Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
integrity
biblio
Dangers and Prevalence of Unprotected Web Fonts
Submitted by grigby1 on Fri, 04/17/2020 - 9:46am
Metrics
Web sites
Web Browser Security
Web
unprotected Web fonts
subresource integrity mechanism
stylesheets
SRI support
software vendors
software packages
software package
security-conscious users
Resiliency
resilience
pubcrawl
online front-ends
attack surface
maliciously modified version
malicious script
malicious font
internet
integrity
Human Factors
Human behavior
Google
fonts
fingerprint identification
Cryptography
cryptographic fingerprints verification
Compositionality
composability
CDNs
file
Towards Optimal Information Gathering in Unknown Stochastic Environments
Submitted by zkassas on Wed, 04/15/2020 - 10:03am. Contributor:
Zak Kassas
Autonomous ground vehicle
integrity
navigation
outlier detection
Posters
1929571
CPS PI Meeting 2019
Poster
biblio
Efficient Privacy Preserving and Dynamic Public Auditing for Storage Cloud
Submitted by aekwall on Mon, 03/09/2020 - 10:06am
Auditor
Security Audits
TPA
third party auditor
stored data
storage correctness
storage cloud
public auditing scheme
public auditing
privacy preserving auditing
dynamic public auditing
data dynamics operations
data dynamics
cloud storage service
Batch Auditing
Cloud Computing
auditing
storage management
Scalability
Merkle hash tree
cloud server
integrity
privacy
pubcrawl
Human behavior
Resiliency
data integrity
data privacy
storage server
Cryptography
biblio
Mirage: A Protocol for Decentralized and Secured Communication of IoT Devices
Submitted by aekwall on Mon, 02/24/2020 - 9:56am
IoT
Resiliency
Human behavior
pubcrawl
composability
Metrics
blockchain
authentication
integrity
decentralization
non-repudiation
Repudiation
biblio
Lightweight Authenticated Encryption for Network-on-Chip Communications
Submitted by grigby1 on Tue, 01/21/2020 - 11:04am
Availability
cyber physical systems
Hardware Trojans
integrity
Lightweight Ciphers
network-on-chip
pubcrawl
resilience
Resiliency
Scalability
biblio
Secured Outsourcing towards a Cloud Computing Environment Based on DNA Cryptography
Submitted by grigby1 on Tue, 01/07/2020 - 9:51am
intensive data computing
trust
storage
security solution
security schema
security
secured outsourcing
Resiliency
resilience
pubcrawl
protection
private data
privacy
outsourcing
Metrics
Internet service
Cloud Computing
integrity
Human behavior
encryption
encoding
DNA cryptography
DNA
data center
Cryptography
confidentiality
completely secure migration
cloud service providers
cloud provider
cloud computing technology
cloud computing paradigm
biblio
Towards establishment of cyberspace deterrence strategy
Submitted by aekwall on Wed, 12/18/2019 - 1:37pm
civilian defense strategists
Weapons
strategy
social aspects of automation
National security
military security
first-strike
cyberspace deterrence strategy
cyberdeterrence
cyberattacks
credible declaratory retaliation capability
counter-strike
confidentiality
security of data
Deterrence
military computing
Cyberspace
resilience
Information systems
Availability
integrity
Economics
pubcrawl
Human behavior
Scalability
Computer crime
biblio
Securing Named Data Networks: Challenges and the Way Forward
Submitted by grigby1 on Thu, 12/05/2019 - 9:53am
named data networks
security
Resiliency
resilience
pubcrawl
privacy
policy governance
Policy Based Governance
Policy
Access Control
Metrics
integrity
Human Factors
Human behavior
edge computing
confidentiality
collaboration
clean slate
biblio
Integrity and Non-Repudiation of VoIP Streams with TPM2.0 over Wi-Fi Networks
Submitted by grigby1 on Tue, 10/15/2019 - 1:44pm
VoIP
random nodes
Repudiation
research project INTEGER
resilience
Resiliency
secure authentication
softphones
TPM2
Trusted Computing
trusted computing group
Trusted Platform Module
quality of service
VoIP communication
VoIP softphones
VoIP streams
Wi-Fi
Wi-Fi Networks
Wireless communication
Wireless fidelity
wireless LAN
wireless scenarios
wireless streaming
internet
authentication
composability
computer network security
Cryptographic Protocols
Cryptography
digital networks
digital signature
digital signatures
hardware-based trusted anchor
Human behavior
integrity
attack scenarios
internet-based communication
Internet Protocol
Internet telephony
IP networks
legacy phone technologies
Metrics
nonrepudiation
physical access
Protocols
pubcrawl
biblio
A Method of Docker Container Forensics Based on API
Submitted by aekwall on Wed, 05/08/2019 - 8:45am
information forensics
integrity
Docker Forensics
Docker API
resilience
Metrics
pubcrawl
Human behavior
Cloud Computing
Scalability
« first
‹ previous
1
2
3
4
5
6
next ›
last »