Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Security analysis
biblio
Threat Analysis of an Autonomous Vehicle Architecture
Submitted by aekwall on Mon, 11/08/2021 - 3:16pm
Autonomous Driving
threat mitigation
Security analysis
functional architecture
Electric potential
E/E architecture
cyber security
CVSS
autonomous vehicles
security
STRIDE
faces
Industries
Human behavior
Resiliency
Metrics
pubcrawl
biblio
Attack Graph-Based Quantitative Assessment for Industrial Control System Security
Submitted by grigby1 on Tue, 09/07/2021 - 1:56pm
industrial control
Security analysis
security
Resiliency
resilience
quantitative assessment
pubcrawl
integrated circuits
industrial control system
composability
Indexes
Graph Data Model
Databases
Data models
Critical Attack Path
Control Theory
computer science
biblio
A Scoring System to Efficiently Measure Security in Cyber-Physical Systems
Submitted by grigby1 on Wed, 07/28/2021 - 8:45am
Refining
threat analysis
Security Scoring
Security Metrics
security metric
Security Engineering
Security analysis
security
Scalability
Complexity theory
pubcrawl
privacy
Metrics
Measurement
Internet of Things
cyber-physical systems
Computing Theory
biblio
A Benchmark of Security Metrics in Cyber-Physical Systems
Submitted by grigby1 on Tue, 04/27/2021 - 3:59pm
Measurement
metrics testing
benchmark
Benchmark testing
Conferences
cyber-physical systems
Cyberspace
Metrics
process control
pubcrawl
security
Security analysis
Security Metrics
system security
System-of-Systems
biblio
Data Sharing Attribute-Based Secure with Efficient Revocation in Cloud Computing
Submitted by grigby1 on Tue, 04/27/2021 - 12:30pm
Human behavior
Security analysis
Secure File Sharing
Resiliency
resilience
pubcrawl
process control
Metrics
information technology
authorization
encryption
Efficient revocation
data privacy
Data encryption key
computer science
composability
Cloud Computing
biblio
Proof-of-Balance: Game-Theoretic Consensus for Controller Load Balancing of SDN
Submitted by aekwall on Mon, 03/29/2021 - 11:50am
game theory-based incentive mechanism
data plane
programmable network
Load management
software defined networking (SDN)
communication requirements
controller consortium blockchain
controller load balancing
cryptographic currency balance coin
game theoretic security
game-theoretic consensus
incentive controllers
incentive safe load balancing
load balance
multicontrollers
Pricing
proof-of-balance
secure load
resource allocation
Scalability
Cryptography
game theory
computer architecture
software defined networking
Resiliency
pubcrawl
blockchain
computer network security
Distributed databases
quality of service
Security analysis
Games
Human Factors
Predictive Metrics
SDN architecture
biblio
New Efficient QERPKC based on Partial Discrete Logarithm Problem
Submitted by aekwall on Mon, 03/22/2021 - 1:15pm
Elliptic curve cryptography
quadratic exponentiation randomized public key cryptosystem
QERPKC
QER
PDLP hardness
PDLP
partial discrete logarithm problem
exponentiation
PKC
Transmitters
public key encryption
Safety
Security analysis
computational complexity
public key cryptography
Cryptography
pubcrawl
Resiliency
Protocols
security
encryption
Scalability
biblio
Promising Bio-Authentication Scheme to Protect Documents for E2E S2S in IoT-Cloud
Submitted by grigby1 on Tue, 03/09/2021 - 3:02pm
pubcrawl
IoTs-Cloud
key agreement
local binary pattern
LSB
message authentication
Metrics
one-time bio-key
one-time message-image document code
one-time random pixel sequence
IoT-cloud
Receivers
resilience
Resiliency
robust message anonymity
Scalability
security
Security analysis
smart devices
Watermarking
document image processing
Bio- MAC
bio-authentication scheme
bio-key management
biometrics (access control)
BIOS
Cloud Computing
Cryptography
data integrity
disappearing authentication code
authentication
documents protection
E2E S2S
feature extraction
handwritten character recognition
handwritten feature extraction
Handwritten Signature
HMAC-SHA-256
Human behavior
Internet of Things
biblio
A Noise-Free Homomorphic Encryption based on Chaotic System
Submitted by aekwall on Mon, 02/01/2021 - 11:35am
noise-free homomorphic encryption
EMORE algorithm
encryption-decryption time
enhanced matrix operation
FHE
floating-point number
homomorphism property
modular arithmetic operation
Noise Free
noise-free algorithm
EMORE
outsourced data computing
positive randomness properties
reliable cloud computing environment
reliable encryption
research topics
secure Cloud computing environment
secure encryption
symmetric algorithm
Correlation
Scalability
Cryptography
encrypted data
encryption
data privacy
Resiliency
pubcrawl
Metrics
Reliability
Cloud Computing
fully homomorphic encryption
Security analysis
Human Factors
Homomorphic encryption
outsourcing
chaotic system
Sensitivity
Symmetric matrices
biblio
An Image Encryption Schema Based on Hybrid Optimized Chaotic System
Submitted by grigby1 on Fri, 01/22/2021 - 1:50pm
hybrid optimized chaotic system
Security analysis
probability density
optimized henon mapping
optimized henon
optimisation
new 2d-logistic chaotic System
Lyapunov exponents
Logistics
image encryption schema
image encryption
image cryptosystem
Image coding
chaotic cryptography
Histograms
Henon mapping
henon chaotic system
encryption
Cryptography
Correlation
compounded chaotic system
chaotic image encryption algorithm
chaotic communication
chaos
2D logistic chaotic system
pubcrawl
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »