Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cryptocurrency
biblio
Trust Beyond Computation Alone: Human Aspects of Trust in Blockchain Technologies
Submitted by grigby1 on Tue, 12/01/2020 - 1:59pm
Human Aspects
Trusted Computing
trust
transaction transparency
software engineers
software engineering
pubcrawl
institutional aspects
Immutability
human trust
Human behavior
bitcoin
Guidelines
Distributed databases
Cryptography
cryptographic verifiability
cryptocurrency
computational trust
blockchain-based systems
blockchain technologies
blockchain
biblio
Multiple Layered Security Analyses Method for Cryptocurrency Exchange Servicers
Submitted by aekwall on Mon, 09/21/2020 - 3:35pm
malicious attacks
telecommunication security
static analysis
smartphone apps
smart phones
Semantics
semantic analysis
security
Resiliency
pubcrawl
multiple layered security analyses method
Androids
internet
Humanoid robots
dynamic analysis
cryptocurrency exchangers
cryptocurrency exchange servicers
cryptocurrency
cryptocurrencies
Cross Layer Security
composability
business trading
biblio
The Cryptocurrency Simulation using Elliptic Curve Cryptography Algorithm in Mining Process from Normal, Failed, and Fake Bitcoin Transactions
Submitted by grigby1 on Fri, 09/04/2020 - 3:59pm
ECC algorithm
transaction process
total processing time
time 6.0 s
time 152.0 s
securing transactions
scenario
RSA processing time
RSA algorithm
normal bitcoin transactions
mining process
high-level security
fake bitcoin transactions
Elliptic Curve Cryptography algorithm
Elliptic curve cryptography (ECC)
efficient processing time
Scalability
cryptography algorithms
cryptocurrency transaction
cryptocurrency simulation
Cryptocurrency security
appropriate algorithm
transaction processing
bitcoin security
bitcoin
cryptocurrency
security level
Human behavior
pubcrawl
public key cryptography
digital signatures
Cryptography
biblio
Nash Equilibrium of Multiple, Non-Uniform Bitcoin Block Withholding Attackers
Submitted by grigby1 on Fri, 09/04/2020 - 3:59pm
bitcoin security
seemingly malicious behavior
nonuniform Bitcoin mining pools
nonuniform Bitcoin block withholding attackers
Nash equilibrium conditions
Nash Equilibrium
Miner's Dilemma
MATLAB
mathematical analysis
in-depth profit analysis
cryptocurrency miners
BWH attack
blockchain distributed databases
Bitcoin-like systems
Scalability
profitability
bitcoin
cryptocurrency
Distributed databases
game theory
Peer-to-peer computing
cryptocurrencies
Data mining
Human behavior
pubcrawl
Hardware
blockchain
profile
Anita Nicholich
SaTC
cyber security
cyberinfrastructure
TTP
cryptocurrency
Illinois
biblio
Ransomware Threat and its Impact on SCADA
Submitted by grigby1 on Fri, 07/10/2020 - 1:08pm
Ransom
Device Compromising
Downtime
Encrypting
human machine interface
ICs
Industrial Control Systems
industrial networks
industrial processes
Infected System
Locker
malicious software
Network
operation technology
Petya
programmable logic controllers
Data Mitigation
Ransomware
ransomware attack
Ransomware Deadline
Ransomware Incidents
Ransomware Prevention
Ransomware Strategies
Ransomware Taxonomy
ransomware threat
Ransomware Threating
Remote Terminal Units
SCADA systems
supervisory control and data acquisition
Threat report
WannaCry
cryptocurrency
invasive software
Cybersecurity
pubcrawl
Metrics
Resiliency
resilience
Human behavior
Computer crime
malware
Human Factors
control engineering computing
industrial control
information security
cybercrimes
production engineering computing
cryptojacking
business productivity
Coin Miner
critical infrastructure
critical infrastructures
Cryptor
Cyber Actor
cyber attack
cyber threat
cyber-attack incidents
cybercriminals
Data and System Access
Data Backup
Data Extortion
biblio
Mitigation of Cryptojacking Attacks Using Taint Analysis
Submitted by grigby1 on Fri, 07/10/2020 - 1:08pm
Resiliency
malware
man-in-the-middle
man-in-the-middle attack
Metrics
mitigation
online front-ends
pubcrawl
resilience
malicious cryptocurrency mining
script characteristics
security of data
taint analysis
taint analysis method
threat model
Web site background
Web sites
abuse case
in-browsercryptojacking mitigation
Human Factors
Human behavior
Google Chrome
Data mining
cryptomining
cryptojacking
Cryptography
cryptocurrency
cross-site scripting
CPU usage
CPU resources
Central Processing Unit
Browsers
Attack Modeling
biblio
The Browsers Strike Back: Countering Cryptojacking and Parasitic Miners on the Web
Submitted by grigby1 on Fri, 07/10/2020 - 1:07pm
heavily obfuscated code
Web sites
under-the-hood practices
stealthy mining operations
Resiliency
resilience
pubcrawl
parasitic miners
online front-ends
mining prevention plug-ins
mining code
Metrics
learning (artificial intelligence)
Human Factors
Human behavior
browser code
hardware-assisted profiling
Hardware
exploitative exercise
Data mining
cryptojacking
Cryptography
cryptocurrency market
cryptocurrency
covert mining operations
countering cryptojacking
Computer hacking
Browsers
browser extension
browser cryptojacking
biblio
Stateful Hash-based Digital Signature Schemes for Bitcoin Cryptocurrency
Submitted by aekwall on Mon, 06/22/2020 - 11:25am
Bitcoin cryptocurrency
Winternitz one-time signature scheme
stateful hash-based signature schemes
stateful hash-based digital signature schemes
signature verification
Signature Generation
Rivest Shamir Adleman
Post-quantum cryptography
Merkle signature scheme
Lamport one-time signature scheme
Hash-based Digital Signature
elliptic curve digital signature algorithm
discrete logarithm problems
Scalability
Bitcoim
Hash Function
quantum computers
cryptocurrency
security levels
quantum cryptography
quantum computing
digital signatures
cryptocurrencies
pubcrawl
Resiliency
biblio
Bitcoin Security Reference Model: An Implementation Platform
Submitted by aekwall on Mon, 04/06/2020 - 10:14am
digital wallet
security services
security risk minimization
security functional architecture
Scalability
Resiliency
pubcrawl
peer to peer security
P2P transaction
Metrics
IP protocol
IP networks
Human Factors
application protocol
digital money
decentralized payment system
Cybersecurity
Cryptographic Protocols
cryptocurrency
cryptocurrencies
Bitcoin security reference model
Bitcoin security features
bitcoin security
Bitcoin cyberattacks
bitcoin
« first
‹ previous
1
2
3
4
5
6
next ›
last »