Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
scenario
biblio
The Cryptocurrency Simulation using Elliptic Curve Cryptography Algorithm in Mining Process from Normal, Failed, and Fake Bitcoin Transactions
Submitted by grigby1 on Fri, 09/04/2020 - 3:59pm
ECC algorithm
transaction process
total processing time
time 6.0 s
time 152.0 s
securing transactions
scenario
RSA processing time
RSA algorithm
normal bitcoin transactions
mining process
high-level security
fake bitcoin transactions
Elliptic Curve Cryptography algorithm
Elliptic curve cryptography (ECC)
efficient processing time
Scalability
cryptography algorithms
cryptocurrency transaction
cryptocurrency simulation
Cryptocurrency security
appropriate algorithm
transaction processing
bitcoin security
bitcoin
cryptocurrency
security level
Human behavior
pubcrawl
public key cryptography
digital signatures
Cryptography
biblio
Attack scenarios and security analysis of MQTT communication protocol in IoT system
Submitted by K_Hooper on Wed, 05/09/2018 - 11:00am
MQTT implementation
Things devices
telecommunication security
Security by Default
Security analysis
scenario
Scalability
Resiliency
pubcrawl
Protocols
protocol
Ports (Computers)
Payloads
MQTT system
MQTT protocol
adequate security mechanism
MQTT communication protocol
MQTT
ISO
IoT system
IoT device
IoT developers
Internet of Things
data privacy
Cryptography
computer network security
communication protocols
authentication
attack
biblio
Integrating Human Behavior Into the Development of Future Cyberterrorism Scenarios
Submitted by grigby1 on Tue, 03/07/2017 - 1:41pm
Organizations
Terrorism
social force
social
scenario
pubcrawl170109
psychology
psychological force
psychological
Predictive models
Computer crime
motivation
Human Factors
Human behavior
digital technologies
cyberterrorism scenarios
cyberterrorism
cyber threats
Computer hacking