Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
BIOS
biblio
A Conceptual Direction on Automatically Evolving Computer Malware using Genetic and Evolutionary Algorithms
Submitted by grigby1 on Tue, 03/09/2021 - 2:06pm
genetic algorithms
security
Scalability
Resiliency
resilience
pubcrawl
Proactive Defence
Metrics
malware creation
malware
Mal-ware Analysis
invasive software
internet
Human behavior
artificial ecosystem
evolutionary computing
evolutionary computation
Evolutionary algorithms
cyber world
cyber security
computing devices
computer malware
co-evolutionary predator-prey framework
BIOS
biologically inspired computing
Bio-inspired computing
artificial world
biblio
Computational Intelligence Towards Trusted Cloudlet Based Fog Computing
Submitted by grigby1 on Tue, 03/09/2021 - 2:06pm
Scalability
optimisation
popular trust
pubcrawl
quality of service
Reliability
reputation
required trusted platform module
resilience
Resiliency
multiple cloudlets
security
security of data
tpm
trust
trust value
trust-based reputation
trusted cloudlet-based fog platform
uncertainty
Fog computing
BIOS
Cloud Computing
cloud-based services
cloudlet
cloudlet trustworthy
cloudlet-based fog computing
computational intelligence
computationally intelligent approaches
edge computing
Bio-inspired Intelligent
Fuzzy logic
fuzzy logic-based inference
Human behavior
Internet of Things
IoT user
Mathematical model
Metrics
mobile computing
biblio
The Making of Indicator of Compromise using Malware Reverse Engineering Techniques
Submitted by grigby1 on Tue, 03/09/2021 - 2:05pm
Metrics
tools
static analysis
Software
security
Scalability
reverse engineering
resilience
pubcrawl
Packed Malware
Malware Analysis
Malware Threat
malware
indicators of compromise
computer architecture
BIOS
Resiliency
Human behavior
Predictive Metrics
privacy
biblio
Establishing Authenticity for DICOM images using ECC algorithm
Submitted by grigby1 on Tue, 03/09/2021 - 2:05pm
medical image processing
telemedicine
tampered data
signature verification
security
Scalability
Resiliency
resilience
pubcrawl
privacy
patient records
MRI brain images
Metrics
Medical services
medical related image files
medical information systems
authenticity
medical image files
Medical diagnostic imaging
magnetic resonance imaging
image watermarking
Human behavior
Electronic Medical Records (EMR)
ECDSA algorithm
ECDSA
ECC algorithm
digital signatures
DICOM images
DICOM
data privacy
BIOS
biomedical MRI
biblio
A Novel Group-Based Authentication and Key Agreement Protocol for IoT Enabled LTE/LTE–A Network
Submitted by grigby1 on Tue, 03/09/2021 - 2:05pm
Long Term Evolution
telecommunication security
security
Scalability
Resiliency
resilience
pubcrawl
Protocols
Performance analysis
MTCD
Metrics
Machine Type Communication Devices
LTE/LTE–A
LTE/LTE-A network
authentication
IoT
Internet of Things
Human behavior
heterogeneous devices
group-based authentication and key agreement protocol
Gold
Cryptographic Protocols
Complexity theory
BIOS
biometric authentication
Bio-metric
authorisation
biblio
Increasing Participation and Security in Student Elections through Online Voting: The Case of Kabarak University
Submitted by grigby1 on Tue, 03/09/2021 - 2:04pm
online access
voting processes
three factor authentication
testing
student elections management
security
secure online voting system
Scalability
resultant system
Resiliency
resilience
pubcrawl
politics
password
Participation
online voting
authentication
offline electronic voting system
Mobile handsets
Metrics
Kabarak University
internet
Human behavior
further education
Electronic voting systems
electronic voting
Electronic mail
Educational institutions
e-voting systems
Dynamic Systems Development Methodology (DSDM)
campus hall voting
BIOS
biblio
Successes and Failures in Exploring Biometric Algorithms in NIST Open Source Software and Data
Submitted by grigby1 on Tue, 03/09/2021 - 2:04pm
resilience
multifactor
multimodal
NIST
NIST open source software
open-source software
password-driven methods
pubcrawl
public domain software
recognition
Metrics
Resiliency
Scalability
secure approaches
security
Software
test data
Unibiometric analysis
user authentication methods
cryptosystem
authorisation
Bio-metric
biometric algorithms
biometric authentication method
biometric data
biometrics (access control)
BIOS
Cryptography
authentication
fingerprint
Fingerprint recognition
fuzzy vault
Human behavior
Identification
internal open source utilities
Iris
Iris recognition
biblio
Biometric Authentication for Safety Lockers Using Cardiac Vectors
Submitted by grigby1 on Tue, 03/09/2021 - 2:03pm
Human behavior
security
Scalability
Safety
Resiliency
resilience
pubcrawl
Metrics
Manuals
Identification
authentication
feature extraction
Electrocardiography
ECG
Digital Lockers
control systems
BIOS
biometrics (access control)
Bio-metrics
biblio
Augmented Randomness for Secure Key Agreement using Physiological Signals
Submitted by grigby1 on Tue, 03/09/2021 - 2:03pm
Scalability
Metrics
physiological signals
physiology
predecessor SKA-PS protocol
Protocols
pubcrawl
quantisation (signal)
resilience
Resiliency
medical signal processing
secure cryptographic key generation
secure key agreement
security
set reconciliation mechanism
SKA-PSAR system
telecommunication security
wearable biosensors
Wireless communication
cryptographic key generation
Augmented Randomness
BANs
Bio-cryptography
BIOS
biosensors
body area networks
Communication system security
correct key generation rate
random key generation
Cryptographic Protocols
Cryptography
false key generation rate
generated keys
highly random cryptographic keys
Human behavior
key agreement
lightweight security mechanisms
biblio
Brain-Computer Interface based User Authentication System for Personal Device Security
Submitted by grigby1 on Tue, 03/09/2021 - 2:03pm
recurrent neural network
mentally selected circle
mentally uttered number
Metrics
particle filter
password
personal device security
PF
pubcrawl
recurrent neural nets
Kalman filters
resilience
RNN
security
security of data
SSVEP brain pattern
two stage security verification
user authentication system
visual evoked potentials
brain-computer interface system
Human behavior
Scalability
Resiliency
3 × 3 spatial matrix
BCI
biometric security
BIOS
brain
brain pattern classification
pattern locks
brain-computer interfaces
CCA
EKF
electroencephalography
EMD
ERNN
extended-Kalman filter
flickering circle
1
2
next ›
last »