Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Security analysis
biblio
A Secure Blockchain-Based Group Mobility Management Scheme in VANETs
Submitted by grigby1 on Fri, 03/27/2020 - 11:28am
Security analysis
Protocols
pubcrawl
resilience
Resiliency
Safe Coding
safe transportation
secure blockchain-based group mobility management scheme
secure group mobility management scheme
security
policy-based governance
security functionalities
significant overload
smooth handovers
telecommunication security
VANET
VANETs
vehicular ad hoc networks
Vehicular Ad-hoc Network
high mobility
blockchain
collaboration
Distributed Mobility Management
distributed mobility management protocol
DMM solutions
frequent handovers
group communication scenario
Handover
handover authentication
authentication
Human behavior
Human Factors
message authentication
Metrics
mobility management (mobile radio)
network architecture
network entities
next generation mobile network
biblio
A Systematic Review of the Third Party Auditing in Cloud Security: Security Analysis, Computation Overhead and Performance Evaluation
Submitted by aekwall on Mon, 03/09/2020 - 11:05am
computational overhead
Security Audits
TPA methods
third party auditing method
Third Party Auditing
systematic review
public auditing
Merkel hash tree method
Merkel hash tree
data integrity checking method
considerable efficiency
computation overhead
communication cost
storage management
security of data
Scalability
Cloud Security
performance evaluation
program verification
Security analysis
privacy
pubcrawl
Human behavior
Resiliency
data integrity
cloud storage
Data Security
Cloud Computing
file
Determining-Tolerable-Attack-Surfaces-that-Preserves-Safety-of-Cyber-Physical-Systems.pdf
Submitted by Heather Lucas on Wed, 01/29/2020 - 7:10pm
Safety
tracking
timed automata
software fault tolerance
Servers
Security analysis
security
Safety-Critical Systems
safety-critical software
safety analysis
attacker model
railway signaling system
Rail transportation
parameterizable state automaton templates
formal verification
cyber-physical systems
cyber-physical system safety
cyber-physical system
Communication system signaling
automata
Monitoring, Fusion, and Response for Cyber Resilience
biblio
Determining Tolerable Attack Surfaces that Preserves Safety of Cyber-Physical Systems
Submitted by Heather Lucas on Wed, 01/29/2020 - 7:10pm
Rail transportation
timed automata
attacker model
safety analysis
cyber-physical system
tracking
Communication system signaling
security
automata
Servers
cyber-physical systems
Safety
parameterizable state automaton templates
cyber-physical system safety
railway signaling system
Security analysis
Safety-Critical Systems
software fault tolerance
safety-critical software
formal verification
Human Behavior
Policy-Governed Secure Collaboration
Resilient Architectures
UIUC
Monitoring, Fusion, and Response for Cyber Resilience
biblio
Security Analysis for SmartThings IoT Applications
Submitted by aekwall on Mon, 01/27/2020 - 10:27am
program diagnostics
taint analysis
tainted flows
Taint-Things
Taint Static Analysis
SmartThings IoT applications
security auditors
IoT SmartHome Apps
fully automated static analysis approach
security of data
software security
Security analysis
public domain software
data flow analysis
Metrics
composability
pubcrawl
Internet of Things
biblio
Security Analysis of SAT\_Jo Lightweight Block Cipher for Data Security in Healthcare IoT
Submitted by grigby1 on Tue, 01/21/2020 - 12:04pm
cyber physical systems
Data Security
healthcare IoT
lightweight block cipher
Lightweight Ciphers
pubcrawl
resilience
Resiliency
SAT_Jo
Scalability
Security analysis
biblio
Cryptoanalyzing and Improving for Directed Signature Scheme and the Proxy Signature Scheme
Submitted by aekwall on Mon, 01/06/2020 - 10:37am
Elliptic curve cryptography
public signature verification problem
proxy signature scheme
private key exposure
FoSPS
forward secure proxy signature
directed signature scheme
cryptoanalysis
Computer security and privacy
handwriting recognition
ECC
Scalability
Security analysis
public key cryptography
digital signatures
pubcrawl
Resiliency
private key cryptography
data privacy
Computational efficiency
digital signature
biblio
Security Analysis of Overlay Cognitive Wireless Networks with an Untrusted Secondary User
Submitted by grigby1 on Thu, 12/05/2019 - 10:56am
source information
resilience
Resiliency
secondary cooperative node
secrecy outage probability
security
Security analysis
Signal to noise ratio
SOP
Relays
telecommunication security
tight lower bound expression
transmission secrecy performance
transmit power
untrusted energy-limited secondary cooperative user
untrusted relaying
untrusted secondary user
wireless networks
primary transmission security
Cognitive Radio Security
diversity reception
Maximum ratio combining
maximum ratio combining scheme
MRC scheme
overlay cognitive wireless networks
physical layer security
power system reliability
cognitive radio
primary user information secrecy performance
primary user information security
probability
programmable logic arrays
pubcrawl
radio transmitters
relay links
biblio
CertChain: Public and Efficient Certificate Audit Based on Blockchain for TLS Connections
Submitted by grigby1 on Wed, 10/23/2019 - 12:38pm
revoked certificates checking
log-based schemes
Metrics
Monitoring
Protocols
pubcrawl
public key cryptography
query processing
resilience
Resiliency
log servers
Scalability
Security analysis
Servers
SSL connections
SSL Trust Models
system monitoring
telecommunication security
TLS connections
data consistency
blockchain system
blockchain-based public
Certchain
certificate audit service
certificate forward traceability
certificate revocation checking
certificate revocation mechanisms
certification
Cryptographic Protocols
auditing
data privacy
data structure
data structures
DCBF
dependability-rank based consensus protocol
dual counting bloom filter
Electronic mail
Human behavior
biblio
Security Analysis of Key Acquiring Strategies Used by Cryptographic Ransomware
Submitted by aekwall on Mon, 10/07/2019 - 11:42am
Resiliency
pubcrawl
composability
Ransomware
Metrics
Security analysis
malware
key acquiring
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »