Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security
biblio
On MILS I/O Sharing Targeting Avionic Systems
Submitted by BrandonB on Thu, 04/30/2015 - 1:01pm
hardware platform
aerospace computing
Aerospace electronics
Autosar
aviation industry
avionic systems
avionics
communication hardware controller
computer architecture
DPAA
embedded systems
free scale proprietary data path acceleration architecture
Hardware
system architectures
high-criticality embedded systems
IMA
integrated modular avionics
MILS I/O sharing
MILS system designs
multiple independent levels of security system
Portals
Runtime
security
security of data
Software
biblio
Social Engineering in Social Networking Sites: The Art of Impersonation
Submitted by BrandonB on Thu, 04/30/2015 - 12:50pm
social engineering victimization
physical crime
Receivers
security
sexual abuse
SNS
social aspects of automation
social engineering
social engineering traps
Phishing
social engineeringtactics
social networking (online)
Social networking sites
source credibility
threats
Trust management
user susceptibility
attacker
Organizations
large information base
Interviews
information security management
impersonation
identity theft
human behaviors complexity
grounded theory method
fraudulent people
fraud
financial abuse
Facebook
encoding
deceptive people
Computer crime
biblio
Cloud Password Manager Using Privacy-Preserved Biometrics
Submitted by BrandonB on Thu, 04/30/2015 - 12:48pm
password leakage risk
web services
Web service account
untrusted cloud service providers
Trusted Computing
token authentication
Synchronization
security
privacy-preserved biometrics
privacy preservation
privacy enhanced biometrics
privacy
password storage
password manager
authorisation
nonbiometric password manager
master password based security
local password manager client synchronization
distributed service providers
data privacy
Cryptography
cloud password manager
Cloud Computing
cloud
biometrics based authentication
biometrics (access control)
biometrics
authentication
biblio
A confident email system based on a new correspondence model
Submitted by BrandonB on Thu, 04/30/2015 - 12:47pm
internet
Context
Context modeling
correspondence
correspondence model
Electronic mail
Email
email security
email sender context
email service
email system policy
Human Factors
confident email system
mobile devices
Policy
Postal services
Protocols
security
security of data
trust
Trusted Computing
trusted email system
Confidence
biblio
Design, implementation and security analysis of Hardware Trojan Threats in FPGA
Submitted by BrandonB on Thu, 04/30/2015 - 12:41pm
integrated circuits
RoT
security
denial of service
design
encryption
field programmable gate arrays
FPGA testbed
Hardware
hardware Trojan detection technique
hardware Trojan threats
Hardware Trojans
HDM
HTT detectability metric
HTT detection
ICs
timing variation
integrated logic circuits
invasive software
missed detection probability
normalized physical parameters
optimal detection threshold
power consumption
Power demand
Resiliency
root of trust
Security analysis
sensitive information leak
summation of false alarm
timing
Trojan taxonomy
Trojan horses
biblio
In Sensors We Trust – A Realistic Possibility?
Submitted by BrandonB on Thu, 04/30/2015 - 12:39pm
sensors
sensor information flow
sensing infrastructure
security
secure systems
processing architecture
information sharing
information management
information dissemination
Data mining
computer architecture
Buildings
architecture
biblio
A Modal Model of Stuxnet Attacks on Cyber-physical Systems: A Matter of Trust
Submitted by BrandonB on Thu, 04/30/2015 - 12:35pm
information flow security
Trusted Computing
trust state manipulation
Stuxnet attacks
Stuxnet
Software
security of data
security models
security
nondeducibility
multiple security domains nondeducibility
MSDND
Monitoring
modal model
modal frames
Analytical models
information flow disruption attacks
implicit trust
human operators
event system analysis
electronic monitors
doxastic logic
cyber-physical systems
cyber security
Cyber Physical System
CPS
Cost accounting
cognition
Bismuth
belief manipulation
biblio
Combatting phishing: A holistic human approach
Submitted by BrandonB on Thu, 04/30/2015 - 12:31pm
security vulnerability
organizational aspects
Phishing
phishing security controls
security
security education
security education training and awareness
security gaps
security training
organisational aspects
social engineering
spoofed-Web sites
technological controls
technology acceptance model
Training
trusted reputation
unsolicited e-mail
fake warnings
ails
awareness programme
COBIT
Computer crime
computer science education
cyber criminals
design science principles
educational factors
agency theory
financial awards
holistic human approach
HOT elements
Human Factors
ISO
lax security behavior
Lead
biblio
Building Trust in the Human?Internet of Things Relationship
Submitted by BrandonB on Thu, 04/30/2015 - 12:30pm
digital systems
Internet of Things
Internet of Things relationship
IoT technologies
model-based approach
privacy
prototype implementation
security
Senior citizens
Smart homes
Trust management
Trusted Computing
trusted human-IoT relations
biblio
Cloud Computing Vulnerability: DDoS As Its Main Security Threat, and Analysis of IDS As a Solution Model
Submitted by BrandonB on Thu, 04/30/2015 - 12:14pm
cloud
DDoS
IDS
security
Vulnerability
« first
‹ previous
…
432
433
434
435
436
437
438
439
440
…
next ›
last »