblio
Content Adaptive Image Steganalysis in Spatial Domain Using Selected Co-Occurrence Features
Submitted by grigby1 on Mon, 02/10/2020 - 11:42am
primary content adaptive stego algorithms
image classification
Image edge detection
image steganalysis
LBP features
local co-occurrence features
local image region
Metrics
microsoft windows
Histograms
privacy
pubcrawl
selected co-occurrence features
Spatial domain
Steganography
steganography detection
weak classifier
boosted classifiers
Haar transforms
generalization power
general content adaptive image steganography detector
final detector
feature selection procedure
Feature Selection
feature extraction
Detectors
Databases
content adaptive image steganalysis
content adaptive
composability
co-occurrence feature
Classification algorithms
candidate features
biblio
Stochastic Heuristic Approach to Addition Chain Problem in PKC for Efficiency and Security Effectiveness
Submitted by aekwall on Mon, 01/20/2020 - 11:48am
public key cryptography
Stochastic processes
stochastic method
stochastic heuristic approach
Side-channel attack
security effectiveness
Scalability
SCA
RSA cryptosystem
RSA
Resiliency
public-key cryptosystem
public-key cryptography
ACP
pubcrawl
PKC
multiplication-squaring operations
modular exponentiation
microsoft windows
Heuristic algorithms
exponentiation operation
exponentiation
dummy operations
Benchmark testing
addition chain problem
biblio
Secure Smart Card Signing with Time-based Digital Signature
Submitted by aekwall on Mon, 01/06/2020 - 10:37am
DER Decoder
trusted digital signing process
trusted digital signature
time-based digital signature
time stamping protocol packet
Terminal Attack
smart card terminal
sign documents
Secure Time Stamp
secure smart card signing
Pins
PIN sniffing
message alteration attack
Java Card
electronic signature
security of data
cybersecurity challenges
current smart card digital signature
smart cards
microsoft windows
digital signatures
message authentication
smart phones
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
Conferences
Scalability
biblio
An Efficient system to stumble on and Mitigate DDoS attack in cloud Environment
Submitted by aekwall on Wed, 12/18/2019 - 2:23pm
mitigation
mitigation method
killer software
facts generation
dynamic asset allocation
distributed denial of carrier
DDoS attack mitigation
cloud networks
DDoS Attack
resilience
microsoft windows
Computer crime
Metrics
composability
pubcrawl
Human behavior
network security
Support vector machines
Conferences
Servers
Cloud Computing
computer network security
biblio
Real-Time Resiliency Assessment of Control Systems in Microgrids Using the Complexity Metric
Submitted by grigby1 on Mon, 12/16/2019 - 3:59pm
power transformers
nonlinear control systems
nonlinear interconnected system
Operational Resilience
operational resilience quantification
power electronic-based components
power electronics
power generation control
power system stability
microsoft windows
Real-time Resiliency
real-time resiliency assessment
resilience
Resiliency
Scalability
solid-state transformer
SST
weather-related disturbances
distributed power generation
Complexity Metric
complexity quantification metric
Complexity theory
control systems
Control Theory
Control Theory and Resiliency
Cyber Physical System
cyber physical systems
pubcrawl
fault tolerance
high speed winds
high-impact low-frequency weather-related events
HILF
Human behavior
Interconnected Systems
Measurement
microgrid
biblio
Information Assurance in modern ATE
Submitted by aekwall on Mon, 08/05/2019 - 10:40am
Instruments
tools
Task Analysis
software footprint
security of data
security
Resiliency
pubcrawl
policy-based governance
operating systems (computers)
operating system
microsoft windows
Metrics
internet
anti-virus
Information Assurance
Human behavior
electronic devices
cyber security
Computers
computer viruses
computer
composability
automatic test equipment
ATE system software
ATE OS settings
ATE
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »