Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
collaboration
biblio
BlockTrail: A Service for Secure and Transparent Blockchain-Driven Audit Trails
Submitted by grigby1 on Thu, 04/27/2023 - 5:06pm
Databases
e-government performance
audit trails
audit logs
distributed systems
policy governance
blockchains
clean slate
bitcoin
Buildings
blockchain
collaboration
Urban areas
Throughput
Resiliency
resilience
Metrics
Human Factors
Human behavior
pubcrawl
Servers
biblio
A Novel Password Secure Mechanism using Reformation based Optimized Honey Encryption and Decryption Technique
Submitted by grigby1 on Fri, 04/14/2023 - 4:09pm
Resistance
Reformation-based scheme
Password authentication
optimized honey encryption and decryption
Brutal force attack
passwords
codes
brute force attacks
Force
collaboration
control systems
Protocols
authentication
policy-based governance
Human Factors
Human behavior
pubcrawl
security
biblio
Secure Two-Factor Authentication for IoT Device
Submitted by grigby1 on Fri, 04/14/2023 - 4:09pm
Protocols
Constraint device
Force measurement
two-factor authentication
mutual authentication
brute force attacks
MQTT
Force
Fingerprint recognition
Internet of Things
authentication
IoT device
policy-based governance
Human Factors
Human behavior
pubcrawl
security
collaboration
biblio
On Attacking IJTAG Architecture based on Locking SIB with Security LFSR
Submitted by grigby1 on Fri, 04/14/2023 - 4:09pm
reverse engineering
SLFSR
power analysis
LSIB
Linear feedback shift registers
known-plaintext attack
IEEE standard 1687
Hybrid power systems
brute force attacks
collaboration
IEEE standards
side-channel attacks
integrated circuits
policy-based governance
Human Factors
Human behavior
pubcrawl
security
biblio
Analyzing SocialArks Data Leak - A Brute Force Web Login Attack
Submitted by grigby1 on Fri, 04/14/2023 - 4:09pm
Cloud Computing
collaboration
Intrusion Detection
pubcrawl
Human behavior
Human Factors
policy-based governance
Databases
Companies
Firewalls (computing)
Force
ethics
brute force attacks
Data Breach
elasticsearch
SocialArks
biblio
Consensus-based Frequency Control of a Cyber-physical Power System under Two Types of DDoS Attacks
Submitted by grigby1 on Fri, 04/14/2023 - 4:08pm
collaboration
pubcrawl
Human behavior
Human Factors
policy-based governance
Computer crime
Smart Grid
DDoS Attacks
Force
simulation
denial-of-service attack
Microgrids
power systems
brute force attacks
Communication Systems
cyber-physical power system
biblio
Analysis of the random shuffling of message blocks as a low-cost integrity and security measure
Submitted by grigby1 on Fri, 04/14/2023 - 4:08pm
Memory management
Shuffling
Low cost
Brute force
Force measurement
brute force attacks
integrity
Current measurement
Force
Proposals
collaboration
Information systems
Cryptography
privacy
policy-based governance
Human Factors
Human behavior
pubcrawl
IoT
security
biblio
A Study on Brute Force Attack on T-Mobile Leading to SIM-Hijacking and Identity-Theft
Submitted by grigby1 on Fri, 04/14/2023 - 4:08pm
Systems architecture
tunneling
T-Mobile
SSH tunneling
SIM Hijacking
Scanning and Enumeration
identity theft
passwords
brute force attacks
Brute force
collaboration
cyber attack
Force
Data Breach
Databases
policy-based governance
Human Factors
Human behavior
pubcrawl
Computer hacking
biblio
Secure Storage System Using Cryptographic Techniques
Submitted by grigby1 on Fri, 04/14/2023 - 4:08pm
denial of service attack
random password
honey encryption
Brute Force Attack
passwords
brute force attacks
user interfaces
storage system
DoS
hashing
Force
encryption
real-time systems
security requirements
Databases
internet
policy-based governance
Human Factors
Human behavior
pubcrawl
collaboration
biblio
Efficient Brute-force handling methodology using Indexed-Cluster Architecture of Splunk
Submitted by grigby1 on Fri, 04/14/2023 - 4:07pm
ethics
Splunk Tool
IP Detection
grasping
ethical hacking
Creating Alerts
Brute Force Prevention
passwords
brute force attacks
collaboration
renewable energy sources
Force
Big Data
policy-based governance
Human Factors
Human behavior
pubcrawl
information security
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »