Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information security
biblio
Methods and Algorithms for Generating a Storage Key Based on Biometric Parameters
Submitted by grigby1 on Tue, 06/14/2022 - 3:15pm
neural network
Radon transform
bio key
biometrics
biometrics (access control)
Algorithm
Transforms
biometric encryption
automation
information security
Software algorithms
Metrics
Reed-Solomon codes
Access Control
Scalability
Resiliency
resilience
pubcrawl
biblio
Mathematical and Algorithmic Prevention of Biometric Data Leaks
Submitted by grigby1 on Tue, 06/14/2022 - 3:12pm
Identification
industrial plants
automation
biometric authentication
biometrics (access control)
biometric encryption
Random access memory
data storage
Metrics
encryption
Object recognition
authentication
Scalability
Resiliency
resilience
pubcrawl
information security
biblio
Honeypots Vulnerabilities to Backdoor Attack
Submitted by grigby1 on Thu, 06/09/2022 - 2:52pm
information security
pubcrawl
resilience
Scalability
Cryptography
attacker
Human Factors
honey pots
honeypot
attack
Resiliency
Backdoor
Kfsensor
victim
biblio
SSH and Telnet Protocols Attack Analysis Using Honeypot Technique: Analysis of SSH AND ℡NET Honeypot
Submitted by grigby1 on Thu, 06/09/2022 - 2:50pm
cyber attack
℡NET
Resiliency
Cowrie
SSH
honeypot
honey pots
Particle measurements
Human Factors
tools
Protocols
Scalability
Safety
resilience
pubcrawl
IP networks
risk management
information security
biblio
Homomorphic Properties Within Lattice-Based Encryption Systems
Submitted by grigby1 on Thu, 06/09/2022 - 2:42pm
Cryptography
encryption
Cloud Computing
pubcrawl
resilience
Resiliency
Scalability
information security
Metrics
Homomorphic encryption
cryptocurrency
Lattices
set theory
Memory
embedded computing
Human Factors
biblio
SCKHA: A New Stream Cipher Algorithm Based on Key Hashing and Splitting Technique
Submitted by grigby1 on Thu, 06/09/2022 - 2:37pm
Ciphers
encryption
information security
pubcrawl
resilience
Throughput
authentication
Cryptography
Reliability
Compositionality
hash algorithms
stream cipher
symmetric encryption
Resiliency
Computational efficiency
Key Hashing
biblio
Determination of the Optimal Ratio of Normal to Anomalous Points in the Problem of Detecting Anomalies in the Work of Industrial Control Systems
Submitted by aekwall on Thu, 06/09/2022 - 11:38am
information security
scalable systems
Scalability
Resiliency
pubcrawl
power systems
machine learning
Intrusion Detection
integrated circuits
ICS Anomaly Detection
industrial control systems (ICS)
Industrial Control Systems
industrial control
high-speed networks
feature extraction
deep learning
control systems
autoencoders
biblio
Information Security Risk Assessment of Industrial Control System Based on Hybrid Genetic Algorithms
Submitted by aekwall on Thu, 06/09/2022 - 11:38am
information security
pubcrawl
Scalability
Resiliency
Industrial Control Systems
control systems
automation
industrial control
mechatronics
evidence theory
Hierarchy
hybrid genetic algorithm
industrial control system
measurement uncertainty
security risk assessment
scalable systems
biblio
Information Security Practice of Intelligent Knowledge Ecological Communities with Cloud Computing
Submitted by grigby1 on Wed, 06/08/2022 - 1:56pm
encryption
Cloud Computing
information security
security
pubcrawl
resilience
Guidelines
Virtualization
Compositionality
Scalability
Consumer electronics
Knowledge engineering
Resiliency
intelligent data
Ecological Communities
Intelligent Knowledge
biblio
Research on Security Evaluation Technology of Intelligent Video Terminal
Submitted by grigby1 on Wed, 06/08/2022 - 1:55pm
Compositionality
Intelligent video terminal
Assessment
intelligent data
Resiliency
hospitals
Scalability
Transportation
testing
information security
Data Security
computer security
Production
data privacy
resilience
pubcrawl
Monitoring
security
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
…
next ›
last »