Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
confidential information
biblio
Analytical Model of Actions of the Information Security Violator on Covert Extraction of Confidential Information Processed on the Protected Object
Submitted by grigby1 on Fri, 09/30/2022 - 10:29am
Compositionality
special technical means
Materials reliability
Markov random process
Resiliency
model
random processes
Telecommunications
information theoretic security
confidential information
Probabilistic logic
information security
composability
Data models
Scalability
Analytical models
resilience
collaboration
policy-based governance
Human Factors
Human behavior
pubcrawl
biblio
The Minimum Cost of Information Erasure for Stationary Memoryless Sources under Restriction on the Output Distribution
Submitted by grigby1 on Tue, 02/16/2021 - 1:25pm
general sources
unrelated sequence
uniformly distributed sequences
stationary memoryless sources
single-letter characterization
Random sequences
random sequence
output distribution
minimum cost
memoryless systems
information erasure
privacy
conditional resolvability
Data Sanitization
source coding
Information Leakage
confidential information
Compositionality
Resiliency
resilience
Human behavior
pubcrawl
biblio
Covert Channels of Data Communication
Submitted by grigby1 on Wed, 02/10/2021 - 12:50pm
Compositionality
protected operating system
mandatory access control
Linux operating system
Linux kernel
data communication
covert channels
covert storage channels
confidential information
authorisation
Linux
security threats
Access Control
Scalability
Resiliency
resilience
pubcrawl
biblio
Social Engineering for Diagnostic the Information Security Culture
Submitted by aekwall on Mon, 10/12/2020 - 11:46am
Phishing
Human Behavior and Cybersecurity
social engineering techniques
public university
ISCA survey questionnaire
information security culture assessment
Information Security Culture
information assets protection
information assets
controlled social engineering attacks
social engineering
security
security culture
sensitive information
Human Factors
Cybersecurity
confidential information
Computer crime
pubcrawl
Human behavior
data privacy
biblio
Generating Digital Signature using Facial Landmlark Detection
Submitted by grigby1 on Fri, 08/28/2020 - 3:44pm
digital signature generation
biometric encryption
Facial features
Audio recognition
biometric identification
CDNU Algorithm
compressed textual signature
database storage overhead
Digital Security
data compression
facial landmark detection
facial landmarks
facial recognition
Huffman coding
real-time optimized encryption procedure
secure digital signature
security advisors
user account information database
information security
encryption
feature extraction
pubcrawl
Metrics
Resiliency
optimization
Scalability
Databases
Cryptography
resilience
social networking (online)
face recognition
digital signatures
image texture
confidential information
Image coding
biblio
Data Security Enhancement in Cloud Computing Using Multimodel Biometric System
Submitted by grigby1 on Fri, 08/28/2020 - 3:43pm
DNA encryption
biometric encryption
DNA
AES cipher
data centers
data hiding
data leak
data security enhancement
DNA cipher
confidential information
Encoding and Decoding
information storage
multimodal biometric system
multimodel biometric system
multiple security system
polymers
security authentication
unauthorized access
Cloud Computing
Cryptography
authorisation
pubcrawl
Metrics
Resiliency
Conferences
AES
Scalability
Ciphers
encoding
biometrics (access control)
Data Security
resilience
smart phones
confidential data
information retrieval
Smartphones
biblio
Generalized Chaos Synchronization Circuit Simulation and Asymmetric Image Encryption
Submitted by aekwall on Mon, 08/10/2020 - 10:50am
numerical calculations
image colour analysis
image correlation
information interaction
key sensitivity
keyspace
Lyapunov methods
Metrics
multimedia safe communications
Multisim software
network images
nonlinear equations
nonsymmetric identity authentication
numerical analysis
Human behavior
numerical simulation
pubcrawl
quadratic variables
Resiliency
RGB digital image secure communication scheme
statistical analysis
statistical average
structural circuits
synchronisation
Synchronization
synchronous circuits
Trajectory
unpredictable synchronization state
diffeomorphism function
asymmetric image
bifurcation
chaos
chaotic communication
chaotic system
circuit simulation
Color image
complex dynamic behavior
Compositionality
confidential information
conventional chaos systems
conventional drive system
Cryptography
Asymmetric Encryption
differential attack
digital image
digital images
encryption
encryption algorithm
flexible control parameters
four-dimensional diffeomorphism function
four-dimensional nonlinear dynamic equation
GCS response system
generalized chaos synchronization circuit simulation
generalized chaos synchronization theory
generalized response system
Generalized synchronization
biblio
Information Theoretic Security over α-µ/α-µ Composite Multipath Fading Channel
Submitted by grigby1 on Tue, 06/02/2020 - 11:53am
secrecy matrices
policy-based governance
probability
pubcrawl
Receivers
resilience
Resiliency
Scalability
secrecy
non-zero secrecy capacity
secure outage probability
security
shadowing
Signal to noise ratio
telecommunication security
wireless channel
Wireless communication
α-μ distribution
Human Factors
channel capacity
channel parameters
Communication system security
composite multipath fading channel
confidential information
eavesdropper
fading channels
Human behavior
Capacity planning
Information Leakage
information theoretic security
mathematical expressions
Metrics
Monte Carlo methods
Monte-Carlo simulations
multipath channels
multipath fading
biblio
Automatic Whitelist Generation for SQL Queries Using Web Application Tests
Submitted by grigby1 on Mon, 02/10/2020 - 11:26am
severe vulnerability issue
query patterns
query processing
Registers
relational databases
relational database security
research and development
resilience
Resiliency
security of data
query detection
SQL
SQL detection
SQL injection
SQL queries
Web application test
Web application tests
Whitelist
Whitelists
development process
automated generation
Automatic testing
automatic whitelist generation
blacklisting
collaboration
composability
confidential information
Database Security
Databases
application-specific implementations
Human behavior
internet
large-scale Web applications
legitimate queries
Metrics
policy-based governance
privacy
pubcrawl
biblio
Fuzzy Rough Set Feature Selection to Enhance Phishing Attack Detection
Submitted by grigby1 on Tue, 11/26/2019 - 3:47pm
random forests
pattern classification
personal information
Phishing
phishing attack detection
Phishing Detection
phishing Web sites
pubcrawl
random forest classification
machine learning-based strategies
rough set theory
Rough sets
Training
Uniform resource locators
universal feature set
Web pages
Web sites
Fuzzy Rough Set
Computer crime
confidential information
cybercrime activities
definitive features
Electronic mail
feature extraction
Feature Selection
FRS feature selection
classifiers
fuzzy rough set feature selection
fuzzy rough set theory
fuzzy set theory
generalizable phishing detection
Human behavior
human factor
legitimate Web site
1
2
next ›
last »