Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security
biblio
The Threat of Deep Fake Technology to Trusted Identity Management
Submitted by grigby1 on Thu, 08/17/2023 - 3:41pm
deep learning
security
pubcrawl
Human behavior
resilience
Resiliency
Scalability
Identity management
Artificial Intelligence
education
cultural differences
Forgery
Deepfakes
Deep Fakes
Entertainment industry
network trusted identity management
biblio
A Review on Blockchain Based Identity Management System
Submitted by grigby1 on Thu, 08/17/2023 - 3:41pm
Scalability
SAML
personally identifiable information (PII)
Identity Access Management
Cryptography and Identity management system
blockchains
real-time systems
Industries
Identity management
Ciphers
Resiliency
resilience
Human behavior
pubcrawl
blockchain
Servers
security
Cloud Computing
biblio
Decentralized Identity and Access Management of Cloud for Security as a Service
Submitted by grigby1 on Thu, 08/17/2023 - 3:40pm
security
pubcrawl
Human behavior
resilience
Resiliency
Scalability
authentication
Identity management
control systems
Forensics
Data Breach
DID
blockchains
decentralized Identity
distributed ledger
Identity-Access Management
biblio
Identity of Things (IDoT): A Preliminary Report on Identity Management Solutions for IoT Devices
Submitted by grigby1 on Thu, 08/17/2023 - 3:40pm
resource management
Identity of Things (IDoT)
Identity Management (IdM)
IAM
digital certificates
device identity
Device Certificates
Block Chain
Fog computing
Internet of Things (IoT)
IoT security
Public key
Internet of Things
edge computing
Companies
Computer crime
PKI
Identity management
Scalability
Resiliency
resilience
Human behavior
pubcrawl
security
biblio
SECOM: Towards a convention for security commit messages
Submitted by grigby1 on Wed, 08/16/2023 - 2:42pm
security
pubcrawl
resilience
Resiliency
Software
composability
Data mining
IDS
best practices
convention
security commit messages
Standard
biblio
Sequential event-based detection of network attacks on CSE CIC IDS 2018 data set – Application of GSP and IPAM Algorithm
Submitted by grigby1 on Wed, 08/16/2023 - 2:39pm
IDS
Sequential event patterns
security events
probabilistic attack prediction
knowledge based anomaly detection
IPAM
Intrusion detection by Event Analysis
Generalized Sequential Patterns (GSP)
CSE-CIC-IDS 2018 data set
Behavioral sciences
Intelligent systems
feature extraction
Prediction algorithms
network security
DDoS Attacks
Benchmark testing
composability
Data models
Resiliency
resilience
pubcrawl
security
biblio
Odd-Even Hash Algorithm: A Improvement of Cuckoo Hash Algorithm
Submitted by grigby1 on Fri, 08/11/2023 - 12:54pm
security
Monitoring
pubcrawl
resilience
Resiliency
internet
Big Data
Memory management
data structures
Compositionality
hash algorithms
filtering algorithms
cuckoo hashing
hash collision
Odd-Even Hash
Rehashing
biblio
A Lightweight Hash-Chain-Based Multi-Node Mutual Authentication Algorithm for IoT Networks
Submitted by grigby1 on Fri, 08/11/2023 - 12:54pm
Internet of Things
security
pubcrawl
resilience
Resiliency
authentication
Complexity theory
Compositionality
Internet of Things (IoT)
Hash functions
hash algorithms
Mission critical systems
Power supplies
hash chain
biblio
Enhancing the Performance of Hash Function Using Autonomous Initial Value Proposed Secure Hash Algorithm 256
Submitted by grigby1 on Fri, 08/11/2023 - 12:53pm
Hash functions
secure hash function
padding
Key Constant
Initial Value (IV)
hash code
codes
data communication
hash algorithms
security
Python
Compositionality
authentication
Conferences
Resiliency
resilience
pubcrawl
biblio
Design of Portable Sensor Data Storage System Based on Homomorphic Encryption Algorithm
Submitted by grigby1 on Fri, 08/11/2023 - 10:31am
data storage
portable sensor
homomorphic encryption algorithm
Buffer storage
Homomorphic encryption
Communication Systems
Memory
system design
Knowledge engineering
security
Scalability
Resiliency
resilience
Metrics
Human Factors
Human behavior
pubcrawl
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »