Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
password
biblio
Digital Simulation in the Virtual World: Its Effect in the Knowledge and Attitude of Students Towards Cybersecurity
Submitted by grigby1 on Wed, 11/04/2020 - 12:45pm
text-based environment
password usage
Phishing
privacy
pubcrawl
social engineering
student experience
teaching
text analysis
password
user experience
Virtual Learning Environment
Virtual Learning Environments
virtual reality
virtual world
virtual world lessons
VLE
Digital Simulations
Computer crime
computer science education
cyber physical systems
Cybersecurity
cybersecurity attitude
cybersecurity education
cybersecurity knowledge
digital simulation
computer aided instruction
E-Learning
education
Educational institutions
Instruments
invasive software
malware
online scam
biblio
Linux Security: A Survey
Submitted by aekwall on Mon, 10/26/2020 - 10:46am
password
Linux Operating System Security
Linux security
firewall security
file permissions
File
antivirus
firewall
Predictive Metrics
microsoft windows
authorisation
Business
Metrics
composability
pubcrawl
Resiliency
Linux
invasive software
security
malware
biblio
Assessing E-Security Behavior among Students in Higher Education
Submitted by aekwall on Mon, 10/12/2020 - 10:45am
behavior
Human Behavior and Cybersecurity
United Arab Emirates
Security Behavior Survey Instrument
password usage
online scam
higher educational institutions
higher education students
further education
e-security behavior assessment
E-security awareness
social engineering
Educational institutions
authorisation
data handling
Human Factors
Phishing
password
Cybersecurity
internet
Computer crime
pubcrawl
Human behavior
Electronic mail
invasive software
malware
biblio
An Instrument to Measure Human Behavior Toward Cyber Security Policies
Submitted by aekwall on Mon, 10/12/2020 - 10:42am
Human Factors
security of data
pubcrawl
password
Organizations
Masuerment instrument
Instruments
information technology
Information system policie
information security
behavior pattern
human error
human behavior measurement
Human Behavior and Cybersecurity
Human behavior
Gamification
Electronic mail
cybersecurity policies
Cyber security policies
component
biblio
Matrices From Topological Graphic Coding of Network Security
Submitted by grigby1 on Fri, 09/18/2020 - 12:47pm
Topology
vertex splitting operations
Topsnut-gpws
Topological graphic coding
topological coding matrices
topcode-matrices
splitting labellings
mathematical models
encrypted networks
edge splitting operations
coding theory
Labeling
Cryptography
graph theory
password
Compositionality
Metrics
network security
encoding
matrix algebra
Resiliency
resilience
pubcrawl
security
biblio
Hardware-Independent Authentication Scheme Using Intelligent Captcha Technique
Submitted by grigby1 on Fri, 09/11/2020 - 10:46am
internet
streaming bots attack
Streaming bots
Servers
security attacks
security attack
screenlogger
replay attack
pubcrawl
phishing attack
password-guessing attack
password
one time password
message authentication
keylogger
authentication
Intelligent captcha technique
Intelligent Authentication Scheme
Human behavior
hardware-independent Authentication Scheme
Hardware
denial of service
Cryptography
Cryptographic Protocols
computer network security
Computer crime
composability
Cloud Computing
captchas
CAPTCHA
biblio
An Improved Two Factor User Authentication Framework Based on CAPTCHA and Visual Secret Sharing
Submitted by grigby1 on Fri, 09/11/2020 - 10:46am
information leakage attack
visualization
visual secret sharing
user anonymity
two-factor user authentication framework
strong authentication scheme
session key establishment
Servers
pubcrawl
password
mutual authentication
middle attack
authentication
Human behavior
essential security services
enhanced user participating authenticating scheme
dynamic session key fur subsequent communication
Cryptography
cryptanalysis
composability
client-server internetworking systems
Chen and Huang scheme
captchas
CAPTCHA
biblio
Authentication Model using the Bundled CAPTCHA OTP Instead of Traditional Password
Submitted by grigby1 on Fri, 09/11/2020 - 10:43am
Electronic mail
CAPTCHA
unique random parameter
traditional password
one time password
identity verification
e-mail
captchas
CAPTCHA OTP
Bundled CAPTCHA OTP
authentication model
authorisation
password
composability
Computational modeling
authentication
telecommunication security
message authentication
Human behavior
pubcrawl
Servers
biblio
A Survey of Attack Models for Cyber-Physical Security Assessment in Electricity Grid
Submitted by aekwall on Tue, 09/08/2020 - 9:00am
electricity grid
Chained Attacks
data injection attack scenario
attack models
PLADD
Cyber-physical security assessment
bad data injection
attack propagation
attack graph
markov chain
cyber-physical system
Power Grid
security of data
Markov processes
power system security
power engineering computing
password
power grids
pubcrawl
Resiliency
cyber-physical systems
Data models
Scalability
IP networks
biblio
Secure Authentication Mechanism for Resistance to Password Attacks
Submitted by grigby1 on Fri, 09/04/2020 - 2:38pm
Dictionaries
brute force attacks
shoulder surfing
password based authentication mechanism
password attacks
matrix based secure authentication mechanism
Matrix based authentication
key stroke technique
graphichical password technique
dictionary attacks
click pattern technique
Brute forcing
Cryptography
Resists
matrix algebra
policy-based governance
Human Factors
password
Force
pubcrawl
authentication
Indexes
authorisation
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »