Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
web services
biblio
Authentication and Recognition, Guarantor for on-Line Security
Submitted by grigby1 on Fri, 04/17/2020 - 11:28am
Linux
Windows Operating System Security
web services
Web Service
Web browser
SOAP
rest
Resiliency
resilience
operating systems (computers)
operating systems
Mobile handsets
mobile desktop
Metrics
iOS Security
face recognition-based authentication service
face recognition authentication service
face recognition
face biometrics
composability
biometrics (access control)
BEWARE
authorisation
ARGOS
anti-spoofing
3rd party service organizations
3D frontal facing camera
pubcrawl
biblio
The Creation Process of a Secure and Private Mobile Web Browser with no Ads and no Popups
Submitted by grigby1 on Fri, 04/17/2020 - 10:44am
Metrics
Web Browser Security
World Wide Web
Web sites
secure mode
private mode
mobile Web browser
Mobile Applications
hypermedia markup languages
HTML5 Web page
creation process
Browsers
Compositionality
security of data
online front-ends
mobile computing
composability
web services
internet
data privacy
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
biblio
Cloud Based Intrusion Detection and Prevention System for Industrial Control Systems Using Software Defined Networking
Submitted by grigby1 on Fri, 04/17/2020 - 10:29am
production engineering computing
microgrid energy management system
network function virtualization
network intrusion services
network security tools
OpenDaylight software
packet inspection
power engineering computing
power grids
power system control
privacy
microgrid
pubcrawl
resilience
Resiliency
SDN controller
service function chaining
software defined networking
virtual private cloud
virtualisation
virtualization privacy
web services
Human Factors
CB-IDPS
cloud Based intrusion detection and prevention system
Cloud Computing
composability
computer network security
control engineering computing
cyber security
data privacy
energy management systems
Human behavior
Amazon Web Services
ICs
Anomaly Detection
ICS delay constraints
ICS networks
industrial control
Industrial Control Systems
intrusion detection and prevention
layer encryption
manufacturing systems
Metrics
biblio
Mitigation of hard-coded credentials related attacks using QR code and secured web service for IoT
Submitted by aekwall on Mon, 03/30/2020 - 11:39am
QR codes
SSL
security concerns
secured web service
Response code
QR code based approach
lightweight security algorithm
hard-coded credentials related attacks
Hard-coded credentials
GUI
clear text log-in id
password
IoT manufacturers
computer network security
QR code
cyber physical systems
web services
pubcrawl
Resiliency
invasive software
IoT devices
Internet of Things
Cryptography
authorisation
DDoS
biblio
Powering Hands-on Cybersecurity Practices with Cloud Computing
Submitted by grigby1 on Wed, 03/18/2020 - 11:50am
Metrics
web services
virtualisation
Virtual machine monitors
tools
specific virtual computing service provider
security of data
Science of Security
Scalability
Resiliency
resilience
pubcrawl
private OpenStack cloud
powering hands-on cybersecurity practices
Policy-Governed Secure Collaboration
multiple clouds
Chameleon cloud
Human behavior
hands-on lab
hands-on cybersecurity practice
educational courses
education
cybersecurity education
computer security
computer science education
composability
Communication networks
collaboration
cloud-based platform named EZSetup
cloud-agnostic
Cloud Computing
biblio
True2F: Backdoor-Resistant Authentication Tokens
Submitted by aekwall on Mon, 03/02/2020 - 12:27pm
Browsers
two-party protocols
token faults
software compromise
second-factor authentication
privacy defenses
Phishing
embedded-systems
ECDSA signatures
cross-origin token-fingerprinting attacks
conventional authentication tokens
commodity hardware tokens
Backdoors
backdoor-resistant authentication tokens
two factor authentication
cryptographic keys
security
Human Factors
public key cryptography
Public key
digital signatures
authentication
privacy
web services
Computer crime
standards
pubcrawl
Protocols
Cryptographic Protocols
Hardware
data privacy
authorisation
biblio
Trustless Two-Factor Authentication Using Smart Contracts in Blockchains
Submitted by aekwall on Mon, 03/02/2020 - 12:26pm
Virtual private networks
virtual private networks connections
trustless two-factor authentication
server authentication
security component
secure web service
secure shell protocol
OpenSSH server
blockchain platform
authentication systems
authentication request
authentication purpose
two factor authentication
secret information
Human Factors
security of data
blockchain technology
password
smart contracts
message authentication
authentication
web services
internet
blockchain
bitcoin
pubcrawl
Trusted Party
Cryptographic Protocols
telecommunication security
Servers
biblio
Security Analytics For Heterogeneous Web
Submitted by grigby1 on Wed, 02/26/2020 - 4:42pm
Probabilistic Arithmetic Automata(PAA)
web services
web applications
vulnerability detection tools
tools
threat vectors
SVM classifier
Support vector machines
Support Vector Machine (SVM) Classifier
security of data
security analytics
security
reconfigurable PAA
pubcrawl
Probabilistic logic
business data processing
proactive behavior
privacy
pattern classification
Metrics
Measurement
machine learning algorithms
machine learning
learning (artificial intelligence)
internet
heterogeneous Web
feature extraction
dynamic PAA
data analysis
biblio
Determining the Effectiveness of Data Remanence Prevention in the AWS Cloud
Submitted by aekwall on Mon, 02/24/2020 - 10:53am
Amazon AWS cloud service
data remanence prevention
Data Remanence Detection
data remanence
cross-instance cloud remanence
cross-instance cloud data remanence
cloud virtual machine instances
cloud provider template
AWS
Cloud Computing
virtual machines
virtual machine
remanence
Compositionality
cloud
web services
pubcrawl
Resiliency
biblio
An Extensive Formal Security Analysis of the OpenID Financial-Grade API
Submitted by grigby1 on Mon, 02/17/2020 - 5:07pm
Security-Protocols
OpenID Financial-grade API
OpenID Foundation
OpenID-Connect
policy-based governance
pubcrawl
resilience
Resiliency
security weaknesses
Open-banking-API
Servers
Single-Sign-On
standards
Web Infrastructure Model
web services
web-based APIs
web-based environment
web-security
formal security analysis
application program interfaces
authentication
authorisation
authorization
bank data processing
Banking
FAPI
Financial-grade-API
Analytical models
Formal-Analysis
Human behavior
Metrics
OAuth
OAuth 2.0 design
Open Banking APIs
Open Banking security profile
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »