Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
brute force attacks
biblio
A Novel Password Secure Mechanism using Reformation based Optimized Honey Encryption and Decryption Technique
Submitted by grigby1 on Fri, 04/14/2023 - 4:09pm
Resistance
Reformation-based scheme
Password authentication
optimized honey encryption and decryption
Brutal force attack
passwords
codes
brute force attacks
Force
collaboration
control systems
Protocols
authentication
policy-based governance
Human Factors
Human behavior
pubcrawl
security
biblio
Secure Two-Factor Authentication for IoT Device
Submitted by grigby1 on Fri, 04/14/2023 - 4:09pm
Protocols
Constraint device
Force measurement
two-factor authentication
mutual authentication
brute force attacks
MQTT
Force
Fingerprint recognition
Internet of Things
authentication
IoT device
policy-based governance
Human Factors
Human behavior
pubcrawl
security
collaboration
biblio
On Attacking IJTAG Architecture based on Locking SIB with Security LFSR
Submitted by grigby1 on Fri, 04/14/2023 - 4:09pm
reverse engineering
SLFSR
power analysis
LSIB
Linear feedback shift registers
known-plaintext attack
IEEE standard 1687
Hybrid power systems
brute force attacks
collaboration
IEEE standards
side-channel attacks
integrated circuits
policy-based governance
Human Factors
Human behavior
pubcrawl
security
biblio
Analyzing SocialArks Data Leak - A Brute Force Web Login Attack
Submitted by grigby1 on Fri, 04/14/2023 - 4:09pm
Cloud Computing
collaboration
Intrusion Detection
pubcrawl
Human behavior
Human Factors
policy-based governance
Databases
Companies
Firewalls (computing)
Force
ethics
brute force attacks
Data Breach
elasticsearch
SocialArks
biblio
Consensus-based Frequency Control of a Cyber-physical Power System under Two Types of DDoS Attacks
Submitted by grigby1 on Fri, 04/14/2023 - 4:08pm
collaboration
pubcrawl
Human behavior
Human Factors
policy-based governance
Computer crime
Smart Grid
DDoS Attacks
Force
simulation
denial-of-service attack
Microgrids
power systems
brute force attacks
Communication Systems
cyber-physical power system
biblio
Analysis of the random shuffling of message blocks as a low-cost integrity and security measure
Submitted by grigby1 on Fri, 04/14/2023 - 4:08pm
Memory management
Shuffling
Low cost
Brute force
Force measurement
brute force attacks
integrity
Current measurement
Force
Proposals
collaboration
Information systems
Cryptography
privacy
policy-based governance
Human Factors
Human behavior
pubcrawl
IoT
security
biblio
A Study on Brute Force Attack on T-Mobile Leading to SIM-Hijacking and Identity-Theft
Submitted by grigby1 on Fri, 04/14/2023 - 4:08pm
Systems architecture
tunneling
T-Mobile
SSH tunneling
SIM Hijacking
Scanning and Enumeration
identity theft
passwords
brute force attacks
Brute force
collaboration
cyber attack
Force
Data Breach
Databases
policy-based governance
Human Factors
Human behavior
pubcrawl
Computer hacking
biblio
Secure Storage System Using Cryptographic Techniques
Submitted by grigby1 on Fri, 04/14/2023 - 4:08pm
denial of service attack
random password
honey encryption
Brute Force Attack
passwords
brute force attacks
user interfaces
storage system
DoS
hashing
Force
encryption
real-time systems
security requirements
Databases
internet
policy-based governance
Human Factors
Human behavior
pubcrawl
collaboration
biblio
Efficient Brute-force handling methodology using Indexed-Cluster Architecture of Splunk
Submitted by grigby1 on Fri, 04/14/2023 - 4:07pm
ethics
Splunk Tool
IP Detection
grasping
ethical hacking
Creating Alerts
Brute Force Prevention
passwords
brute force attacks
collaboration
renewable energy sources
Force
Big Data
policy-based governance
Human Factors
Human behavior
pubcrawl
information security
biblio
P4NIS: Improving network immunity against eavesdropping with programmable data planes
Submitted by grigby1 on Tue, 03/09/2021 - 2:40pm
Servers
P4NIS
packet classification
performance evaluation
policy-based governance
programmable data planes
programming protocol-independent packet processor based network immune scheme
Protocols
pubcrawl
network paths
single network path
supercomputer computational capacity
telecommunication traffic
three lines of defense
traffic packets
transmission port field encryption
versatile attackers
encryption-based countermeasures
brute-force attacks
computer network security
Cryptography
diverse encryption algorithms
eavesdropping
eavesdropping attacks
encrypted packet transmission
encryption
brute force attacks
Human behavior
Human Factors
internet
Internet Protocol
IP
IP networks
network immunity
1
2
3
4
5
next ›
last »