Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
tools
biblio
Exploring the Dark Web for Cyber Threat Intelligence Using Machine Leaning
Submitted by grigby1 on Tue, 01/28/2020 - 2:38pm
Doc2Vec
tools
Resiliency
resilience
pubcrawl
privacy
natural language processing
malware
machine learning
machine leaning
learning (artificial intelligence)
intelligence
information security
artificial intelligence security
Data models
darkweb
dark web
cyberattack
cyber threat intelligence
cyber intelligence
Cyber Attacks
cyber attack techniques
counter measure
Computer crime
composability
biblio
A Learning Kit on IPv6 Deployment and Its Security Challenges for Neophytes
Submitted by grigby1 on Tue, 01/21/2020 - 12:09pm
Personnel
Training
tools
Software
self-learning
security model
security challenges
security
Resiliency
resilience
pubcrawl
Protocols
pre-alpha testing
policy-based governance
collaboration
Organizations
network security
neophytes
neophyte
Metrics
learning kit
IT personnel
ipv6 security
IPv6 environment
IPv6 deployment
IP networks
computer network security
composability
biblio
A Symptomatic Framework to Predict the Risk of Insider Threats
Submitted by grigby1 on Tue, 01/21/2020 - 11:23am
Insider Threat Scoring Engine (ITSE)
collaboration
Critical assets
critical infrastructure
critical infrastructure organisation
critical infrastructures
Engines
Human behavior
information security
information security threats
insider threat
insider threat events
insider threat framework for Namibia critical infrastructure organization
tools
Interviews
ITFNACIO
Metrics
policy-based governance
pubcrawl
resilience
Resiliency
risk management
security of data
symptomatic analysis
Symptomatic Analysis (SA)
symptomatic insider threat risk assessment framework
biblio
Process trees amp; service chains can serve us to mitigate zero day attacks better
Submitted by aekwall on Mon, 01/20/2020 - 12:04pm
sales team
buggy software
complete threat canvas
Computer graphics
data protection systems
Data Visualization techniques
exponential evolution
front-end sophistication domain
human computer interactions
network threats
process trees
attack sophistication
service chains
software professionals
software quality metrics
time 0.0 d
Unique Selling Proposition
user friendly applications
users
USP
zero day threats
Zero Day Attacks and Defense
cyber security
invasive software
operating system
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
composability
standards
tools
computer security
Software
human computer interaction
Data visualization
data visualisation
software quality
operating systems (computers)
Predictive Metrics
cyber domain
Zero day attacks
application frameworks
biblio
Hardware-Oriented Algebraic Fault Attack Framework with Multiple Fault Injection Support
Submitted by aekwall on Mon, 01/20/2020 - 12:00pm
Hardware
tools
security-critical hardware implementations
Scalability
Resiliency
pubcrawl
Post /Pre silicon analysis
multiple fault injection support
Mathematical model
Lightweight Ciphers
lightweight block ciphers
Integrated circuit modeling
idealized fault models
hardware-oriented structural cipher descriptions
hardware-oriented framework
hardware-oriented algebraic fault attack framework
actual implementation
framework
field-programmable gate array platform
field programmable gate arrays
fault injector
Fault injction attack
Cryptography
conjunctive normal form clauses
Circuit faults
Ciphers
cipher implementations
Cipher
Analytical models
algebraic fault attack tool
algebraic equations
algebra
biblio
Comparing the Performance of Adaptive Boosted Classifiers in Anomaly based Intrusion Detection System for Networks
Submitted by aekwall on Mon, 01/20/2020 - 11:55am
intrusion detection Kaggle dataset
Training
tools
Resiliency
Random Tree
pubcrawl
pattern classification
network intrusion detection
network based intrusion detection
naïve Bayes classifier
Metrics
lengthy detection process
learning (artificial intelligence)
Intrusion Detection Systems
intrusion detection system
adaptive boosted classifiers
Intrusion Detection
hybrid anomaly based intrusion detection system
discretization
detection rate
Decision trees
Data mining
Correlation based feature weighted Naïve Bayes
Correlation
computer network security
composability
boosting techniques
boosting process
boosting
biblio
Optimizing Quantum Circuits for Modular Exponentiation
Submitted by aekwall on Mon, 01/20/2020 - 11:48am
pubcrawl
verilog implementation
tools
scalable synthesis methods
Scalability
reversible modular exponentiation function
Resiliency
Qubit
Quantum error correction
Quantum Error Correcting Codes (QECC)
quantum computing
quantum computers
quantum circuits
quantum architectures
Quantum Algorithm(QA)
computer architecture
modular exponentiation functions
modular exponentiation
Logic gates
logic designs
logic design
logic circuits
linear nearest neighbor property
Linear Nearest Neighbor (LNN)
Hardware design languages
hardware description languages
exponentiation functions
exponentiation
error correction
biblio
The Use of Expert Judgement as the Method to Obtain Delay Time Values of Passive Barriers in the Context of the Physical Protection System
Submitted by grigby1 on Thu, 01/02/2020 - 2:46pm
passive barrier elements
tools
testing
socio-economic effects
socio-economic development
security
Scalability
Resiliency
resilience
Reliability
pubcrawl
protection
physical protection system
passive barriers
data analysis
method
Mechanical factors
mechanical barriers
Human behavior
fuzzy set theory
expert systems
expert judgement
expert
delays
delay time values
delay time
Decision Making
Databases
biblio
Timing Analysis for Diffie Hellman Key Exchange In U-BOOT Using Raspberry Pi
Submitted by grigby1 on Mon, 12/30/2019 - 2:18pm
telecommunication security
public key cryptography
Raspberry Pi
Raspberry-pi
Resiliency
Scalability
Secret key
security schemes
side channel attack
system-on-chip
pubcrawl
timing
Timing attack
timing attacks
timing patterns
tools
U-Boot bare metal
unsecure communication channel
word length 2048.0 bit
word length 64.0 bit
embedded systems
cryptographic
cryptographic era
Cryptographic Protocols
Cryptography
DHKE protocol
diffie hellman key exchange
Diffie Hellman Key Exchange protocol
Discrete Log Hard Problem
embedded device
brute force attacks
exponentiation
firmware
Force
GMP bignum library
Metals
modular exponentiation
networked embedded systems security
Protocols
biblio
Integration of CPU and GPU to Accelerate RSA Modular Exponentiation Operation
Submitted by grigby1 on Mon, 12/30/2019 - 2:18pm
Mode power operation
tools
stored information
smart phones
security of data
Scalability
RSA modular exponentiation operation
RSA encryption algorithm
RSA
Resiliency
public key cryptography
pubcrawl
personal information
parallel programming
parallel computing
parallel architectures
accelerating RSA algorithm
graphics processing units
graphics process unit
GPU parallel programming
gpu
exponentiation
encryption efficiency
encryption
Data Security
CUDA
CPU
compute unified device architecture
Complexity theory
central process unit
Acceleration
« first
‹ previous
…
41
42
43
44
45
46
47
48
49
…
next ›
last »