Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
signature
biblio
Design and Implementation of System for URL Signature Construction and Impact Assessment
Submitted by aekwall on Fri, 01/20/2023 - 3:09pm
Servers
Scalability
pubcrawl
Resiliency
Prototypes
malware
Informatics
Human Factors
signature
signature based defense
Costs
Uniform resource locators
Malicious URL
biblio
Federated Machine Learning Architecture for Searching Malware
Submitted by grigby1 on Mon, 03/14/2022 - 11:15am
malware detection
ML–computing
mathematical models
malware sandbox
logic-vector analysis
federated machine learning
cloud–edge computing
cloud sandbox
signature
cyber-physical system
Policy Based Governance
computer architecture
sandboxing
malware
composability
Computational modeling
Analytical models
collaboration
pubcrawl
machine learning
Training
biblio
Significance of Elliptic Curve Cryptography in Blockchain IoT with Comparative Analysis of RSA Algorithm
Submitted by grigby1 on Tue, 02/22/2022 - 12:25pm
Metrics
Stakeholders
signature
Scalability
RSA
Resiliency
resilience
pubcrawl
privacy
peer-to-peer security
Peer-to-peer computing
peer to peer security
IoTBC
Internet of Things
Intelligent systems
Human Factors
Hash Function
Elliptic curve cryptography
ECDSA
ECC
digital
blockchain
biblio
Detecting Malware, Malicious URLs and Virus Using Machine Learning and Signature Matching
Submitted by grigby1 on Mon, 02/07/2022 - 3:47pm
prediction
Virus
URL Detection
Signature Matching
Regression
signature
Malware Analysis
Random Forest
computer viruses
classification
Frequency conversion
Uniform resource locators
privacy
Trojan horses
malware
Radio frequency
Resiliency
resilience
Metrics
Human behavior
pubcrawl
machine learning
security
biblio
Implicit Certificate Based Signcryption for a Secure Data Sharing in Clouds
Submitted by aekwall on Fri, 02/04/2022 - 9:31am
certificate
cloud server
Companies
composability
Costs
digital signatures
encryption
Human behavior
information processing
Media
Metrics
pubcrawl
Repudiation
Resiliency
signature
Signcryption
biblio
Proposing Innovative Intruder Detection System for Host Machines in Cloud Computing
Submitted by grigby1 on Thu, 07/08/2021 - 1:25pm
intruder detection system
Virtualization
Virtual machining
virtual machine security
virtual machine
Technological innovation
signature
security
Resiliency
resilience
pubcrawl
Prevention
Intrusion Detection
signature based defense
IDS
host machine
Engines
Cyber Physical System
Cryptography
composability
Cloud Computing
attack
Anomaly
alerts
Scalability
biblio
Anonymous Authentication and Key Agreement Protocol for LTE Networks
Submitted by grigby1 on Thu, 08/13/2020 - 4:20pm
key agreement protocol
standard TS
specific base station
signature
Scalability
Resiliency
resilience
pubcrawl
pseudorandom permutation
pseudo IMSI
Protocols
mobile terminal
message authentication
LTE networks
Long Term Evolution
3G mobile communication
internet
International Mobile Subscriber Identity
high-speed wireless communication standard
fake stations
Cryptographic Protocols
communication standard
authentication processes
authentication and key agreement protocol
authentication
authenticated scheme suitable
anonymous messaging
anonymous authentication
anonymous
3GPP
biblio
SE-Enc: A Secure and Efficient Encoding Scheme Using Elliptic Curve Cryptography
Submitted by aekwall on Mon, 08/10/2020 - 9:50am
ECC
trusted scheme
SE-Enc
encoding scheme
asymmetric cryptography
Asymmetric Encryption
signature
Internet of Things devices
Compositionality
authenticated encryption
encoding
security requirements
encryption
Elliptic curves
Elliptic curve cryptography
Heuristic algorithms
public key cryptography
message authentication
Metrics
pubcrawl
Human behavior
Resiliency
Trusted Computing
Internet of Things
biblio
Bytecode Heuristic Signatures for Detecting Malware Behavior
Submitted by aekwall on Mon, 03/09/2020 - 10:13am
virtual machines
predictability
Security Heuristics
signature
reactive security solutions
proactive behavior heuristics
proactive approaches
malicious applications
heuristic
hash-based signatures
bytecode heuristic signatures
bytecode
behavior based detection
behavior
response time
Instruction sets
Monitoring
Computer languages
low performance overhead
Prototypes
malware behavior
computational complexity
Virtual machining
digital signatures
pubcrawl
Resiliency
invasive software
malware detection
security
malware
Scalability
biblio
Secure Sign: Signing Document Online
Submitted by grigby1 on Tue, 10/15/2019 - 1:45pm
secure sign
legal offices
main security goals
Metrics
online
pubcrawl
Repudiation
resilience
Resiliency
Secure
Law
SecureSign system
sign
signatories
signatory
signature
signing documents
signing parties
user fingerprint
digital signatures
authenticity
authorisation
biometric
component
composability
contracts
Cryptography
data integrity
authentication
document
document online
electronic signature tablet
face-to-face
fingerprint reader
Fingerprint recognition
fraud
Human behavior
1
2
next ›
last »