Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Online banking
biblio
A Secure Mobile Payment Protocol for Handling Accountability with Formal Verification
Submitted by grigby1 on Thu, 02/24/2022 - 12:30pm
information security
Transaction Security
tools
security
Scyther tool
pubcrawl
Protocols
protocol verification
privacy
policy-based collaboration
Payment Protocol
Online banking
Mobile payment systems
Metrics
Industries
Cryptography
Compositionality
composability
collaboration
AVISPA tool
authorization
authentication
accountability
network accountability
Resiliency
biblio
Using MajorClust Algorithm for Sandbox-Based ATM Security
Submitted by grigby1 on Tue, 12/21/2021 - 12:38pm
Online banking
Zero day attacks
Whitelists
whitelisting
tools
software security
Software algorithms
sandboxing
Resiliency
resilience
pubcrawl
ATM
Metrics
Intrusion Protection
Filtering
evolutionary computing
evolutionary computation
defense
cyber security
composability
clustering
Big Data
biblio
WiPass: CSI-based Keystroke Recognition for Numerical Keypad of Smartphones
Submitted by grigby1 on Tue, 08/17/2021 - 4:17pm
channel state information
Dynamic Time Warping
Human behavior
k-nearest neighbor
keystroke analysis
Keystroke Recognition
Metrics
Online banking
password
principal component analysis
privacy
pubcrawl
smart phones
System performance
Wireless communication
Wireless fidelity
biblio
Impact of Video Surveillance Systems on ATM PIN Security
Submitted by aekwall on Wed, 07/07/2021 - 4:56pm
shoulder surfing
Human behavior
Resiliency
Metrics
pubcrawl
video surveillance
video analysis
Threat Modeling
surveillance camera
Side-Channel vulnerabilities
side-channel attacks
security
Pins
PIN security
Online banking
Interviews
Inferring keyboard inputs
Guidelines
Computer vision-based attacks
ATM security
surveillance
Cameras
biblio
Cybercrime Countermeasure of Insider Threat Investigation
Submitted by grigby1 on Fri, 07/03/2020 - 1:26pm
DPI method
Scalability
Resiliency
resilience
pubcrawl
Organizations
Online banking
law enforcement
Inspection
insider threat investigation
insider threat
Big Data
digital investigation process
digital evidence
deep packet inspection methods
deep packet inspection
cybercrime threats
cybercrime investigation
cybercrime insider investigation
cybercrime countermeasure
Computer crime
biblio
Cryptanalysis and improvement of a cloud based login and authentication protocol
Submitted by aekwall on Mon, 06/01/2020 - 11:04am
online banking system
impersonation attack
internet
medium scale banking organization
Metrics
Mobile banking
mobile computing
multifactor authentication
Online banking
Human Factors
pubcrawl
public cloud
resilience
Resiliency
security
Servers
small scale banking organization
authentication
Human behavior
high-speed online services
Fingerprint recognition
electronic banking
e-banking services
e-banking
Cryptographic Protocols
cryptanalysis
cloud server
Cloud Computing
cloud based login
Business
bank data processing
authorisation
authentication protocol
biblio
Modeling of Blockchain Based Systems Using Queuing Theory Simulation
Submitted by aekwall on Mon, 05/11/2020 - 11:29am
Online banking
queuing theory simulation
Queuing theory for blockchain
M/M/n/L queuing system
leading technology
Blockchain using jsimgraph
Blockchain simulation
blockchain based systems
Bitcoin queuing simulation
network accountability
accountability
auditability
queueing theory
Queueing analysis
Resiliency
Smart Home
Data mining
social networks
internet
blockchain
Metrics
social networking (online)
Computational modeling
Peer-to-peer computing
bitcoin
composability
pubcrawl
biblio
WristSpy: Snooping Passcodes in Mobile Payment Using Wrist-worn Wearables
Submitted by aekwall on Mon, 02/17/2020 - 2:57pm
financial data processing
wearables security
WristSpy
Wearable sensors
single wrist-worn wearable device
personal mobile devices
passcode input scenarios
passcode inference system
parallel PIN inference
parallel pattern inference
multidimensional feature extraction
mobile payment
machine-learning based classification
fine-grained hand movement trajectories
Euclidean distance
wearable computers
Scalability
Pins
Trajectory
Online banking
electronic money
parallel processing
privacy
Mobile handsets
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
feature extraction
mobile computing
authorisation
biblio
Practical Key Recovery Model for Self-Sovereign Identity Based Digital Wallets
Submitted by grigby1 on Tue, 01/21/2020 - 11:36am
Human behavior
shamir secret sharing
Self-Sovereign Identity
secure management
Scalability
resilience
pubcrawl
Protocols
proof-of-concept digital wallet
practical key recovery model
password
Online banking
key recovery
identity management services
Identity management
Hyperledger Indy distributed ledger technology
authorisation
financial data processing
distributed ledger
digital wallet
digital identity management
decentralized key recovery solution
data privacy
Data models
Cryptography
cryptographic keys
cryptocurrency
cryptocurrencies
credentials
Computational modeling
blockchain
biblio
RDI: Real Digital Identity Based on Decentralized PKI
Submitted by aekwall on Mon, 11/18/2019 - 11:49am
Brute-force Attack
PKI Trust Models
username-password approach
trusted source certificate authorities
Real Digital Identity based approach
RDI
public key binding
public key approach
point of trust attack
online transactions
Online banking
Internet banking applications
Digital identity
decentralized PKI scheme
decentralized PKI
automobiles
Registers
public key cryptography
Public key
smart contracts
message authentication
smart contract
blockchain
Metrics
pubcrawl
Human behavior
Resiliency
authorisation
Scalability
« first
‹ previous
1
2
3
4
next ›
last »