Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data consistency
biblio
Trustworthiness Estimation of Entities within Collective Perception
Submitted by aekwall on Mon, 12/07/2020 - 11:32am
vehicular ad hoc network
vehicles awareness
vehicle shares information
V2X communication
remote vehicle
Misbehavior detection
host vehicle
entities trustworthiness estimation
collective perception information
Collective perception
Bayes filter
vehicle dynamics
data consistency
Radar
Intelligent Transportation Systems
road safety
situational awareness
estimation
sensors
VANET
sensor fusion
trustworthiness
Probabilistic logic
Reliability
vehicular ad hoc networks
composability
pubcrawl
Trusted Computing
telecommunication security
Conferences
biblio
BcIoT: Blockchain based DDos Prevention Architecture for IoT
Submitted by aekwall on Mon, 06/29/2020 - 12:05pm
Distributed databases
smart things
smart contract security
self-configuring things
IoT technologies
Internet of Thing (IoT)
hash based secret key
DDoS prevention
data consistency
centralized system
BcIoT
DDoS Attack Prevention
DDoS Attack
blockchain technology
contracts
Computer crime
blockchain
Metrics
composability
pubcrawl
Human behavior
Resiliency
computer architecture
data integrity
private key cryptography
Internet of Things
Conferences
data privacy
Data Security
computer network security
biblio
Consortium Blockchain-Based Architecture for Cyber-Attack Signatures and Features Distribution
Submitted by grigby1 on Mon, 03/02/2020 - 12:31pm
IDS
Tamper resistance
Signatures
security
Scalability
pubcrawl
Permissionless
Metrics
malicious activities
latency
blockchain
Human Factors
Human behavior
features
data integrity
Data injection
data consistency
cyberattacks
cooperative intrusion detection
biblio
CertChain: Public and Efficient Certificate Audit Based on Blockchain for TLS Connections
Submitted by grigby1 on Wed, 10/23/2019 - 11:38am
revoked certificates checking
log-based schemes
Metrics
Monitoring
Protocols
pubcrawl
public key cryptography
query processing
resilience
Resiliency
log servers
Scalability
Security analysis
Servers
SSL connections
SSL Trust Models
system monitoring
telecommunication security
TLS connections
data consistency
blockchain system
blockchain-based public
Certchain
certificate audit service
certificate forward traceability
certificate revocation checking
certificate revocation mechanisms
certification
Cryptographic Protocols
auditing
data privacy
data structure
data structures
DCBF
dependability-rank based consensus protocol
dual counting bloom filter
Electronic mail
Human behavior
biblio
Designing a database encryption technique for database security solution with cache
Submitted by grigby1 on Wed, 03/08/2017 - 1:24pm
Elliptic curves
database management software
database management systems
database security solution
Databases
DBMS
Decision Making
Elliptic curve cryptography
Elliptic Curve Cryptography(ECC)
database encryption technique
elliptical curve cryptography module
encryption
financial information
personal files
pubcrawl170112
public key cryptography
RSA
supply chain management
Data collection
cache storage
client details
company secrets
computer architecture
corporate data
corrupted data
customer service management
data availability
Advanced Encryption Standard(AES)
data consistency
data integrity
data loss
data management
data organization
data quality
data retrieval
database cache