Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
integrity
biblio
A Hardware-Assisted Security Monitoring Method for Jump Instruction and Jump Address in Embedded Systems
Submitted by grigby1 on Thu, 07/13/2023 - 3:30pm
composability
jump instruction
jump address
Resiliency
security monitoring
Embedded System
Loading
integrity
Data mining
security
Computers
embedded systems
Hardware
resilience
Metrics
pubcrawl
Monitoring
biblio
Observations on the Theory of Digital Signatures and Cryptographic Hash Functions
Submitted by grigby1 on Thu, 06/29/2023 - 12:02pm
non-repudiation
pubcrawl
resilience
Resiliency
Scalability
authentication
Computers
Elliptic curve cryptography
Cryptographic Hash Function
digital signatures
digital signature
malicious
Forgery
integrity
Hash-based
Reliable
biblio
Analysis of the random shuffling of message blocks as a low-cost integrity and security measure
Submitted by grigby1 on Fri, 04/14/2023 - 4:08pm
Memory management
Shuffling
Low cost
Brute force
Force measurement
brute force attacks
integrity
Current measurement
Force
Proposals
collaboration
Information systems
Cryptography
privacy
policy-based governance
Human Factors
Human behavior
pubcrawl
IoT
security
biblio
Data Integrity Auditing Scheme for Preserving Security in Cloud based Big Data
Submitted by grigby1 on Fri, 03/31/2023 - 11:17am
cloud
medical data
auditing
Costs
Resiliency
integrity
big data security in the cloud
data integrity
simulation
Cloud Computing
Big Data
Medical services
data privacy
Scalability
resilience
Metrics
pubcrawl
biblio
Discovering the Need for Information Assurance to Assure the End Users: Methodologies and Best Practices
Submitted by grigby1 on Fri, 02/17/2023 - 5:40pm
Safety
vulnerabilities
Virtual private networks
threats
supply chains
Standards organizations
software reliability
software assurance
Software
security
Scalability
Information Assurance
Resiliency
resilience
pubcrawl
privacy
Operating-Systems
legislation
integrity
Information-Assurance
Hack
attack
biblio
Predicting Confidentiality, Integrity, and Availability from SQL Injection Payload
Submitted by grigby1 on Fri, 02/03/2023 - 3:49pm
confidentiality
SQL injection detection
security information and event management
SIEM
Availability
support vector machine
SQL injection
Firewalls (computing)
integrity
Detectors
Training data
Adaptation models
privacy
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
Support vector machines
deep learning
biblio
ID-based Data Integrity Auditing Scheme from RSA with Forward Security
Submitted by grigby1 on Fri, 01/13/2023 - 1:46pm
Protocols
Security Audits
Scalability
RSA signature
Resists
Resiliency
resilience
Public key
pubcrawl
IDS
integrity
ID-based auditing protocol
Human behavior
forward security
Data Security
data integrity
Costs
Cloud Computing
biblio
Trustworthiness Evaluation of Smart Grids Using GSPN
Submitted by grigby1 on Wed, 08/03/2022 - 4:12pm
pubcrawl
security
Stochastic processes
composability
sensors
Smart Grids
integrity
simulation
Petri nets
Reliability
Substations
trustworthiness
Steady-state
Availability
GSPN
biblio
Securing Remote Access Networks Using Malware Detection Tools for Industrial Control Systems
Submitted by aekwall on Thu, 06/09/2022 - 11:39am
industrial control
scalable systems
remote access trojans
Rats
Purdue control hierarchy
operational technology
hash calculation
Availability
integrity
Object recognition
integrated circuits
malware detection
telecommunication traffic
Smart homes
Industrial Control Systems
confidentiality
Resiliency
Scalability
pubcrawl
tools
biblio
EPF-CLPA: An Efficient Pairing-Free Certificateless Public Auditing for Cloud-based CPS
Submitted by aekwall on Fri, 05/06/2022 - 12:51pm
Cloud Computing
Servers
Public key
cloud storage
pubcrawl
Resiliency
Computational efficiency
Elliptic curve cryptography
Compositionality
Performance analysis
Predictive Metrics
Certificateless Auditing
Cyber Physical Systems (CPS)
Identity-based encryption
integrity
encryption audits
1
2
3
4
5
6
next ›
last »