Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information security
biblio
A Secure Mobile Payment Protocol for Handling Accountability with Formal Verification
Submitted by grigby1 on Thu, 02/24/2022 - 12:30pm
information security
Transaction Security
tools
security
Scyther tool
pubcrawl
Protocols
protocol verification
privacy
policy-based collaboration
Payment Protocol
Online banking
Mobile payment systems
Metrics
Industries
Cryptography
Compositionality
composability
collaboration
AVISPA tool
authorization
authentication
accountability
network accountability
Resiliency
biblio
Design and Implementation of A Vulnerability-Tolerant Reverse Proxy Based on Moving Target Defense for E-Government Application
Submitted by grigby1 on Tue, 02/22/2022 - 5:45pm
network security
information security
pubcrawl
Metrics
resilience
Resiliency
Scalability
cyber security
Prototypes
digital transformation
Dynamic scheduling
Uniform resource locators
Economics
E-Government
moving target defense
Communications technology
Web application
biblio
AE-DCNN: Autoencoder Enhanced Deep Convolutional Neural Network For Malware Classification
Submitted by aekwall on Mon, 02/07/2022 - 5:04pm
Resiliency
Pattern recognition
Image coding
deep convolutional neural network
autoencoder
malware classification
Predictive Metrics
malware
Human behavior
reverse engineering
pubcrawl
Training
deep learning
privacy
information security
Transforms
security
biblio
Malware Subspecies Detection Method by Suffix Arrays and Machine Learning
Submitted by grigby1 on Mon, 02/07/2022 - 4:46pm
privacy
feature extraction
machine learning
security
pubcrawl
Human behavior
Metrics
resilience
Resiliency
information security
static analysis
malware
malware detection
virtual environments
Malware Analysis
pattern matching
biblio
Digital Signature Scheme over Lattices
Submitted by aekwall on Fri, 02/04/2022 - 10:32am
Receivers
Repudiation
Signing
digital signature
Computers
verification
key generation
Lattices
Forgery
Cryptography
composability
Human behavior
Resiliency
Metrics
pubcrawl
information technology
information security
biblio
Implementation White-Box Cryptography for Elliptic Curve Cryptography
Submitted by aekwall on Mon, 01/31/2022 - 4:10pm
white box cryptography
composability
resilience
Metrics
Elliptic curve cryptography
embedded computing
encryption
information processing
information security
Monitoring
Program processors
pubcrawl
Resiliency
White Box Security
white-box cryptography
biblio
Communication Engineering Application System Based on Artificial Intelligence Technology
Submitted by grigby1 on Mon, 01/10/2022 - 4:55pm
composability
Smart Grids
Resiliency
resilience
pubcrawl
Metrics
information security
Human behavior
High and new technology
5G mobile communication
communication technology
Communications technology
Communication networks
Communication engineering
automation
artificial intelligence security
Artificial Intelligence
biblio
DDOS Attack Detection Accuracy Improvement in Software Defined Network (SDN) Using Ensemble Classification
Submitted by aekwall on Mon, 01/10/2022 - 12:53pm
simulation
information security
Support vector machines
internet
Servers
SDN
pubcrawl
Scalability
Resiliency
Human behavior
POX controller
Decision trees
denial-of-service attack
Accuracy
DDoS Attack
Attack vectors
biblio
An Overview and Analysis of Hybrid Encryption: The Combination of Symmetric Encryption and Asymmetric Encryption
Submitted by aekwall on Mon, 01/10/2022 - 12:46pm
information security
internet
encryption
pubcrawl
Metrics
Human behavior
Elliptic curve cryptography
asymmetric algorithm
data science
encryption algorithm
hybrid encryption
information processing
symmetric algorithm
Asymmetric Encryption
Resiliency
Compositionality
biblio
An Intelligent Model to Assess Information Systems Security Level
Submitted by grigby1 on Mon, 01/10/2022 - 12:32pm
Metrics
tools
Task Analysis
security audit
security
Resiliency
resilience
pubcrawl
policy-based governance
Neural networks
Multilayer Perceptron
Security Policies Analysis
ISO standards
information systems security maturity level
information security
Cybersecurity
cyber physical systems
collaboration
Artificial Neural Networks
artificial neural network
Artificial Intelligence
Adaptation models
« first
‹ previous
…
14
15
16
17
18
19
20
21
22
…
next ›
last »