Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
internet
biblio
Hyper Secure Cognitive Radio Communications in an Internet of Space Things Network Based on the BB84 Protocol
Submitted by aekwall on Mon, 03/15/2021 - 12:03pm
Internet of space things
Tungsten
telecommunication security
Task Analysis
Space vehicles
Space Things network
Satellite broadcasting
Resiliency
quantum cryptography
pubcrawl
Protocols
probability
BB84
internet
hyper secure Cognitive Radio communications
geocentric orbital satellites
Cryptographic Protocols
constant thread
collaborative manner
Cognitive Radio Security
cognitive radio
Bennet-Brassard
BB84 protocol
biblio
A Conceptual Direction on Automatically Evolving Computer Malware using Genetic and Evolutionary Algorithms
Submitted by grigby1 on Tue, 03/09/2021 - 3:06pm
genetic algorithms
security
Scalability
Resiliency
resilience
pubcrawl
Proactive Defence
Metrics
malware creation
malware
Mal-ware Analysis
invasive software
internet
Human behavior
artificial ecosystem
evolutionary computing
evolutionary computation
Evolutionary algorithms
cyber world
cyber security
computing devices
computer malware
co-evolutionary predator-prey framework
BIOS
biologically inspired computing
Bio-inspired computing
artificial world
biblio
Increasing Participation and Security in Student Elections through Online Voting: The Case of Kabarak University
Submitted by grigby1 on Tue, 03/09/2021 - 3:04pm
online access
voting processes
three factor authentication
testing
student elections management
security
secure online voting system
Scalability
resultant system
Resiliency
resilience
pubcrawl
politics
password
Participation
online voting
authentication
offline electronic voting system
Mobile handsets
Metrics
Kabarak University
internet
Human behavior
further education
Electronic voting systems
electronic voting
Electronic mail
Educational institutions
e-voting systems
Dynamic Systems Development Methodology (DSDM)
campus hall voting
BIOS
biblio
An Automatic Detection and Analysis of the Bitcoin Generator Scam
Submitted by grigby1 on Tue, 03/09/2021 - 2:49pm
financial data processing
Web page
USD
security
search engines
scam instances
scam analysis
Scalability
pubcrawl
internet
Human behavior
generic system
Generators
free bitcoins
fraud detection
automatic detection
Data mining
cyberattack
Cryptography
cryptocurrency
cryptocurrencies
Crawlers
Computer crime
blockchain analysis
blockchain
bitcoin-based scam monitoring systems
bitcoin generator scam
bitcoin addresses
bitcoin
BGS
biblio
P4NIS: Improving network immunity against eavesdropping with programmable data planes
Submitted by grigby1 on Tue, 03/09/2021 - 2:40pm
Servers
P4NIS
packet classification
performance evaluation
policy-based governance
programmable data planes
programming protocol-independent packet processor based network immune scheme
Protocols
pubcrawl
network paths
single network path
supercomputer computational capacity
telecommunication traffic
three lines of defense
traffic packets
transmission port field encryption
versatile attackers
encryption-based countermeasures
brute-force attacks
computer network security
Cryptography
diverse encryption algorithms
eavesdropping
eavesdropping attacks
encrypted packet transmission
encryption
brute force attacks
Human behavior
Human Factors
internet
Internet Protocol
IP
IP networks
network immunity
biblio
Implementation and Analysis of USB based Password Stealer using PowerShell in Google Chrome and Mozilla Firefox
Submitted by grigby1 on Tue, 03/09/2021 - 2:39pm
Software
password management feature
passwordfox
PasswordFox program
policy-based governance
powershell
powershell script
pubcrawl
rubber ducky
password
stored data
time 14.0 s
tools
Universal Serial Bus
USB password stealer
user interfaces
usernames
Windows operating system
Google Chrome
Arduino Pro Micro Leonardo device
authorisation
badusb
browser applications
Browsers
brute force attacks
chromepass
Computer crime
arduino pro micro leonardo
Hardware
Human behavior
Human Factors
internet
Mozilla Firefox login data
operating systems
operating systems (computers)
biblio
Treats based Revisiting Defences Against Password Guessing Attacks and Phishing Data Over Different Online Records
Submitted by grigby1 on Tue, 03/09/2021 - 2:38pm
Phishing of data
Human Factors
individual data
internet
Internet clients
logins attempts
message authentication
password guessing attack
password guessing attacks resistance protocol
phishing data
Human behavior
policy-based governance
problematic endeavour
pubcrawl
real page
revisiting defences
site page
standardized savings number
uncovering delicate data
word reference ambushes
Denial of Service (DoS).
authorisation
Brute force
brute force attacks
charge card number
client-server systems
Computer crime
computer network security
cookies-based solution
Cryptographic Protocols
accommodating login
dependable page
different online records
directly wide spread
failed attempts
failed login attempt
failed login tries
full-scale number
genuine customers
biblio
Towards Data-Driven Characterization of Brute-Force Attackers
Submitted by grigby1 on Tue, 03/09/2021 - 2:37pm
IP networks
unrelated IP addresses
timing information
timing
threat hunters
targeted attack campaigns
public Internet
pubcrawl
Protocols
policy-based governance
password
Organizations
meta data
malicious login attempts
low-threat attacks
attacker dictionary
invasive software
internet
Human Factors
Human behavior
dictionary-based brute-force attack
defensive measures
data-driven characterization
coordinated attacks
connection metadata
computer network security
clustering
brute-force login attempts
brute-force attackers
brute force attacks
biblio
SSH and FTP brute-force Attacks Detection in Computer Networks: LSTM and Machine Learning Approaches
Submitted by grigby1 on Tue, 03/09/2021 - 2:36pm
learning (artificial intelligence)
telecommunication traffic
SSH
pubcrawl
policy-based governance
pattern classification
password
network traffic anomaly detection
network security
MLP
machine learning classifiers
machine learning approaches
machine learning algorithms
machine learning
LSTM
long short-term memory deep learning approach
Anomaly Detection
Intrusion Detection
internet
Human Factors
Human behavior
high-level attacks
FTP
dictionary-based brute-force attacks
Dictionaries
deep learning.
deep learning
computer network security
Computer Network Attacks
brute-force
brute force attacks
biblio
Biometric System of Access to Information Resources
Submitted by aekwall on Tue, 03/09/2021 - 11:57am
internet
webhost web server
web resource
unauthorized access
structural schematic diagram
software and hardware complex
Scalability
Resiliency
pubcrawl
phpMyAdmin database server
PHP scripting language
personal data
online front-ends
Metrics
JavaScript
Java
biometric encryption
information resourses
information resources
information resource
Identification
hypermedia markup languages
HTML hypertext markup language
hardware complex
Google Chrome extension
fingerprint
embedded scripts
developed complex
C language
biometric system
authorisation
authoring languages
« first
‹ previous
…
13
14
15
16
17
18
19
20
21
…
next ›
last »