Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security improvement
biblio
Cloud Agent-Based Encryption Mechanism (CAEM): A Security Framework Model for Improving Adoption, Implementation and Usage of Cloud Computing Technology
Submitted by grigby1 on Mon, 11/29/2021 - 1:33pm
adoption
CAEM Model
Cloud Computing
Computational modeling
Human Factors
implementation
Organizations
pubcrawl
Scalability
security
security improvement
Servers
Social Agents
Software as a service
biblio
Security Improvement of Cloud Data Using Hybrid Cryptography and Steganography
Submitted by aekwall on Mon, 01/25/2021 - 12:58pm
hashing functions
Steganography
cloud data
security issue
asymmetric cryptography
Asymmetric Encryption
AES symmetric encryption
compressed data
data encryption phase
data validation phase
symmetric cryptography
information concealment technology
LSB algorithm
LZW algorithm
mixed encryption
RSA asymmetric encryption
SHA hashing algorithm
Steganographic
strong data security
data compression
encrypted data
encryption
hybrid encryption
cloud storage
Resiliency
Human behavior
pubcrawl
composability
Metrics
Cloud Computing
public key cryptography
security improvement
Image coding
information technology
cloud environment
Software algorithms
Image Processing
data storage
biblio
Security Improvement of Common-Key Cryptographic Communication by Mixture of Fake Plain- Texts
Submitted by grigby1 on Fri, 09/04/2020 - 3:25pm
common-key cryptographic communication
brute force attacks
Software algorithms
security improvement
legal plaintext
fundamental methods
fake plaintexts
fake plain-texts
decryption keys
cryptogram
concrete encryption-decryption algorithm
common-key cryptosystem
encryption
Common Key Cryptosystem
Brute Force Attack
policy-based governance
Human Factors
Computers
Law
eavesdropper
collaboration
pubcrawl
public key cryptography
telecommunication security
biblio
Attack Surface Identification and Reduction Model Applied in Scrum
Submitted by grigby1 on Fri, 08/28/2020 - 11:50am
security improvement
visualization
visual model
Surface treatment
Software systems
software system
software security vulnerabilities
software prototyping
software engineering
Software
Serum
sensitive data
security of data
attack surface
scrum reduction model
Scalability
Resiliency
resilience
reduction
pubcrawl
Metrics
Identification
Data models
computer security
attack surface identification
biblio
Enhanced Simulation Framework for Realisation of Mobility in 6LoWPAN Wireless Sensor Networks
Submitted by aekwall on Mon, 01/13/2020 - 12:04pm
6LoWPAN
shortest routes
personal area networks
mobility management (mobile radio)
Mobility
Handover
enhanced simulation framework
6LoWPAN wireless sensor networks
QoS
sensors
quality of service
security improvement
IoT
telecommunication network routing
simulation
wireless sensor networks
composability
pubcrawl
Resiliency
Protocols
performance evaluation
Internet of Things
computer network security
biblio
Security-Enhanced Signaling Scheme in Software Defined Optical Network
Submitted by grigby1 on Wed, 09/11/2019 - 2:44pm
security level
pubcrawl
public key cryptography
public key infrastructure
resilience
Resiliency
SDON
security
security improvement
Protocols
security-enhanced signaling
security-enhanced signaling procedure
Software
software defined networking
Software Defined Networks
software defined optical network
telecommunication security
telecommunication signalling
internet
communication security issue
composability
connection success rate performance
Cryptographic Protocols
current OpenFIow protocol
digital signatures
end-to-end trusted service connection
Energy Internet services
backbone optical networks
large-scale optical network
message feedback
Metrics
Microelectronics Security
openflow protocols
Optical feedback
Optical fiber networks
optical switches
biblio
Lightweight Security Signaling Mechanism in Optical Network for Smart Power Grid
Submitted by aekwall on Mon, 03/18/2019 - 9:54am
Protocols
trusted connection
smart power grids
smart power grid environment
Smart Grids
smart grid security
Smart Grid
signaling interaction
signaling encryption
security signaling
security level
security improvement
security
Scalability
Resiliency
pubcrawl
backbone optical networks
power engineering computing
optical receivers
optical fibre networks
Optical fiber networks
multidomain communication services
multi-domain optical network
Metrics
lightweight security signaling protocol
lightweight security signaling mechanism
large-scale multidomain optical network
internet
computer network security
communication security issue
Bandwidth
biblio
Transparent authentication systems for mobile device security: A review
Submitted by grigby1 on Wed, 03/08/2017 - 2:46pm
multimodal
user re-authentication
usability
transparent authentication systems
transparent authentication
text messages
task re-authentication
sensors
sensitivity application level
sensitive data
security improvement
pubcrawl170115
point-of-entry authentication
personal information
performance evaluation
authentication
mobile user
Mobile Security
Mobile handsets
mobile devices
mobile device security
mobile computing
Mobile communication
keystroke
Fingerprint recognition
Data protection
contact lists
biometric
behavioural profiling
authorisation