Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security problems
biblio
Online/Offline Revocable Multi-Authority Attribute-Based Encryption for Edge Computing
Submitted by aekwall on Mon, 02/15/2021 - 3:49pm
reusable ciphertext pool
large universe MA-CP-ABE scheme
Multi-Authority Attribute-Based Encryption
online-offline revocable multiauthority attribute-based encryption
Online/Offline Encryption
pubcrawl
q-DPBDHE2 assumption
Resiliency
resource-constrained users
IoT
revocation
revocation mechanism
security problems
users access privilege
users initialization phase
valid ciphertext
waste system resources
authorisation
invalid ciphertext
Internet of Things
illegal ciphertext
fine-grained access control
encryption computational cost
efficient encryption
edge computing
data encryption algorithm
cyber physical systems
Cryptography
cross domain applications
composability
Cloud Computing
Ciphertext Verification.
ciphertext verification
biblio
Security Assessment of Dynamic Networks with an Approach of Integrating Semantic Reasoning and Attack Graphs
Submitted by aekwall on Mon, 10/05/2020 - 10:53am
security assessment
Dynamic Networks and Security
test networks
semantic reasoning
Security Ontology
scalable security analysis
risk assessment experience
ontology- and graph-based approach
integrating semantic reasoning
Inference algorithms
security knowledge
attack graph
inference mechanisms
Semantics
cognition
security problems
security of data
ontologies (artificial intelligence)
cyber-attacks
risk management
Decision Making
tools
Metrics
Mobile handsets
graph theory
composability
pubcrawl
Resiliency
network security
security
Ontologies
enterprise networks
biblio
TAG: Topological Attack Graph Analysis Tool
Submitted by aekwall on Mon, 08/17/2020 - 10:17am
MulVAL inference engine
topological attack graph analysis tool
tag
situational awareness
security problems
security level estimation
Security Evaluation
Resiliency
pubcrawl
Predictive Metrics
attack graphs
multistage cyberattacks
inference mechanisms
graph theory
cyber security
cyber defense
corrective actions
computer network security
composability
attack paths
biblio
A highly accurate machine learning approach for developing wireless sensor network middleware
Submitted by aekwall on Mon, 06/01/2020 - 9:47am
middleware security
WSNs
WSN
wireless sensor networks
wireless sensor network middleware
visualization
unsupervised learning technique
Unsupervised Learning
sensors
security problems
security of data
security
Resiliency
resilience
pubcrawl
policy-based governance
composability
middleware
malicious attacks
machine learning
learning (artificial intelligence)
intelligent middleware
Generators
generator
Generative Adversarial Networks algorithm
GANs
gan
Gallium nitride
fake data
detector
Data Transmission
confusion matrix
biblio
Extending Authentication Mechanism to Cooperate with Accountable Address Assignment
Submitted by grigby1 on Fri, 05/22/2020 - 1:13pm
IPv6
wireless networks
user authentication
Source Address Validation Improvement
security problems
SAVI
Resiliency
resilience
pubcrawl
Protocols
privacy
Portals
network accountability
Metrics
message authentication
main identity authentication mechanism
802.1X
IP source addresses
IP networks
IP addresses
internet
effective accountability mechanisms
DHCP request process
computer network security
composability
CAIP
authentication
accounting ability
Accountable IP address assignment
Accountable IP
accountable identity
accountable address assignment
biblio
QRStream: A Secure and Convenient Method for Text Healthcare Data Transferring
Submitted by aekwall on Mon, 03/30/2020 - 10:40am
cyber physical systems
text healthcare data transferring
QRStream
healthcare organization
healthcare activities
health information
health data delivery
health awareness
electronic health data transferring
privacy problems
QR codes
health care
Payloads
security problems
security of data
text analysis
Libraries
metadata
Decoding
Cryptography
pubcrawl
Resiliency
Organizations
Medical services
electronic health records
data privacy
Servers
biblio
Authentication Algorithm and Techniques Under Edge Computing in Smart Grids
Submitted by aekwall on Mon, 03/02/2020 - 11:26am
edge computing
traditional password-based authentication
smart grid architecture
OTP algorithms
one-time password
one time password
two factor authentication
two-factor authentication
Two dimensional displays
Human Factors
authorisation
authentication protocol
security problems
Smart Grid
message authentication
smart power grids
authentication
pubcrawl
Cryptographic Protocols
Conferences
biblio
A Secure Multi-Factor Remote User Authentication Scheme for Cloud-IoT Applications
Submitted by aekwall on Mon, 02/10/2020 - 11:03am
smart cards
session key disclosure attacks
secure multifactor remote user authentication scheme
secure multifactor authentication protocol
resource limited devices
Kalra's scheme
communication technology
cloud-IoT environment
cloud-IoT applications
biometrics (access control)
multifactor authentication
Human Factors
security problems
Cloud Computing
password
authentication
Metrics
pubcrawl
Resiliency
embedded devices
Protocols
Cryptographic Protocols
telecommunication security
Internet of Things
Big Data
authorisation
biblio
IoT Security Model and Performance Evaluation: A Blockchain Approach
Submitted by grigby1 on Tue, 12/17/2019 - 11:21am
model construction
Throughput
theoretical data support
System performance
security risks
security problems
security of data
security model
Resiliency
resilience
Public key
pubcrawl
Predictive Metrics
performance evaluation
Packaging
blockchain
Metrics
IoT security model
InterPlanetary File System
Internet of Things
distributed large capacity storage
cyber-physical systems
cyber-physical system
Cryptography
concurrency (computers)
Concurrency
composability
blockchain-based security model
blockchain technology
biblio
A Study on the Use of Quantum Computers, Risk Assessment and Security Problems
Submitted by grigby1 on Tue, 10/08/2019 - 3:42pm
Resiliency
quantum approaches
quantum computer
quantum computers
quantum computing
quantum computing security
Quantum mechanics
quantum physics
resilience
pubcrawl
risk assessment
Scalability
security
security problems
simultaneous operation
threat
wide solution space
high-resolution image
computational complexity
computer based solutions
Computers
Cryptography
cryptosystems
encryption
high complexity value
high performance
composability
information storage
internet
large-scale data processing
long processing times
Metrics
optimisation
optimization problems
1
2
3
next ›
last »