Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
NIST
biblio
The Comparison of Web History Forensic Tools with ISO and NIST Standards
Submitted by grigby1 on Tue, 12/20/2022 - 6:33pm
Browsers
Web Forensics
NIST Standards
History Logs
forensics tools
Forensics Standard
cyber threat
Web Browser Security
Digital Forensics
Compositionality
pubcrawl
ISO standards
NIST
History
internet
Resiliency
resilience
Metrics
Human behavior
biblio
Integrating Cybersecurity Into a Big Data Ecosystem
Submitted by grigby1 on Fri, 11/18/2022 - 1:49pm
risk management
security
pubcrawl
resilience
Resiliency
Scalability
privacy
process control
NIST
Big Data
Cybersecurity
Hadoop
user interfaces
Security by Default
biblio
A Study of Post Quantum Cipher Suites for Key Exchange
Submitted by grigby1 on Fri, 09/16/2022 - 3:54pm
standardization
Supersingular Isogenies
Ring Learning With Errors (RLWE)
lattice cryptography
Key Pair Generation
Key exchange
Error Code Correcting
Cryptographic Benchmarking
Post Quantum Cryptography (PQC)
codes
Resiliency
security
Wires
forward error correction
digital signature
Resistance
composability
quantum computing
Computers
NIST
Metrics
pubcrawl
biblio
Privacy Considerations for Risk-Based Authentication Systems
Submitted by grigby1 on Mon, 08/01/2022 - 1:45pm
security
IP networks
pubcrawl
Human behavior
Human Factors
authentication
privacy
data privacy
NIST
Browsers
password
usable security and privacy
two factor authentication
big data analysis
risk-based authentication
biblio
Performance Analysis of the Quantum Safe Multivariate Polynomial Public Key Algorithm
Submitted by grigby1 on Thu, 07/14/2022 - 5:13pm
Metrics
secure secret exchange
PQC
polynomial root finding
polynomial factoring
Multivariate Polynomial Public Key
MPPK
mathematical models
random key generation
Post-quantum cryptography
public key cryptography
pubcrawl
Java
Benchmark testing
quantum computing
NIST
Scalability
Conferences
Resiliency
resilience
Human behavior
biblio
Skew-Tent Map Based CMOS Random Number Generator with Chaotic Sampling
Submitted by grigby1 on Thu, 06/30/2022 - 4:05pm
Immunity testing
switched-capacitor
skew-tent map
sampling methods
PL1D maps
discrete-time chaotic maps
chaotic sampling
Bit rate
random number generator
Semiconductor device modeling
chaotic cryptography
Cryptography
Power demand
Interference
integrated circuit
Metrics
NIST
Scalability
Resiliency
resilience
pubcrawl
biblio
An ADC Based Random Number Generator from a Discrete Time Chaotic Map
Submitted by grigby1 on Thu, 06/30/2022 - 4:04pm
Capacitors
Voltage
random number generators
discrete time chaotic map
Bernoilli shift
analog to digital converter
chaotic cryptography
Sensitivity
Power demand
pubcrawl
Metrics
chaotic communication
NIST
Scalability
Throughput
Resiliency
resilience
biblio
Statistical Analysis of Pseudorandom Sequences and Stegocontainers
Submitted by grigby1 on Fri, 05/20/2022 - 3:33pm
pubcrawl
Generators
Cryptography
web services
NIST
composability
Compositionality
manufacturing
statistical analysis
Industrial engineering
pseudorandom sequences
TestU01
theoretical cryptography
biblio
Design and Implementation of an Efficient Elliptic Curve Digital Signature Algorithm (ECDSA)
Submitted by grigby1 on Thu, 05/05/2022 - 1:20pm
mechatronics
Scalability
Resiliency
resilience
Python
pubcrawl
Phase modulation
NIST P-521 Curve
NIST
Metrics
composability
Inversion in modulation
Hash Function
handwriting recognition
finite fields
Elliptic curves
elliptic curve digital signature algorithm (ECDSA)
Elliptic curve cryptography
Conferences
biblio
Combinatorially XSSing Web Application Firewalls
Submitted by aekwall on Tue, 04/19/2022 - 10:29am
Conferences
pubcrawl
Scalability
Resiliency
Human behavior
Firewalls (computing)
NIST
Filtering
combinatorial testing
cross-site scripting
SQL injection
security testing
Web application
Web Application Firewall
XSS
Cross Site Scripting
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »