Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
password
biblio
A Multi-factor Biometric Authentication Scheme Using Attack Recognition and Key Generator Technique for Security Vulnerabilities to Withstand Attacks
Submitted by aekwall on Mon, 06/01/2020 - 10:04am
key generator technique
World Wide Web
withstand external attacks
security vulnerabilities
security
Resiliency
resilience
pubcrawl
password
multifactor biometric authentication scheme
multifactor authentication
Multi-factor authentication
Metrics
attack recognition
internet
information sharing
Human Factors
Human behavior
Fingerprint recognition
Databases
Data Security
data privacy
Communication networks
biometrics (access control)
biometric
authorisation
biblio
Cyber-physical systems security through multi-factor authentication and data analytics
Submitted by aekwall on Mon, 06/01/2020 - 10:04am
Internet of Things
Smart homes
smart cities
secure authentication
Resiliency
resilience
pubcrawl
password
multifactor authentication
Multi-factor authentication
Metrics
authentication
Internet of Everything
Human Factors
Human behavior
event processing
Data Analytics
data analysis
cyber-physical systems security
cyber-physical systems
complex system
authorisation
biblio
An Extensive Formal Analysis of Multi-factor Authentication Protocols
Submitted by aekwall on Mon, 06/01/2020 - 10:03am
Protocols
Metrics
multifactor authentication
multifactor authentication protocols
P ROVERIF tool
password
Phishing
pi calculus
protocol analysis attackers
message authentication
pubcrawl
resilience
Resiliency
Servers
threat model
threat scenarios
users authentication
authentication
malwares
invasive software
Human Factors
Human behavior
Google 2-step
Google
FIDO U2F
extensive formal analysis
data privacy
Cryptographic Protocols
Computer crime
Communication Network
automated protocol analysis
authorisation
authentication mechanisms
biblio
High-risk Problem of Penetration Testing of Power Grid Rainstorm Disaster Artificial Intelligence Prediction System and Its Countermeasures
Submitted by aekwall on Mon, 06/01/2020 - 9:54am
resilience
power engineering computing
power grid rainstorm disaster artificial intelligence prediction system
power grid storm disasters
power grids
power Internet of Things
power meteorological service technology support
power system security
power transformer testing
program debugging
pubcrawl
policy-based governance
Resiliency
security of data
SQL
SQL blind bug
SQL injection
SQL injection attack behavior
SQL injection penetration test
Storms
system penetration testing
Vulnerability
host security
Artificial Intelligence
artificial storm prediction system
Companies
composability
disaster prediction information systems
disasters
electric power information system security defense work
electrical safety
energy Internet disaster safety
energy internet disaster security
application security
information security
Information systems
internet
Internet of Things
middleware
middleware security
network security
password
Penetration Testing
PGRDAIPS
biblio
Multimodal Data Security Framework Using Steganography Approaches
Submitted by aekwall on Mon, 06/01/2020 - 9:42am
advanced encryption standard
honey pots
Steganography approaches
multimodal data security framework
multimodal
least significant bit
information hiding strategies
heuristic intrusion detection
Augmented Reality Steganography
ARSteg
encryption algorithm
Steganography
augmented reality
framework
Scalability
Human Factors
unauthorized users
pubcrawl
password
authentication
Resiliency
data encryption
security
decryption
Conferences
encryption
Cryptography
Servers
biblio
Assessing and extracting software security vulnerabilities in SOFL formal specifications
Submitted by grigby1 on Fri, 04/24/2020 - 3:20pm
pubcrawl
software security vulnerabilities
software requirement specifications
software development life cycle
Software
SOFL formal specifications
SOFL
Security Vulnerability Extraction
security of data
secure software product
secure distributed systems
Resiliency
resilience
Requirement Specifications
composability
password
object-oriented languages
object oriented security
Natural languages
Metrics
Input variables
highly interconnected world
formal verification
formal specifications
Formal Specification
formal languages
Formal Language
Computer bugs
biblio
An Innovative Model (HS) to Enhance the Security in Windows Operating System - A Case Study
Submitted by grigby1 on Fri, 04/17/2020 - 10:27am
NT LAN manager
Windows Registry
Windows Operating System Security
Windows operating system
Windows
SAM security account manager
SAM file protection
Resiliency
resilience
pubcrawl
privacy
password
NTLM
attacks
Microsoft Windows (operating systems)
Metrics
message authentication
login credentials
HS model
force attacks
dictionary attacks
Data Security
Data protection
data integrity
composability
authorisation
biblio
Cookie Based Protocol to Defend Malicious Browser Extensions
Submitted by grigby1 on Fri, 04/17/2020 - 9:45am
HTTP cookie
browser extension
Chrome store
cookie management
customizing web browsers
defend malicious browser extensions
dynamic cookies
dynamic encrypted cookies
features increase
authentication protocol
offline extension installations
privileges browser extensions
replay attack
session hijacking
software module
static cookies
user interface modifications
Web Browser Security
Protocols
Servers
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
authentication
internet
Cryptography
composability
online front-ends
Metrics
Browsers
Compositionality
password
user interfaces
biblio
Measuring the Information Security Awareness Level of Government Employees Through Phishing Assessment
Submitted by grigby1 on Fri, 04/10/2020 - 11:36am
information security awareness
unsolicited e-mail
pubcrawl
phishing simulation
phishing assessment
Phishing
Personnel
password
knowledge approach
knowledge and behavioral approach
information security instruments
information security awareness level
behavior approach
Indonesia
Human Factors
Human behavior
government information security
government employees
government data processing
Government
employees information security awareness
Directorate General of ABC
DG ABC employees
Computer crime
biblio
Security Lock with Effective Verification Traits
Submitted by aekwall on Mon, 04/06/2020 - 9:05am
speech pattern recognition
multilevel security system
multiple layer security system
physical security
Raspberry Pi microcomputers
recognition
security lock
security locker solution
smart box
multi-layer
Speech recognition
TensorFlow
vein pattern recognition
vein recognition
Veins
verification traits
Viola and Jones
pattern locks
pubcrawl
Scalability
authorisation
Linux
feature extraction
learning (artificial intelligence)
machine learning
Resiliency
Human behavior
security
password
Cameras
Fingerprint recognition
face recognition
facial recognition
graphical user interfaces
interactive GUI
machine learning operations
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »