Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
threshold
biblio
False Data Injection Attack Detection in a Platoon of CACC in RSU
Submitted by grigby1 on Fri, 07/21/2023 - 2:14pm
Data processing
Sequential importance sampling
Platoon
On Board Unit
false trust
threshold
Resiliency
false data injection attack
Roads
Intrusion Detection
Time factors
Monte Carlo methods
resilience
data privacy
Scalability
collaboration
policy-based governance
pubcrawl
biblio
Research on DDoS Attack Detection based on Multi-dimensional Entropy
Submitted by grigby1 on Wed, 04/13/2022 - 10:31am
pubcrawl
Human behavior
resilience
Resiliency
Conferences
Entropy
computer science
detection algorithms
Metrics
Time complexity
information entropy
denial-of-service attack
DDoS attack detection
distributed denial of service
Dimension detection
threshold
biblio
Data-Driven Insights from Vulnerability Discovery Metrics
Submitted by grigby1 on Mon, 03/09/2020 - 2:38pm
natural language feedback
vulnerability discovery metrics
Vulnerability
threshold
software metrics
security of data
Security Metrics
pubcrawl
Programming Language
I-O Systems
metric
interpretation
data-driven insights
Chromium project
application domain
security
i-o systems security
biblio
A New Version of Kerberos Authentication Protocol Using ECC and Threshold Cryptography for Cloud Security
Submitted by aekwall on Mon, 05/20/2019 - 10:03am
Protocols
threshold cryptography
threshold
telecommunication security
Servers
security protocols
security of data
securities issues
RSA cryptography
RSA
Resiliency
public key cryptography
pubcrawl
authentication
protocol models
protocol
Metrics
Kerberos authentication protocol
Kerberos
Human behavior
high security
Elliptic curve cryptography
ECC
Cryptographic Protocols
Cloud Security
Cloud Computing
biblio
Shatter: Using Threshold Cryptography to Protect Single Users with Multiple Devices
Submitted by grigby1 on Tue, 06/27/2017 - 1:05pm
Cryptography
Human behavior
Identity management
key
Management
Metrics
mobile
privacy
pubcrawl
Resiliency
Scalability
security
security weaknesses
threshold