Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Security analysis
biblio
A Blockchain-Based Secure Cloud Files Sharing Scheme with Fine-Grained Access Control
Submitted by grigby1 on Thu, 09/26/2019 - 9:43am
decentralized safety administration
Security analysis
Secure File Sharing
Safety
Resiliency
resilience
pubcrawl
Peer-to-peer computing
outsourcing data
outsourcing
Metrics
Human Factors
Human behavior
fine-grained data access control
encryption
Distributed databases
Access Control
Data Security
data integrity
Cryptography
CP-ABE
composability
cloud storage
cloud service provider
cloud server
Cloud Computing
ciphertext-policy attribute based encryption
blockchains
blockchain-based secure cloud file sharing scheme
blockchain technology
blockchain
authorisation
biblio
Securify: Practical Security Analysis of Smart Contracts
Submitted by grigby1 on Fri, 06/28/2019 - 9:36am
Compositionality
Metrics
pubcrawl
resilience
Resiliency
Scalability
scalable verification
Security analysis
smart contracts
stratified datalog
verification
biblio
A secure data aggregation protocol for fog computing based smart grids
Submitted by aekwall on Mon, 06/24/2019 - 2:00pm
Smart Grid
policy-based governance
privacy
Protocols
pubcrawl
Resiliency
secure data aggregation
Secure Data Aggregation scheme
Security analysis
Servers
performance evaluation results
Smart Grid Consumeer Privacy
smart grid consumer privacy
Smart Grids
smart power grids
storage efficiency
storage overhead
telecommunication security
transmission overhead
edge computing
Cloud Computing
cloud server
computational overhead
Cryptography
data aggregation
data aggregation process
data privacy
Data Transmission
additive homomorphic encryption consumer privacy
end-to-end confidentiality
FCSG
Fog computing
fog layer
Human behavior
Internet of Things
Metrics
novel Domingo-Ferrer additive privacy
biblio
Time Independent Security Analysis for Dynamic Networks Using Graphical Security Models
Submitted by aekwall on Wed, 05/01/2019 - 12:05pm
network systems security
Topology
Time-independent Hierarchical Attack Representation Model
Time independent security analysis
Servers
security of data
security models
Security analysis
security
Resiliency
pubcrawl
network topology
Dynamic Networks and Security
Metrics
GSM
graphical security models
graphical security model
graph theory
Dynamical Systems
Dynamic Network
Databases
cyber security
composability
Analytical models
biblio
PMDA: Privacy-Preserving Multi-Functional Data Aggregation Without TTP in Smart Grid
Submitted by grigby1 on Thu, 03/28/2019 - 2:16pm
privacy leakage
TTP
trusted third party
smart power grids
smart meters
Smart Grids
Smart Grid Privacy
Smart Grid
Security analysis
security
pubcrawl
privacy-preserving multifunctional data aggregation
privacy-preserving aggregation
privacy protection
privacy preserving
composability
privacy flaws
privacy
power engineering computing
PMDA
multifunctional aggregation
Multi-functional computation
Metrics
Meters
Human behavior
energy management
electricity readings
data privacy
data aggregation
Cryptography
biblio
Evaluation for Combination of Shuffle and Diversity on Moving Target Defense Strategy for Cloud Computing
Submitted by grigby1 on Fri, 03/22/2019 - 12:00pm
pubcrawl
Shuffle and Diversity MTD techniques
Servers
security of data
security metrics system risk
Security Metrics
security analysis complexity
Security analysis
security
Scalability
Resiliency
resilience
big data security
Moving Target Defense strategy
moving target defense
Moving Target Defence
Metrics
Measurement
Mathematical model
graphical security model
diversity reception
Correlation
cloud security-related problems
Cloud Computing
biblio
Hardware Implementation of Multi-Scroll Chaos Based Architecture for Securing Biometric Templates
Submitted by grigby1 on Fri, 03/22/2019 - 11:35am
hardware resources
Xilinx FPGA
Xilinx
Security analysis
security
Scalability
Resiliency
resilience
real-time systems
pubcrawl
multiscroll chaos based architecture
multi-scroll
Metrics
Mathematical model
low cost image encryption
Image Processing
biometric encryption
Hardware
FPGA
field programmable gate arrays
Euler method
embedded systems
embedded biometric systems
Cryptography
computer architecture
chaotic N × N grid multiscroll system
chaotic communication
chaos-based multiscroll encryption algorithm
chaos
biometrics-based personal authentication systems
biometrics (access control)
biometric templates
biblio
Capture the RAT: Proximity-Based Attacks in 5G Using the Routine Activity Theory
Submitted by grigby1 on Wed, 03/06/2019 - 3:24pm
Resiliency
OMNET++
proactive security
proximity-based attack analysis
proximity-based cybercrime
pubcrawl
RAT
reactive solutions
resilience
high-level approach
routine activity theory
security
Security analysis
security problems
security software developers
Software
telecommunication security
5G cellular networks
Hardware
Device-to-device communication
critical IoT devices
CRAT
composability
cellular radio
Cellular networks
capillary network
autonomous vehicles
Autonomic Security
Analytical models
5G security
5G mobile communication
5G environments
5G devices
biblio
A Lightweight Anonymous Mobile User Authentication Scheme for Smart Grid
Submitted by grigby1 on Fri, 02/08/2019 - 3:35pm
smart meter
nonlight-weight protocol
portable access
pubcrawl
public key cryptography
Security analysis
smart cards
Smart Grid
smart grid technology
mobile computing
smart power grids
subsequent communication
telecommunication security
two factor authentication
two-factor lightweight user authentication scheme
two-factor user authentication
user anonymity
anonymous and untraceability
message authentication
Lightweight Encryption
lightweight anonymous mobile user authentication scheme
Human Factors
Human behavior
electric vehicle
data privacy
Cryptographic Protocols
critical security
communication process
cloud server
charging process
biometric encryption
authorisation
authentication process
biblio
Cyber Security of Smart Homes: Development of a Reference Architecture for Attack Surface Analysis
Submitted by grigby1 on Fri, 02/08/2019 - 3:32pm
proprietary standards
Smart homes
smart home reference architecture
Smart Home
smart devices
security of data
Security analysis
Scalability
Resiliency
resilience
reference architecture
pubcrawl
attack surface
pervasive computing
open systems
Metrics
Internet of Things
home automation system
home automation
high-level description
cyber-physical systems
cyber security
cyber risk
attack surface analysis
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »