Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security
biblio
HackAttack: Game-Theoretic Analysis of Realistic Cyber Conflicts
Submitted by grigby1 on Fri, 03/17/2017 - 12:31pm
botnet
coding theory
composability
Cyber-security
game theory
Metrics
probabilistic inference
pubcrawl
Resiliency
security
biblio
Establishing a Baseline for Measuring Advancement in the Science of Security: An Analysis of the 2015 IEEE Security & Privacy Proceedings
Submitted by grigby1 on Fri, 03/17/2017 - 12:31pm
coding theory
composability
Literature Review
Metrics
pubcrawl
Resiliency
Science of Security
security
biblio
Causes of Human Errors in Early Risk Assesment in Software Project Management
Submitted by grigby1 on Fri, 03/17/2017 - 12:31pm
coding theory
composability
Early Risks
grounded theory
Human Errors
Metrics
online Security
pubcrawl
Resiliency
risk analysis
security
biblio
Sample-optimal Tomography of Quantum States
Submitted by grigby1 on Fri, 03/17/2017 - 12:30pm
quantum computing security
coding theory
composability
Metrics
Pretty Good Measurement
pubcrawl
quantum state tomography
Resiliency
Sample complexity
Schur-Weyl duality
security
biblio
FlexiWi-Fi Security Manager Using Freescale Embedded System
Submitted by grigby1 on Mon, 03/13/2017 - 11:23am
network security
wireless LAN
Wireless communication
user traffic
unauthorized user
Trusted Computing
trusted client
telecommunication traffic
telecommunication security
telecommunication network routing
telecommunication network management
system administrator
security
router
pre-shared key
personal model implementation
802.11 standard
infrared module
IEEE 802.11 Standard
freescale embedded system
FlexiWi-Fi security manager
enterprise model
encryption key
embedded systems
Cryptography
Communication system security
client radio
bluetooth module
Bluetooth
authorisation
802.1X
biblio
SCAP benchmark for Cisco router security configuration compliance
Submitted by grigby1 on Mon, 03/13/2017 - 11:23am
OVAL
XCCDF
vulnerability measurement
security of data
security content automation protocol
security compliance
security automation
security
SCAP benchmark
policy compliance evaluation
Science of Security
operating systems
NIST
information security management
Formal Specification
Cisco router security configuration compliance
business data processing
Benchmark testing
automation
pubcrawl
biblio
Impact of security enhancement over Autonomous Mobile Mesh Network (AMMNET)
Submitted by grigby1 on Mon, 03/13/2017 - 11:23am
mobile ad-hoc network
wumpus world concept
wireless mesh networks
telecommunication security
telecommunication network topology
telecommunication network routing
telecommunication network reliability
security enhancement
security
Routing attack
Routing
network topology
network survivability
network partitioning
mobile computing
Mobile communication
AMMNET
mobile ad hoc networks
Mesh networks
MANET
intragroup bridge router
intergroup bridge router
denial of service (dos)
computer architecture
communication reliability
Blackhole attack
Blackhole
bait detection scheme
Bait approach
Autonomous Mobile Mesh Network (AMMNET)
autonomous mobile mesh network
Artificial Intelligence
biblio
Password authentication using Keystroke Biometrics
Submitted by grigby1 on Wed, 03/08/2017 - 1:47pm
password
user verification mechanism
user natural typing pattern
User behavior
typing pattern matching
Text recognition
Support vector machines
security
robust security technique
pubcrawl170115
pattern matching
password security
Password authentication
artificial neural network
neural nets
Monitoring
keystroke biometrics
Hardware
Europe
error rates
Error analysis
Classification algorithms
biometrics (access control)
authorisation
authentication
Artificial Neural Networks
biblio
On Accuracy of Classification-Based Keystroke Dynamics for Continuous User Authentication
Submitted by grigby1 on Wed, 03/08/2017 - 1:45pm
learning (artificial intelligence)
word total time duration
user active authentication
Training data
Training
timing
SVM
Support vector machines
support vector machine
security
pubcrawl170115
Performance
pattern classification
natural language processing
message authentication
machine learning techniques
authentication
keystroke features
keystroke dynamics authentication systems
keystroke dynamics
key duration
Kernel
K-NN
k-nearest neighbor classifier
flight time latency
feature extraction
English words
directed graphs
diagraph time latency
continuous user authentication
classification-based keystroke dynamics
biblio
Finite Context Modeling of Keystroke Dynamics in Free Text
Submitted by grigby1 on Wed, 03/08/2017 - 1:45pm
Context
Context modeling
Cryptography
finite context modeling
fixed short texts verification
free text analysis
keystroke dynamics analysis
password
pubcrawl170115
security
standards
text analysis
timing
Training
user verification
« first
‹ previous
…
400
401
402
403
404
405
406
407
408
…
next ›
last »