Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security
biblio
A Novel Password Secure Mechanism using Reformation based Optimized Honey Encryption and Decryption Technique
Submitted by grigby1 on Fri, 04/14/2023 - 3:09pm
Resistance
Reformation-based scheme
Password authentication
optimized honey encryption and decryption
Brutal force attack
passwords
codes
brute force attacks
Force
collaboration
control systems
Protocols
authentication
policy-based governance
Human Factors
Human behavior
pubcrawl
security
biblio
Secure Two-Factor Authentication for IoT Device
Submitted by grigby1 on Fri, 04/14/2023 - 3:09pm
Protocols
Constraint device
Force measurement
two-factor authentication
mutual authentication
brute force attacks
MQTT
Force
Fingerprint recognition
Internet of Things
authentication
IoT device
policy-based governance
Human Factors
Human behavior
pubcrawl
security
collaboration
biblio
On Attacking IJTAG Architecture based on Locking SIB with Security LFSR
Submitted by grigby1 on Fri, 04/14/2023 - 3:09pm
reverse engineering
SLFSR
power analysis
LSIB
Linear feedback shift registers
known-plaintext attack
IEEE standard 1687
Hybrid power systems
brute force attacks
collaboration
IEEE standards
side-channel attacks
integrated circuits
policy-based governance
Human Factors
Human behavior
pubcrawl
security
biblio
Analysis of the random shuffling of message blocks as a low-cost integrity and security measure
Submitted by grigby1 on Fri, 04/14/2023 - 3:08pm
Memory management
Shuffling
Low cost
Brute force
Force measurement
brute force attacks
integrity
Current measurement
Force
Proposals
collaboration
Information systems
Cryptography
privacy
policy-based governance
Human Factors
Human behavior
pubcrawl
IoT
security
biblio
A Supply Chain Service Cybersecurity Certification Scheme based on the Cybersecurity Act
Submitted by grigby1 on Fri, 04/14/2023 - 3:04pm
Chained Attacks
Vaccines
Supply Chain Service (SCS)
Liquefied natural gas
European Cybersecurity Certification
Conformity Assessment
assurance
ISMS
Resiliency
information security
supply chains
Economics
Europe
Containers
Scalability
resilience
pubcrawl
security
biblio
Research on Image Encryption based on Generalized M-J Set
Submitted by grigby1 on Fri, 04/14/2023 - 3:03pm
chaotic communication
M-J Set
key space
Complex Analytic Mapping
chaotic scrambling
Nonlinear dynamical systems
Resiliency
chaotic cryptography
Sensitivity
encryption
privacy
Scalability
Analytical models
resilience
Metrics
pubcrawl
security
information security
biblio
A State-Of-Art Model of Encrypting Medical Image Using DNA Cryptography and Hybrid Chaos Map - 2d Zaslavaski Map: Review
Submitted by grigby1 on Fri, 04/14/2023 - 3:01pm
Medical Image
telemedicine
Smart healthcare
security
Scalability
Resiliency
resilience
pubcrawl
Metrics
DNA cryptography
Medical diagnosis
encryption
DNA
Cryptography
chaotic map
chaotic cryptography
chaotic communication
biblio
Implementation of Chaotic Encryption Architecture on FPGA for On-Chip Secure Communication
Submitted by grigby1 on Fri, 04/14/2023 - 3:01pm
secure communication
Xilinx System Generator
wearables
SprottD
Lorenz
edge-compute devices
Chua’s Chaotic equations
Chaos implantation
CMOS
Resiliency
wearable computers
chaotic cryptography
Hardware Security
computer architecture
Internet of Things (IoT)
chaotic communication
Scalability
system-on-chip
Hardware
FPGA
resilience
Metrics
pubcrawl
security
encryption
biblio
Modeling and Simulation of IoT Botnet Behaviors Using DEVS
Submitted by grigby1 on Fri, 04/14/2023 - 2:59pm
Markov chains
simulation
security
Resiliency
resilience
pubcrawl
Predictive models
Metrics
Markov processes
Behavioral sciences
malware
IoT Botnets
Discrete Event System Specification
Data models
Compositionality
composability
botnets security
botnet
biblio
A Mechine Learning Approach for Botnet Detection Using LightGBM
Submitted by grigby1 on Fri, 04/14/2023 - 2:59pm
machine learning
Traffic analysis
Systems architecture
security
Resiliency
resilience
Radio frequency
pubcrawl
Metrics
botnet
Forestry
Compositionality
composability
component
Complexity theory
Classification algorithms
botnets security
Botnet detection
« first
‹ previous
…
24
25
26
27
28
29
30
31
32
…
next ›
last »