Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cybernetics
biblio
The Information Processing in the Cybernetic Environment of Signals Intelligence
Submitted by aekwall on Mon, 03/25/2019 - 8:58am
information and communication technology
signal processing security
Signals Intelligence
Signal Intelligence
military operations
military computing
intelligence information
Information systems
information processing system
information processing
information processes
Resiliency
electronic warfare
Cyberspace
cybernetics
cybernetic environment
Decision Making
Metrics
component
composability
pubcrawl
biblio
Post quantum hash based digital signatures comparative analysis. Features of their implementation and using in public key infrastructure
Submitted by grigby1 on Fri, 09/28/2018 - 2:12pm
Public key
XMSS algorithm implementation
XMSS algorithm
Ukrainian hash function national standard
Telecommunications
system analysis and design
SPHINCS algorithm
Scalability
resilience
Quantum-safe digital signatures
public key infrastructure
public key cryptography
computer science
pubcrawl
post quantum hash based digital signatures
post quantum cryptography
perspective digital signatures algorithms
Merkle algorithm
Leighton-Micali algorithm
hash functions analysis
Hash based digital signatures
digital signatures
cybernetics
biblio
A Content-Based Phishing Email Detection Method
Submitted by grigby1 on Wed, 12/20/2017 - 12:07pm
information extraction
unsolicited e-mail
social engineering criteria
social engineering concepts
social engineering
semantic Web database
Semantic Web
Resource description framework
pubcrawl
phishing email
Phishing
Investment
information storage
Computer crime
Human Factors
Human behavior
fuzzy logic control algorithm
fuzzy control
Filtering
email categories
Electronic mail
Databases
database management systems
cybernetics
Creativity
content-based phishing email detection
biblio
Security is About Control: Insights from Cybernetics
Submitted by grigby1 on Mon, 06/05/2017 - 11:33am
artificial intelligence security
composability
computer security
control systems
Control Theory
cybernetics
Human behavior
Metrics
pubcrawl
Resiliency
security
« first
‹ previous
1
2