Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
blockchain
biblio
A Security Reference Architecture for Blockchains
Submitted by aekwall on Mon, 09/28/2020 - 11:42am
ISO standards
threat-risk assessment
surveys and tutorials
security reference architecture
operational security issues
layered systems
ISO/IEC 15408
reference architecture
blockchain security
security countermeasures
consensus protocol
security of data
IEC standards
security vulnerabilities
risk management
blockchain
Cryptography
Peer-to-peer computing
Routing
pubcrawl
Resiliency
Scalability
biblio
Traceability in Permissioned Blockchain
Submitted by aekwall on Mon, 09/28/2020 - 11:41am
Scalability
encryption
Resiliency
pubcrawl
bitcoin
blockchain
cryptocurrencies
blockchain security
fully homomorphic encryption
Traceability
Hidden Markov models
zero knowledge proof
permissioned blockchain
hidden Markov model
permissionless blockchain
biblio
Security Management and Visualization in a Blockchain-based Collaborative Defense
Submitted by aekwall on Mon, 09/28/2020 - 11:41am
Ethereum blockchain
security management dashboard
realworld defense systems
defense alliance
DDoS threat
DDoS defense system
cooperative network defense
BloSS
blockchain-based collaborative defense
blockchain signaling system
attack information
autonomous system
denial-of-service attacks
cyber security analysts
network defense
Computer crime
groupware
visualization
data visualisation
Data visualization
blockchain security
collaboration
blockchain
pubcrawl
Resiliency
DDoS Attacks
telecommunication security
Cryptography
Scalability
ddos mitigation
biblio
Contract-Based Approach for Security Deposit in Blockchain Networks with Shards
Submitted by aekwall on Mon, 09/28/2020 - 11:41am
Economics
Sharding
security-deposit based consensus protocol
security of data
security incentive
security deposit
Scalability
Resiliency
pubcrawl
individual rationality
incentive compatibility
hash-puzzle-solving consensus protocol
flexible deposits
beacon chain
economic incentive
Cryptographic Protocols
cryptocurrencies
contracts
contract-based approach
contract theory
consensus protocol
blockchain security
blockchain networks
blockchain
bitcoin
biblio
CoDAG: An Efficient and Compacted DAG-Based Blockchain Protocol
Submitted by aekwall on Mon, 09/28/2020 - 11:41am
transaction processing
transaction verification time
transaction demand
linear structure
directed graphs
directed acyclic graph structure
directed acyclic graph
decentralized characteristic
compacted directed acyclic graph
compacted DAG structure
CoDAG
blockchain protocol
navigation
Scalability
electronic money
Throughput
blockchain security
blockchain platforms
ethereum
blockchain
bitcoin
pubcrawl
Resiliency
Protocols
Cryptography
biblio
Effective Scheme against 51% Attack on Proof-of-Work Blockchain with History Weighted Information
Submitted by aekwall on Mon, 09/28/2020 - 11:41am
blockchain security
proof-of-work blockchain
PoW blockchains
mining
history weighted information
hash power
double-spending problems
double-spending attack
Double spending attack
blockchain systems
51% Attack
Switches
security of data
cryptocurrencies
Data mining
blockchain
Cryptography
Peer-to-peer computing
pubcrawl
Resiliency
Protocols
History
Cryptographic Protocols
Scalability
biblio
DeMetrA - Decentralized Metering with user Anonymity and layered privacy on Blockchain
Submitted by aekwall on Mon, 09/21/2020 - 3:50pm
market value
cars
adversarial modifications
Decentralized Metering
DeMetrA - decentralized metering
Distributed Database
DSLRs
identity-based cryptography
identity-based signatures
layered encoding
cyber physical systems
odometer fraud
odometers
practical concern
product attributes
pseudonym
reported values
shutter counters
specific counters
Control Theory and Privacy
privacy
Scalability
Cryptography
data privacy
History
Protocols
malicious modification
Resiliency
Human behavior
pubcrawl
automobiles
blockchain
Distributed databases
cyber-physical systems
digital signatures
Public key
blockchain technology
user anonymity
Europe
biblio
Implementation of Blockchain Based Distributed Web Attack Detection Application
Submitted by grigby1 on Fri, 09/18/2020 - 2:07pm
firewalls
command injection attacks
Co
web-based attacks
Web servers
Web platforms
web attack detection application
Web attack detection
web application firewalls
Stakeholders
signature based detection method
signature based detection
Cryptography
blockchain based web attack detection model
Reliability
Metrics
smart contracts
composability
internet
Resiliency
resilience
pubcrawl
Distributed databases
blockchain
biblio
Whispering Botnet Command and Control Instructions
Submitted by grigby1 on Fri, 09/11/2020 - 12:09pm
Compositionality
whispering botnet command and control instructions
whisper
stealthy communication methods
radar communication
peer-to-peer communication infrastructure
dark communication strategy
control bots
C&c
bidirectional botnet command and control operations
command and control systems
botnet
Cryptography
Metrics
botnets
invasive software
Protocols
internet
computer network security
Resiliency
pubcrawl
Peer-to-peer computing
blockchain
biblio
Partitioning Attacks on Bitcoin: Colliding Space, Time, and Logic
Submitted by grigby1 on Fri, 09/04/2020 - 3:59pm
bitcoin
temporal spatio-temporal
spatial spatio-temporal
peer-to-peer transactions
partitioning
network dynamics
network distribution
logical partitioning attacks
decentralized network architecture
Bitcoin network
attack scenarios
bitcoin security
security of data
Distributed databases
Software
Human behavior
pubcrawl
Peer-to-peer computing
Organizations
blockchain
internet
Scalability
IP networks
« first
‹ previous
…
31
32
33
34
35
36
37
38
39
…
next ›
last »