Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
password
biblio
Implementation and Analysis of USB based Password Stealer using PowerShell in Google Chrome and Mozilla Firefox
Submitted by grigby1 on Tue, 03/09/2021 - 1:39pm
Software
password management feature
passwordfox
PasswordFox program
policy-based governance
powershell
powershell script
pubcrawl
rubber ducky
password
stored data
time 14.0 s
tools
Universal Serial Bus
USB password stealer
user interfaces
usernames
Windows operating system
Google Chrome
Arduino Pro Micro Leonardo device
authorisation
badusb
browser applications
Browsers
brute force attacks
chromepass
Computer crime
arduino pro micro leonardo
Hardware
Human behavior
Human Factors
internet
Mozilla Firefox login data
operating systems
operating systems (computers)
biblio
Towards Data-Driven Characterization of Brute-Force Attackers
Submitted by grigby1 on Tue, 03/09/2021 - 1:37pm
IP networks
unrelated IP addresses
timing information
timing
threat hunters
targeted attack campaigns
public Internet
pubcrawl
Protocols
policy-based governance
password
Organizations
meta data
malicious login attempts
low-threat attacks
attacker dictionary
invasive software
internet
Human Factors
Human behavior
dictionary-based brute-force attack
defensive measures
data-driven characterization
coordinated attacks
connection metadata
computer network security
clustering
brute-force login attempts
brute-force attackers
brute force attacks
biblio
SSH and FTP brute-force Attacks Detection in Computer Networks: LSTM and Machine Learning Approaches
Submitted by grigby1 on Tue, 03/09/2021 - 1:36pm
learning (artificial intelligence)
telecommunication traffic
SSH
pubcrawl
policy-based governance
pattern classification
password
network traffic anomaly detection
network security
MLP
machine learning classifiers
machine learning approaches
machine learning algorithms
machine learning
LSTM
long short-term memory deep learning approach
Anomaly Detection
Intrusion Detection
internet
Human Factors
Human behavior
high-level attacks
FTP
dictionary-based brute-force attacks
Dictionaries
deep learning.
deep learning
computer network security
Computer Network Attacks
brute-force
brute force attacks
biblio
Analyzing Variation Among IoT Botnets Using Medium Interaction Honeypots
Submitted by grigby1 on Tue, 03/09/2021 - 1:23pm
IoT Botnets
time 40.0 d
Strain
Servers
Resiliency
resilience
pubcrawl
password
near-identical malicious login sessions
multiple botnet deployments
mirai
Metrics
medium interaction honeypots
malware
malicious sessions
analyzing variation
invasive software
Internet of Things
honeypot configuration
honeypot
dominant botnet software
Cowrie
computer network security
Computer crime
composability
common attack patterns
Cats
botnets
botnet malware strains
botnet
biblio
Secure and Privacy Preserving Method for Biometric Template Protection using Fully Homomorphic Encryption
Submitted by aekwall on Tue, 03/09/2021 - 10:57am
biometric encryption
biometrics (access control)
encryption
faces
Memory management
Metrics
password
privacy
pubcrawl
Quantization (signal)
Resiliency
Scalability
biblio
Three-Factor Authentication Scheme Based on Searchable Encryption and Biometric Fingerprint
Submitted by aekwall on Tue, 03/09/2021 - 10:56am
mistrust server
token ID
three-factor authentication scheme
three factor authentication
Source code analysis
Software
Servers
searchable encryption scheme
searchable encryption
Scalability
RSA
Resiliency
pubcrawl
password
pass-code
multi-factor
biometric encryption
Metrics
fingerprint identification
fingerprint
encryption
encrypted content
decryption
Cryptography
cloud server
Cloud Computing
biometrics
biometric fingerprint
authorisation
authentication
3FA
biblio
A secure three-factor authentication and biometrics-based key agreement scheme for TMIS with user anonymity
Submitted by grigby1 on Thu, 01/28/2021 - 1:03pm
Servers
medical servers
Medical services
message authentication
Metrics
password
pubcrawl
remote monitoring
resilience
Resiliency
medical information systems
Smart card
smart cards
telecare medical information systems
telemedicine
three factor user authentication
Three-factor authentication
TMIS
user anonymity
user/server communication security
e-health systems
authentication
authorisation
AVISPA
biometrics
biometrics (access control)
biometrics based key agreement
composability
diseases
e-health
anonymity
ECG
file servers
formal security verification tool AVISPA
formal verification
health care
health systems
healthcare services
Human behavior
biblio
Implementing Asymmetric Cryptography in High-Speed Data Transmission over Power Line
Submitted by aekwall on Mon, 01/25/2021 - 11:59am
password
High-speed
corporate network
Asymmetric Encryption
elliptic curve
Ciphers
PLC
Elliptic curves
Public key
Servers
Metrics
Cryptography
composability
pubcrawl
Human behavior
Resiliency
Protocols
encryption
biblio
A Privacy and Authentication Scheme for IoT Environments Using ECC and Fuzzy Extractor
Submitted by aekwall on Mon, 01/18/2021 - 10:26am
IoT environments
Fuzzy Cryptography
user authentication
user anonymity
use cases
Privacy.
popular attacks
negative horizon
LightPriAuth
key establishment
insider attack
complementary elements
fuzzy extractor
authentication scheme
Smart card
IoT
ECC
Logic gates
smart cards
password
message authentication
authentication
Metrics
privacy
pubcrawl
Resiliency
Internet of Things
data privacy
Cryptography
Scalability
biblio
Novel approach for cybersecurity workforce development: A course in secure design
Submitted by grigby1 on Wed, 11/04/2020 - 1:00pm
IoT products
visualization
visual design
User-Centered Design
user interaction design
User centered design
Training
traditional interdisciplinary approach
teaching
Smart homes
security of data
secure design
pubcrawl
privacy
password
computer aided instruction
Internet-of-Things
Internet of Things
interdisciplinary course
experiential learning
educational interventions
educational courses
cybersecurity workforce development
cybersecurity training
cybersecurity students
cybersecurity education
cybersecurity curriculum
cyber physical systems
computer science education
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »