Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
brute force attacks
biblio
Machine Learning Based IoT Edge Node Security Attack and Countermeasures
Submitted by grigby1 on Fri, 09/04/2020 - 3:38pm
noninvasive architecture independent machine learning attack
cloned PUF devices
Cloning
cloning accuracy
highly connected ecosystem
IoT edge node security attack
machine-learning based countermeasure
malicious attack
malicious PUF modeling
authentic PUFs
physically unclonable functions
PUF
PUF architecture
PUF designs
PUF structure
two-stage brute force attack model
ubiquitous computing devices
brute force attacks
machine learning
Internet of Things
security
Cloud Computing
Servers
computer network security
Protocols
authentication
computer architecture
Cryptography
cloud server
pubcrawl
IoT networks
IoT
IoT devices
learning (artificial intelligence)
Human Factors
policy-based governance
biblio
Security Analysis of Improved One-Time Pad Cryptography Using TRNG Key Generator
Submitted by grigby1 on Fri, 09/04/2020 - 3:38pm
frequency monobit
brute force attacks
TRNG key generator
trng
ryptography
Refining
random keys
PRNG
Prediction algorithms
OTP
one-time pad cryptography
one-time pad
information security analysis
Ciphers
Fisher-Yates shuffling algorithm
cipher text mapping
avalanche effect
random number generation
Brute Force Attack
policy-based governance
Human Factors
cryptographic algorithms
pubcrawl
Generators
encryption
Cryptography
biblio
Secure Authentication Mechanism for Resistance to Password Attacks
Submitted by grigby1 on Fri, 09/04/2020 - 3:38pm
Dictionaries
brute force attacks
shoulder surfing
password based authentication mechanism
password attacks
matrix based secure authentication mechanism
Matrix based authentication
key stroke technique
graphichical password technique
dictionary attacks
click pattern technique
Brute forcing
Cryptography
Resists
matrix algebra
policy-based governance
Human Factors
password
Force
pubcrawl
authentication
Indexes
authorisation
biblio
Privacy Against Brute-Force Inference Attacks
Submitted by grigby1 on Fri, 09/04/2020 - 3:37pm
concave programming
brute force attacks
utility measure
privacy-preserving data release
privacy-leakage budget
piecewise linear techniques
piece-wise linear function
Mutual information
Linear programming
linear program
guessing leakage
f-information
data privacy
concave function
brute-force inference attacks
Markov processes
probability
policy-based governance
Entropy
Human Factors
sensitive data
optimization
pubcrawl
privacy
biblio
Parallelization of Brute-Force Attack on MD5 Hash Algorithm on FPGA
Submitted by grigby1 on Fri, 09/04/2020 - 3:37pm
32/34/26-instance parallelization
brute force attacks
single Virtex-7 FPGA device
pre-image brute-force attack
pipeline processing
MD5 hash generation
MD5 hash algorithm
LUT
IP core
HDL
Hardware design languages
guess password generation
Cryptography
field programmable gate arrays
gpu
policy-based governance
Human Factors
password
pubcrawl
Generators
Hardware
computer architecture
Hardware Implementation
biblio
Universal Randomized Guessing with Application to Asynchronous Decentralized Brute—Force Attacks
Submitted by grigby1 on Fri, 09/04/2020 - 3:37pm
Vectors
brute force attacks
universal randomized guessing
universal distribution
universal decentralized guessing strategies
source coding
memoryless systems
guesswork moment
asynchronous decentralized brute - force attacks
Brute-force Attack
botnet
query processing
policy-based governance
Entropy
Human Factors
Random variables
password
Decoding
pubcrawl
tools
invasive software
computer network security
biblio
DOS and Brute Force Attacks Faults Detection Using an Optimised Fuzzy C-Means
Submitted by grigby1 on Fri, 09/04/2020 - 3:37pm
DOS brute force attacks faults detection
brute force attacks
Subtractive Clustering
specialised MIB dataset
SNMP-MIB variables
SNMP-MIB parameter datasets
SFCM method
optimised fuzzy c-means
network performance
network issues
Network Fault Attacks
MIB feature
Management information base
Fuzzy Cluster Means
Fault Clustering
Servers
computer networks
computer network systems
clustering methods
Clustering algorithms
fault detection
policy-based governance
Human Factors
network administrators
fuzzy set theory
Force
pubcrawl
Protocols
computer network security
biblio
Website and Network Security Techniques against Brute Force Attacks using Honeypot
Submitted by grigby1 on Fri, 09/04/2020 - 3:37pm
pubcrawl
web security
Human Factors
policy-based governance
network security
Brute force
honeypot
Medusa
brute force attacks
biblio
High Speed Parallel RC4 Key Searching Brute Force Attack Based on FPGA
Submitted by grigby1 on Fri, 09/04/2020 - 3:36pm
Hardware
Xilinx XC3S1600E-4 FPGA device
stream cipher
RC4 algorithm
RC4
random-access storage
pubcrawl
process control
policy-based governance
on-chip BRAM
main controller
key searching unit
key searching speed
Human Factors
High Speed Parallel RC4 Key Searching Brute Force Attack
block RAM
frequency 128 MHz
FPGA
forecast keying methods
Force
field programmable gate arrays
field programmable gate array
encryption
Cryptography
Clocks
clock rate
Ciphers
brute force attacks
Brute force
biblio
Analysis of GPGPU-Based Brute-Force and Dictionary Attack on SHA-1 Password Hash
Submitted by grigby1 on Fri, 09/04/2020 - 3:36pm
general-purpose computing on graphics processing unit
brute force attacks
word-list
SHA-1 password hash
SHA-1
secure hash algorithm
password hash
mask-attack
hashed password data
GPGPU-based cracking
GPGPU-based brute-force attack
Cryptography
dictionary attack
brute-force
authentication data
policy-based governance
Human Factors
pubcrawl
encrypted file
message authentication
file organisation
authorisation
« first
‹ previous
1
2
3
4
5
next ›
last »