Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
unauthorized users
biblio
Covert Communications in Packet Collision Channels
Submitted by grigby1 on Thu, 07/16/2020 - 12:17pm
sophisticated receiver
pubcrawl
random access MAC
random access system
Receivers
resilience
Resiliency
Scalability
security
slotted ALOHA
physical-layer models
telecommunication channels
telecommunication security
transmitted signal
transmitter Alice
unauthorized users
watchful adversary Willie
Willie's receiver
wireless system security
covert systems
achievable covert rates
channel capacity
channel coding
composability
Compositionality
Conferences
covert channels
covert communications
covert rate
access protocols
decision theory
Detectors
Measurement
medium-access control layer
Monitoring
packet collision channels
Physical layer
physical layer environment
biblio
Multimodal Data Security Framework Using Steganography Approaches
Submitted by aekwall on Mon, 06/01/2020 - 10:42am
advanced encryption standard
honey pots
Steganography approaches
multimodal data security framework
multimodal
least significant bit
information hiding strategies
heuristic intrusion detection
Augmented Reality Steganography
ARSteg
encryption algorithm
Steganography
augmented reality
framework
Scalability
Human Factors
unauthorized users
pubcrawl
password
authentication
Resiliency
data encryption
security
decryption
Conferences
encryption
Cryptography
Servers
biblio
TIGER HASH KERBEROS BIOMETRIC BLOWFISH USER AUTHENTICATION FOR SECURED DATA ACCESS IN CLOUD
Submitted by aekwall on Mon, 05/20/2019 - 10:02am
security
Human behavior
Kerberos
Kerberos biometric blowfish user authentication
message authentication
Metrics
pubcrawl
Registration
Resiliency
secured data access
genuine user
Servers
Ticket Granting
tiger hash
Tiger Hash-based Kerberos biometric blowfish authentication
unauthorized users
user ID
user identity
users ID
cloud server
authenticated user
authentication
authentication accuracy
authentication server
authentications time
authenticity
authorisation
Blowfish encryption
Cloud Computing
Access Control
cloud services
cloud user
confidentiality rate
Cryptography
CS grants
CU
encrypted ticket
encryption
biblio
Dynamic Honeypot Configuration for Intrusion Detection
Submitted by grigby1 on Fri, 02/08/2019 - 4:37pm
resilience
internet
intruders
intrusion detection system
Intrusion Prevention system factors
IP networks
Market research
network activity
pubcrawl
Informatics
Resiliency
Scalability
secured network
Software
unauthorized users
unsecured network
unused IP address
honey pots
Computer hacking
computer network security
Conferences
Dynamic Configuration
Dynamic configuration and Intruders
dynamic Honeypot Configuration
enterprise level security
Honey Pot
Computer crime
honey trap methodology
honeypot
honeypot mechanism activity
Honeypot security system
Honeytrap
Human behavior
Human Factors
biblio
A blockchain-based data usage auditing architecture with enhanced privacy and availability
Submitted by grigby1 on Mon, 06/11/2018 - 3:39pm
distributed infrastructures
untrusted servers
unauthorized users
tamper-proof evidences
security breaches
Resiliency
resilience
pubcrawl
Proposals
privacy-preserving fashion
Peer-to-peer computing
network accountability
Metrics
hierarchical identity based cryptographic mechanisms
auditable contracts
data usage compliance
data sharing
data privacy
data owners
data access
Cryptography
contracts
composability
blockchain-based data usage auditing architecture
blockchain infrastructures
authorization
authorisation