Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Security Evaluation
biblio
Highly Efficient Protection of Biometric Face Samples with Selective JPEG2000 Encryption
Submitted by grigby1 on Tue, 06/14/2022 - 2:13pm
Metrics
Selective Encryption
JPEG 2000
faces in the wild
biometric encryption
Security Evaluation
Transform coding
face recognition
face biometrics
signal processing
encoding
Databases
Scalability
Conferences
Resiliency
resilience
pubcrawl
deep learning
biblio
A Semantic Model-Based Security Engineering Framework for Cyber-Physical Systems
Submitted by grigby1 on Wed, 07/28/2021 - 7:46am
Complexity theory
Computing Theory
Couplings
cyber-physical systems
Cyberspace
embedded systems
Internet of Things
Metrics
Model-based Security Engineering
pubcrawl
security
Security Evaluation
security metric
Security Metrics
Security Scoring
Semantics
biblio
What is the Value of Data Value in Practical Security Applications
Submitted by grigby1 on Tue, 04/27/2021 - 1:38pm
Big Data
data quality
data value
Metrics
privacy protection
pubcrawl
resilience
Resiliency
Scalability
security
Security Evaluation
biblio
A Study of Evaluation Methods of WEB Security Threats Based on Multi-stage Attack
Submitted by grigby1 on Wed, 03/17/2021 - 11:43am
Formal Specification
Chained Attacks
Web security threats
Web application services
security vulnerability model
security specification
Security Evaluation
multistage attack
Measures
Kill Chain
Classified protection
Reconnaissance
Internet services
tools
web services
internet
Data models
Scalability
Analytical models
Resiliency
resilience
pubcrawl
Servers
security
security of data
biblio
Best Strategies of Choosing Crypto-System’s Key for Cryptographer and Attacker Based on Game Theory
Submitted by grigby1 on Fri, 09/04/2020 - 2:24pm
policy-based governance
brute force attacks
plaintext
key space
information theory
cryptosystem key
cryptographer
Crypto-System
Brute Force Attack
game theory
Ciphers
Ciphertext
Human Factors
Games
collaboration
pubcrawl
Security Evaluation
Mathematical model
Cryptography
biblio
TAG: Topological Attack Graph Analysis Tool
Submitted by aekwall on Mon, 08/17/2020 - 10:17am
MulVAL inference engine
topological attack graph analysis tool
tag
situational awareness
security problems
security level estimation
Security Evaluation
Resiliency
pubcrawl
Predictive Metrics
attack graphs
multistage cyberattacks
inference mechanisms
graph theory
cyber security
cyber defense
corrective actions
computer network security
composability
attack paths
biblio
A Security Evaluation Model Based on Fuzzy Hierarchy Analysis for Industrial Cyber-Physical Control Systems
Submitted by grigby1 on Fri, 07/24/2020 - 11:59am
Analytical models
Control Theory
security risk assessment
security evaluation model
information security research
information of Industrial cyber-physical control systems
industrial cyber-physical control systems
industrial control system safety risk evaluation
industrial control system risk management decision
fuzzy hierarchy analysis
fuzzy evaluation
fuzzy analytical hierarchy process
security
risk management
industrial control
Safety
cyber-physical systems
fuzzy set theory
pubcrawl
Security Evaluation
security threats
control systems
risk analysis
computer network security
biblio
Security Evaluation of Counter Synchronization Method for CAN Against DoS Attack
Submitted by aekwall on Mon, 07/20/2020 - 9:44am
light emitting diodes
synchronization message
synchronization deviation
on-board communications
counter value
counter synchronization method
CAN
controller area networks
Security Evaluation
automobile security
replay attack
DoS attack
Automotive engineering
controller area network security
message authentication
Synchronization
synchronisation
pubcrawl
Resiliency
cyber-physical systems
Receivers
Internet of Things
Conferences
computer network security
biblio
Security Evaluation Methodology for Software Defined Network Solutions
Submitted by grigby1 on Wed, 03/18/2020 - 10:59am
SDN architecture
software-defined networking
software defined networking
software defined network solutions
security-related features
security evaluation methodology
Security Evaluation
security controls
security assessment
SDN solutions
SDN security
SDN controllers
SDN choice
authentication
Scalability
Resiliency
resilience
pubcrawl
Organizations
Object recognition
NIST 800-53
Cryptography
control systems
computer networking
computer network security
comprehensive methodology
biblio
Side-Channel Analysis for Searchable Encryption System and Its Security Evaluation
Submitted by grigby1 on Mon, 03/02/2020 - 12:33pm
Indexes
Tamper resistance
side-channel analysis
side channel attack
Security Evaluation
searchable encryption system
Scalability
pubcrawl
Power demand
power analysis
Metrics
Medical services
medical computing
searchable encryption
Immune system
illegal attacks
Human Factors
Human behavior
Hamming distance
encryption
embedded searchable encryption
Cryptography
Ciphers
Big Data
Artificial Intelligence
1
2
3
next ›
last »