Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
human life
biblio
Cognitive Cybersecurity for CPS-IoT Enabled Healthcare Ecosystems
Submitted by aekwall on Mon, 09/28/2020 - 12:16pm
innovative cognitive cybersecurity
health care
Healthcare
healthcare ecosystem
Human behavior
Human Behavior and Cybersecurity
human cognitive behaviour
Human Factors
human life
infrastructures
emerging cybersecurity
Internet of Things
machine learning
Medical services
privacy
Privacy Threats
pubcrawl
security of data
sophisticated attack methods
computer security
Adaptation models
Artificial Intelligence
artificial intelligent
cognition
Cognitive cybersecurity
cognitive cybersecurity framework
cognitive methods
cognitive techniques
CPS Privacy
CPS-IoT
CPS-IoT enabled healthcare services
critical infrastructure systems
critical infrastructures
cyber physical systems
cyber-attacks
cybersecurity specialists
data privacy
biblio
Abstract Model of Eavesdropper and Overview on Attacks in Quantum Cryptography Systems
Submitted by aekwall on Mon, 03/30/2020 - 11:41am
promptly developed areas
document circulation
extended classification
human life
important directions
information confidentiality
information transactions
loophole of the device
mini-computer
non-coherent attack
open communication networks
cryptographic methods
quantum cryptography methods
quantum cryptography systems
quantum cryptosystems
quantum hacking
quantum key distribution equipment
reliable information security technology
reliable security
specific quantum systems
traditional cryptography methods
quantum computing security
Reliability
Computer crime
Scalability
data privacy
telecommunication security
Protocols
Resiliency
pubcrawl
composability
classification
Handheld computers
security of data
quantum cryptography
quantum computing
Predictive Metrics
information technologies
Quantum Key Distribution
quantum protocols
abstract eavesdropper model
coherent attack
commercially available quantum key distribution system