Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer science
biblio
A Survey of Research on CAPTCHA Designing and Breaking Techniques
Submitted by grigby1 on Fri, 09/11/2020 - 11:43am
CAPTCHA
text-based
Speech recognition
image-based
image segmentation
Completely Automated Public Turing Test to Tell Computers and Humans Apart
CAPTCHA designing techniques
CAPTCHA categories
CAPTCHA breaking techniques
audio/video based
attack methods
security of data
captchas
usability
security mechanism
Google
computer science
composability
Human behavior
pubcrawl
security
biblio
Forensic Analysis of Bitcoin Transactions
Submitted by grigby1 on Fri, 09/04/2020 - 3:58pm
bitcoin security
transaction processing
transaction patterns
suspicious bitcoin addresses
Petri nets
forensic investigation
forensic analysis
Firing
FABT
Bitcoin transactions
bitcoin transaction net
bitcoin transaction data
data privacy
financial data processing
bitcoin
pattern matching
visualization
cryptocurrencies
Data mining
Human behavior
pubcrawl
computer science
Forensics
Scalability
biblio
Minimization of Black hole Attacks in AdHoc Networks using Risk Aware Response Mechanism
Submitted by grigby1 on Fri, 08/28/2020 - 12:02pm
mobile ad hoc network
Vectors
telecommunication network routing
Scalability
routing attacks
Routing
risk aware response technique
risk aware response mechanism
risk aware
Resiliency
resilience
pubcrawl
Mobile handsets
mobile devices
mobile ad hoc networks
Aerospace electronics
minimisation
MANET
Intrusion Response
Human behavior
Heuristic algorithms
DSDV algorithm
Dijkstra shortest path algorithm
destination sequenced distance vector algorithm
Destination sequenced Distance Vector
Conferences
computer science
centralized base point
black hole attack minimization
Attack vectors
biblio
Trajectory Anonymity Based on Quadratic Anonymity
Submitted by grigby1 on Thu, 08/13/2020 - 5:33pm
adjacent anonymous area
trajectory anonymous algorithm
trajectory anonymity publishing
synchronous trajectory data
Synchronous trajectory
Sensitive region
quadratic anonymity
privacy information
original Regional anonymity
original location
Location mappings
location mapping
Location area division
K-anonymous
forged location
current sensitive region
Servers
k-anonymity
Trajectory
anonymity
Euclidean distance
Metrics
Perturbation methods
Data protection
computer science
composability
data privacy
privacy
Resiliency
resilience
Human behavior
pubcrawl
biblio
A Progressive Intrusion Detection System through Event Processing: Challenges and Motivation
Submitted by aekwall on Mon, 07/27/2020 - 12:14pm
computer science
system attacks
progressive intrusion detection system
IDS systems
Host and Network IDS
false negative rates
Events Clustering and Aggregation.
event processing
dynamic attacks
Complex Event Processing (CEP)
complex event processing
CEP
intrusion tolerance
security of data
Firewalls (computing)
security threats
Intrusion Detection System (IDS)
Intrusion Detection
Training
internet
composability
pubcrawl
Resiliency
real-time systems
Organizations
biblio
Hybrid Approach to Detect Network Based Intrusion
Submitted by aekwall on Mon, 07/27/2020 - 12:12pm
inference mechanisms
intrusion tolerance
PSO algorithm
population stochastic technique
network based intrusion
intrusion detection techniques
internet based communication
hybrid particle swarm optimization fuzzy rule based inference engine
host
Fuzzy
artificial intelligence systems
network intrusion detection system
Stochastic processes
genetic algorithms
Artificial Intelligence
security of data
Network
computer science
Fuzzy logic
Intrusion Detection
Anomaly Detection
internet
PSO
particle swarm optimisation
composability
pubcrawl
Resiliency
feature extraction
IDS
biblio
Comparative study on KP-ABE and CP-ABE algorithm for secure data retrieval in military network
Submitted by grigby1 on Fri, 07/24/2020 - 12:31pm
Key Managements
war zone
secure data retrieval
Scalability
remote devices
reliable data transmission
Reliability
pubcrawl
policy-based governance
military network
military computing
military communication
KP-ABE
key revocation
key policy attribute based encryption
attribute based encryption
Key Escrow
encryption
Disruption-Tolerant systems
disruption-tolerant networks
Decentralized Networks
Cryptography
CP-ABE algorithm
computer science
computer network reliability
collaboration
cipher text approach
authorisation
Attribute Revocation and Attribute Based Encryption
biblio
Decentralized Identification and Certification System
Submitted by aekwall on Mon, 07/13/2020 - 11:19am
flexible management
web of trust
web-of-trust concept
user identificators
integrity and authenticity
individual IoT sensor
identification and certification
decentralized system
decentralized public key infrastructure
decentralized identification
decentralized environment
current public key infrastructure
certification system
certification
Servers
public key infrastructure
computer science
authenticity
blockchain technology
public key cryptography
Public key
standards
composability
pubcrawl
Resiliency
History
Cryptographic Protocols
Internet of Things
biblio
Deletion Propagation for Multiple Key Preserving Conjunctive Queries: Approximations and Complexity
Submitted by grigby1 on Fri, 07/10/2020 - 11:41am
query processing
multiple project-free
multiple queries
nontrivial set
polynomials
privacy
problem funda-mental
pubcrawl
quality management
query feedback
multiple key preserving conjunctive queries
realistic case
repairing data
Scalability
single query case
standard deletion propagation problem
tuples
view propagation
view side-effect
data lineage
Approximation algorithms
approximations
Complexity theory
computational complexity
computer science
conjunctive queries
conjunctive query
data cleaning
data deletion
approximation
Databases
debugging
deletion propagation
dichotomy
dynamic programming
Heuristic algorithms
investigated problem
key preserving
biblio
Efficient Technique Image Encryption with Cipher Block Chaining and Gingerbreadman Map
Submitted by grigby1 on Fri, 06/26/2020 - 12:44pm
efficient technique image encryption
unified average change intensity
testing
secure communication
Resiliency
resilience
pubcrawl
pixel change rate
key cipher block chaining
Image Processing
Gingerbreadman map
encryption
button sensitivity
efficient encryption
digital images
digital image security
Digital Image Crypthography
cyber-physical systems
Cryptography
computer science
composability
Ciphers
cipher block chaining
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »