Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
unauthorized access
biblio
Development of a Model for Managing the Openness of an Information System in the Context of Information Security Risks of Critical Information Infrastructure Object
Submitted by grigby1 on Fri, 09/01/2023 - 2:21pm
composability
functional approach
critical information infrastructure facility
information resources
Human Factors
information security system
unauthorized access
Context modeling
information theoretic security
Compositionality
Information systems
collaboration
Scalability
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
risk management
information security
biblio
Proposal of HMAC based Protocol for Message Authenication in Kerberos Authentication Protocol
Submitted by grigby1 on Fri, 03/03/2023 - 5:16pm
telecommunication traffic
kerberos security
symmetric cryptography
Key Distribution System
codes
unauthorized access
HMAC
Electronic mail
Public key
Servers
Protocols
authentication
message authentication
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Biometric System of Access to Information Resources
Submitted by aekwall on Tue, 03/09/2021 - 11:57am
internet
webhost web server
web resource
unauthorized access
structural schematic diagram
software and hardware complex
Scalability
Resiliency
pubcrawl
phpMyAdmin database server
PHP scripting language
personal data
online front-ends
Metrics
JavaScript
Java
biometric encryption
information resourses
information resources
information resource
Identification
hypermedia markup languages
HTML hypertext markup language
hardware complex
Google Chrome extension
fingerprint
embedded scripts
developed complex
C language
biometric system
authorisation
authoring languages
biblio
IoT-APIScanner: Detecting API Unauthorized Access Vulnerabilities of IoT Platform
Submitted by grigby1 on Wed, 01/20/2021 - 4:22pm
IoT security
Web API
user privacy
unauthorized access
tools
timing
Task Analysis
Smart homes
security
Resiliency
resilience
pubcrawl
program testing
permission verification
IoT-APIScanner
API
IoT devices
Internet of Things
formal verification
data privacy
Compositionality
cloud services
Cloud Computing
cloud API
authorisation
application programming interface
application program interfaces
APIs
API unauthorized access vulnerability detection
API test cases
biblio
Enhanced Honey Encryption Algorithm for Increasing Message Space against Brute Force Attack
Submitted by grigby1 on Fri, 09/04/2020 - 3:24pm
Human Factors
brute force attacks
user data protection algorithm
message transmission
message space limitation problem
message space limitation
honeywords generation method
honey encryption algorithm
distribution transforming encoder
distribution probability theory
Distribution functions
discrete distribution function
cumulative distribution function
CDF
Brute Force Attack
policy-based governance
Cryptography
encoding
password
Databases
Web sites
Force
Data protection
Decoding
collaboration
pubcrawl
probability
Data Security
honey encryption
unauthorized access
authorisation
encryption
biblio
Data Security Enhancement in Cloud Computing Using Multimodel Biometric System
Submitted by grigby1 on Fri, 08/28/2020 - 3:43pm
DNA encryption
biometric encryption
DNA
AES cipher
data centers
data hiding
data leak
data security enhancement
DNA cipher
confidential information
Encoding and Decoding
information storage
multimodal biometric system
multimodel biometric system
multiple security system
polymers
security authentication
unauthorized access
Cloud Computing
Cryptography
authorisation
pubcrawl
Metrics
Resiliency
Conferences
AES
Scalability
Ciphers
encoding
biometrics (access control)
Data Security
resilience
smart phones
confidential data
information retrieval
Smartphones
biblio
An Intrusion Detection System Based Secured Electronic Service Delivery Model
Submitted by aekwall on Mon, 02/24/2020 - 10:57am
multifaceted electronic services
government data processing
Banking
Cloud Banking
cloud banking transaction
cloud service model
ICT
identification number
information-and-communication technology
message communication
digital communication
open channel
PINA
privacy-integrity-nonrepudiation-and-authentication information
secured electronic service delivery model
security lapses
single window based cloud service delivery model
Smart card
Repudiation
composability
Cloud Computing
Servers
authorisation
data privacy
Conferences
Resiliency
Human behavior
pubcrawl
intrusion detection system
component
Computational modeling
Metrics
internet
Intrusion Detection
smart cards
unauthorized access
bank data processing
biblio
IoT Data Management and Lineage Traceability: A Blockchain-based Solution
Submitted by aekwall on Mon, 11/25/2019 - 2:12pm
Internet of Things
untrusted IoT devices
unauthorized access
Trusted Computing
smart contracts
Servers
security threats
pubcrawl
program diagnostics
Privacy Threats
privacy
open systems
lineage traceability
IoT data management
interoperability
Internet of Things (IoT)
Outsourced Database Integrity
fog nodes
edge clouds
Distributed databases
data provenance
data privacy
data management
data integrity
Cryptography
Cloud Computing
blockchain-based data management
blockchain
authorization
Resiliency
composability
Metrics
biblio
Detection of Temporal Data Ex-Filtration Threats to Relational Databases
Submitted by aekwall on Mon, 11/04/2019 - 11:23am
Training
temporal data ex-filtration threat detection
Temporal Attacks
Insider Threats
Data Analytics for Security
anomaly detection techniques
anomalous access detection
relational database security
unauthorized access
relational databases
data theft
Anomaly Detection
Inspection
query processing
Metrics
composability
pubcrawl
Human behavior
Resiliency
feature extraction
real-time systems
authorisation
Monitoring
biblio
Enhanced Secure Mechanism for Virtual Machine Migration in Clouds
Submitted by grigby1 on Tue, 10/15/2019 - 2:44pm
source nonrepudiation
Metrics
mutual authentication
pubcrawl
replay protection
Repudiation
resilience
Resiliency
Software as a service
malicious viruses
unauthorized access
Virtualization
virtual machine migration
Virtual machine monitors
virtual machines
VM disk images
vulnerabilities
authentication
live VM migration
live migration
Human behavior
enhanced secure mechanism
DDoS Attacks
data integrity
data confidentiality
computer viruses
Computational modeling
composability
Cloud federations
Cloud Computing
AVISPA tool
authorization
authorisation
1
2
next ›
last »