Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authentication method
biblio
Engineering Adaptive Authentication
Submitted by grigby1 on Tue, 01/25/2022 - 4:51pm
adaptive systems
security
pubcrawl
resilience
Resiliency
Conferences
authentication
Object recognition
composability
Decision Making
Context
navigation
Autonomic Security
Adaptive Authentication
authentication method
Requirements
biblio
Iot Based Bluetooth Smart Radar Door System Via Mobile Apps
Submitted by grigby1 on Fri, 09/04/2020 - 4:27pm
Mobile Apps
Android mobile phone
authentication method
Bluetooth protocol
bluetooth smart radar door system
industrial revolution 4.0
intelligent device
intertnet of things
microcontroller
Android devices
mobile Bluetooth module
processing software
Radar
remote voice control
Smart Door Lock
smart door lock system
wireless connection protocol
bluetooth security
cyber physical systems
Protocols
mobile devices
pubcrawl
composability
Resiliency
resilience
Human behavior
home automation
Internet of Things
microcontrollers
object detection
security system
smart phones
Bluetooth
Cyber Physical System
Android (operating system)
biblio
Two Factor Authentication using Twofish Encryption and Visual Cryptography Algorithms for Secure Data Communication
Submitted by aekwall on Mon, 03/02/2020 - 12:25pm
alphanumeric password system
twofish encryption and visual cryptography method
Twofish encryption
two factor authentication
TEVC method
TEVC encryption algorithm
password protections
message code confirmation
Java platform
Graphical Password authentication
Graphical Password
fingerprint scan
dual authentication process
authentication method
authorisation
secure authentication
data communication
Human Factors
data visualisation
computational complexity
encryption
visual cryptography
Java
message authentication
Data protection
internet
pubcrawl
Cryptography
biblio
Pick location security: Seamless integrated multi-factor authentication
Submitted by grigby1 on Thu, 02/15/2018 - 11:48am
pick location security
Mobile Applications
mobile computing
mobile device
Mobile handsets
Multi Factor Authentication
Multi-factor authentication
multifactor authentication
multifactor authentication system
Metrics
pubcrawl
resilience
Resiliency
seamless integrated multifactor authentication
sensitive data protection
Servers
user mobile device location
global positioning system (GPS)
authentication method
authorisation
Bluetooth
Bluetooth device
browser
Data protection
device Bluetooth key
Global Positioning System
authentication
Human behavior
human factor
Human Factors
identity theft
impersonation
location
message authentication
biblio
Highly robust analysis of keystroke dynamics measurements
Submitted by grigby1 on Wed, 03/08/2017 - 2:44pm
Particle measurements
typing characteristics
statistical analysis
robust classification performance analysis
regularized linear discriminant analysis
pubcrawl170115
principal component analysis
Pollution measurement
pattern classification
Atmospheric measurements
MWCD-L2-LDA
minimum weighted covariance determinant estimator
message authentication
keystroke dynamics measurements
implicit weight assignment
Covariance matrices
authentication method