Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information security
biblio
Comparative study of two pseudo chaotic number generators for securing the IoT
Submitted by grigby1 on Wed, 12/27/2017 - 12:56pm
pubcrawl
NIST
nonlinear functions
nonlinear recursive filters
PCNG2
piece-wise linear chaotic map
piecewise linear techniques
PRNGs
pseudo chaotic number generators
network security applications
PWLCmap
random number generation
recursive filters
Resiliency
second pseudo chaotic number generator
Skew Tent map
STmap
generation time
Bit rate
chaotic communication
chaotic cryptography
Ciphers
composability
coupled chaotic maps
cryptographically strong pseudo random number generators
Cryptography
binary diffusion matrix
Generators
Informatics
information security
Internet of Things
IoT
logistic map
Metrics
biblio
Chaos based Combined Multiple Recursive KEY Generator for Crypto-Systems
Submitted by grigby1 on Wed, 12/27/2017 - 12:56pm
cryptosystems
Resiliency
pubcrawl
Plain Text
Metrics
Internet usage
Internet security
internet
information security
Generators
Encryption technique
encryption
Decryption Technique
chaos
Cryptography
composability
communication channel threats
combined multiple recursive generator
CMRG
Ciphers
cipher text
chaotic cryptography
chaotic communication
chaos theory
Chaos Function
chaos based combined multiple recursive KEY generator
biblio
Integrated methods of information security in telecommunication systems
Submitted by grigby1 on Wed, 12/20/2017 - 12:59pm
Redundancy
encoding
encryption processes
encryption system
gaming
gamma sequence
generic polynomials
integrated information transformation method
noise-immune coding
dynamical chaos generators
restricted access information
stealth
telecommunication system
timer coding
timer signal construction
unauthorized access
verification elements
signal processing security
chaos
pubcrawl
Resiliency
privacy
information security
encryption
composability
Cryptography
Generators
Metrics
chaos generators
computer networks
cryptographic strength
cryptographic transformations
cyclic codes
data encryption
dynamic chaos sequence
biblio
Ensuring Information Security for Internet of Things
Submitted by grigby1 on Tue, 12/12/2017 - 1:29pm
information security
sensors
Security Intelligence application
Resiliency
pubcrawl
Protocols
Metrics
IoT security
Internet of Things
attacks taxonomy
industrial control
Human Factors
Human behavior
Computer crime
composability
Cloud Computing
big data technologies
biblio
Critical Analysis in the Research Area of Insider Threats
Submitted by grigby1 on Tue, 12/12/2017 - 1:23pm
Insider Threats
unintentional internal information security violation
taxonomy
Stress
Resiliency
pubcrawl
psychology
policy-based governance
Organizations
Monitoring
Metrics
Analytical models
insider threat modelling
insider espionage
insider behavior forecasting
Information systems
information security
Human Factors
Human behavior
detection of potential insiders
cyber sabotage
collaboration
biblio
Ambiguity as a Barrier to Information Security Policy Compliance: A Content Analysis
Submitted by grigby1 on Mon, 11/20/2017 - 12:25pm
Natural languages
Usable Security
text analysis
South Africa
Software
Security policy compliance
security policies
security of data
pubcrawl
policy-based governance
Policy human aspects
Policy clarity
Policy ambiguity
Policy
collaboration
institutional information resources
InfoSec policy document
Information services
information security policy compliance
information security
Guidelines
Government
Governance
Educational institutions
educational institution
education
Content analysis
biblio
A survey of distributed denial of service attack
Submitted by grigby1 on Mon, 11/20/2017 - 12:05pm
Interconnected Systems
video surveillance
UDP
TCP
Servers
server
resources
Resiliency
pubcrawl
Protocols
Metrics
IP networks
botnets
information security
Human Factors
Human behavior
Floods
distributed denial of service attack
DDoS attack detection strategies
DDoS
computer network security
Computer crime
Cloud Computing
biblio
Securing Smart Cities Using Blockchain Technology
Submitted by grigby1 on Fri, 11/03/2017 - 11:33am
Resiliency
social infrastructures
smart devices
Smart device
Smart City
smart cities
security framework
security
secure communication
Scalability
resources utilization
blockchain
pubcrawl
privacy
physical infrastructures
information technology
information security
data privacy
business infrastructures
blockchain technology
blockchain security
biblio
Security Expert Recommender in Software Engineering
Submitted by K_Hooper on Wed, 11/01/2017 - 11:09am
expert recommendation
expert systems
Human behavior
information security
Ontology
pubcrawl
recommender system
resilience
Scalability
software engineering
stack overflow
biblio
Adopting Security Routines in Legacy Organizations
Submitted by K_Hooper on Wed, 10/25/2017 - 11:53am
AAA
Damage Assessment
information security
legacy systems
pbm
pubcrawl
resilience
« first
‹ previous
…
38
39
40
41
42
43
44
45
46
next ›
last »