Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
Biometric Security and Performance Metrics: FAR, FER, CER, FRR
Submitted by aekwall on Mon, 09/14/2020 - 12:33pm
personal privacy
Iris recognition
FRR
forgotten passwords
Fingers
FER
FAR
CER
biometrics authentication
biometric security system
biometric framework
biometric confirmation framework
access control process
authorisation
biometric
Face
Compositionality
computer science
Fingerprint recognition
biometrics (access control)
computational intelligence
composability
pubcrawl
security
data privacy
Cryptography
biblio
Privacy-Preserving Outsourced Speech Recognition for Smart IoT Devices
Submitted by aekwall on Mon, 09/14/2020 - 12:28pm
Privacy-preserving
composability
smart IoT devices
smart Internet of Things (IoT) devices
privacy-preserving outsourced speech recognition
outsourced privacy-preserving speech recognition framework
neural network-based speech recognition
long short-term memory neural network
long short-term memory (LSTM)
intelligent IoT device voice control
human-machine interaction interface
forward propagation (FP)
Back propagation through time (BPTT)
additive secret sharing-based interactive protocols
data privacy
Speech recognition
edge computing
recurrent neural nets
Logic gates
Neural networks
Cryptography
privacy
pubcrawl
privacy leakage
Protocols
distributed processing
Internet of Things
biblio
Counteraction against Internet of Things Botnets in Private Networks
Submitted by grigby1 on Fri, 09/11/2020 - 12:09pm
Metrics
private networks
private IoT networks
private Internet of Things network
IoT botnets activity
Internet of Things botnets
botnet threats
botnet prevention
botnet behavior
architectural features
botnet
Software systems
Compositionality
computer architecture
botnets
invasive software
Computer crime
data privacy
performance evaluation
IoT devices
computer network security
Resiliency
pubcrawl
IoT
Internet of Things
biblio
Fidelius: Protecting User Secrets from Compromised Browsers
Submitted by grigby1 on Fri, 09/11/2020 - 11:58am
fully malicious environment
Browser Security
Keyboards
browser window
Browser-Security
client-side privacy measures
compromised browsers
credit card numbers
Fidelius
user interfaces
Hardware-enclave
Malware-protection
page load
Trusted-I/O
user interaction
user secret protection
web browsing sessions
security of data
operating systems (computers)
Compositionality
Browsers
side-channel attacks
malware
online front-ends
composability
sensitive data
data privacy
Hardware
resilience
Metrics
Human behavior
pubcrawl
Servers
biblio
A Trusted Bluetooth Performance Evaluation Model for Brain Computer Interfaces
Submitted by grigby1 on Fri, 09/04/2020 - 4:27pm
mobile neurofeedback applications
brain state
brain-computer interfaces
Cyber Physical System
electroencephalography
fitness tracking
medical signal processing
mobile BCI technology
Mobile Cyber Security
mobile EEG-based BCI applications
brain function classification accuracy
neurophysiology
Performance Rating
system-on-chip
telemedicine
TMBCI
Trusted Mobile BCI Performance
Wearable
bluetooth security
cyber physical systems
data privacy
privacy
mobile computing
pubcrawl
composability
Resiliency
resilience
Human behavior
security
feedback
Bluetooth
ambulatory care
BCI hardware performance
BCI Safety
Bluetooth operating parameters
brain computer interface
brain computer interfaces
biblio
Efficient Construction for Full Black-Box Accountable Authority Identity-Based Encryption
Submitted by grigby1 on Fri, 09/04/2020 - 4:16pm
full black-box security
user private key
user privacy security
user identity
user decryption
underlying TB-IBE scheme
token-based identity-based encryption
Resiliency
resilience
pubcrawl
private key cryptography
Metrics
malicious private key generator
Identity-based encryption
generic construction
A-IBE scheme
encryption
dummy identity-based encryption
Decoding
decoder box
data privacy
computational complexity
composability
ciphertexts
black-box security
black box encryption
authority identity-based encryption
authorisation
attribute-based encryption
Accountable authority
biblio
Front-End IoT Application for the Bitcoin based on Proof of Elapsed Time (PoET)
Submitted by grigby1 on Fri, 09/04/2020 - 3:58pm
key location
complete block
constructive exchanges
elapsed time
front-end applications
front-end IoT application
front-end Web applications
Internet applications
IoT
block-dependent IoT applications
mandatory IoT gadget
neighborhood gadget
PoET
possible designs
registry agreements
remote Bitcoin customers
remote blockchain client
remote server
financial data processing
data privacy
Scalability
internet
blockchain
pubcrawl
Human behavior
cryptocurrencies
bitcoin
Internet of Things
bitcoin security
active exchanges
BC IoT
Bitcoin block chain customer
Bitcoin distributor
Bitcoin store
block block
biblio
Identification of Darknet Markets’ Bitcoin Addresses by Voting Per-address Classification Results
Submitted by grigby1 on Fri, 09/04/2020 - 3:58pm
bitcoin security
Weapons
voting per-address classification
security forensics aspect
Measurement
law enforcement
illegal products
forensic
DNM
decentralized digital currency
darknet markets
common ledger
classification
Bitcoin transactions
data privacy
financial data processing
bitcoin
drugs
Distributed databases
Roads
cryptocurrencies
blockchain
Human behavior
pubcrawl
machine learning
feature extraction
Scalability
biblio
Forensic Analysis of Bitcoin Transactions
Submitted by grigby1 on Fri, 09/04/2020 - 3:58pm
bitcoin security
transaction processing
transaction patterns
suspicious bitcoin addresses
Petri nets
forensic investigation
forensic analysis
Firing
FABT
Bitcoin transactions
bitcoin transaction net
bitcoin transaction data
data privacy
financial data processing
bitcoin
pattern matching
visualization
cryptocurrencies
Data mining
Human behavior
pubcrawl
computer science
Forensics
Scalability
biblio
Strong Password Generation Based On User Inputs
Submitted by grigby1 on Fri, 09/04/2020 - 3:38pm
popular online password checkers
generated passwords
intricate password patterns
non crackable passwords
password authentication system
password cracking
password cracking attacks
Password entropy
Password generator
existing random password generators
produced passwords
Randomization technique
special characters
Strength checkers
strong password generation
Strong password pattern
brute force attacks
Brute Force Attack
data privacy
internet
message authentication
pubcrawl
Human Factors
policy-based governance
password security
user interfaces
authorisation
authentication systems
authenticity
Auto-generated
Case sensitive words
Combination of numbers
dictionary attack
electronic commerce
« first
‹ previous
…
42
43
44
45
46
47
48
49
50
…
next ›
last »