Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security issues
biblio
An Efficient Authentication Scheme for Fog Computing Environment using Symmetric Cryptographic methods
Submitted by grigby1 on Fri, 09/16/2022 - 3:39pm
Fuzzy Cryptography
authentication
Cloud Computing
Costs
Fog computing
key management
Mobile handsets
ProVerif
pubcrawl
resilience
Resiliency
Resists
Scalability
security
security issues
Servers
biblio
A Secure Multi Factor User Authentication Framework for Electronic Payment System
Submitted by grigby1 on Wed, 03/09/2022 - 12:40pm
Metrics
two
single factor
Electronic payments
Multi-factor authentication
multifactor authentication
Force
password
Reliability
security
authorization
security issues
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
biblio
Secured Health Data Access in Cloud Computing Using Multiple Attribute-Based Encryptions
Submitted by aekwall on Tue, 01/25/2022 - 2:52pm
Access Data
attribute-based encryption
CC
Cloud Computing
Computers
data access
encryption
Human behavior
policy-based governance
Protocols
pubcrawl
Scalability
Secure storage
security issues
biblio
Survey on Fake Profile Detection on Social Sites by Using Machine Learning Algorithm
Submitted by grigby1 on Mon, 11/29/2021 - 12:33pm
pubcrawl
Support Vector Machine(SVM)
Support vector machines
supervised machine learning
Spam Profile
Social network services
Social Agents
Skin
security issues
Scalability
Artificial Neural Networks(ANNs)
Naïve byes
machine learning algorithms
machine learning
Human Factors
feature extraction
Fake Profile
Decision trees
Decision Tree
Bots Accounts
biblio
One Size Does Not Fit All: A Grounded Theory and Online Survey Study of Developer Preferences for Security Warning Types
Submitted by aekwall on Mon, 03/15/2021 - 11:09am
Grounded Theory study
secure software
security tools
14 professional software developers
50 professional software developers
code security
developer preferences
developer security warnings
development tools
compiler security
Qualitative research
security checkers
security warning types
security warnings
static analysis engines
warning interactions
warning type
security of data
Compositionality
security issues
program diagnostics
software development
static analysis
software engineering
machine learning
tools
Metrics
pubcrawl
Resiliency
Software
security
Organizations
Scalability
biblio
Security across abstraction layers: old and new examples
Submitted by aekwall on Mon, 03/15/2021 - 11:08am
Context modeling
successive layers
source programming language
source code level
single level
ISA
Instruction Set Architecture
ICT system
ICT application
higher level abstractions
cross-layer security issues
cross-layer nature
cross-layer issues
abstraction layers
operating systems
security
compiler security
secure compilation
Computer languages
program compilers
Instruction sets
Compositionality
security issues
Java
Metrics
pubcrawl
Resiliency
Hardware
Scalability
security of data
biblio
Security Issues Seclusion in Bitcoin System
Submitted by grigby1 on Tue, 03/09/2021 - 1:49pm
Human behavior
User profile
user identity
transaction verification
transaction processing
transaction management
trading
security issues
security
Scalability
pubcrawl
pseudonames
peer-to-peer payment network
Peer-to-peer computing
market
adversarial attacks
exchange trading commodity
exchange
digital currency
data privacy
cryptocurrency
cryptocurrencies
crypto-currency
blockchain
Bitcoin system
Bitcoin privacy
bitcoin
assets
Anonymity and Privacy
biblio
A Scalable Blockchain-based Approach for Authentication and Access Control in Software Defined Vehicular Networks
Submitted by grigby1 on Tue, 02/23/2021 - 1:58pm
security
Resiliency
Scalability
scalable architecture
scalable blockchain-based approach
SDN
SDN controllers
SDVN devices
SDVN features
SDVN requirements
resilience
security issues
software defined networking
software defined vehicular networking
software defined vehicular networks
telecommunication network planning
telecommunication security
unauthorized SDN controller
unauthorized switch
vehicular ad hoc networks
control systems
access control issues
access control mechanism
authentication
authorisation
authorization
blockchain
blockchain ledger
blockchain technology
computer architecture
Access Control
cryptocurrencies
Distributed databases
heterogeneous networks
interconnected blockchain sub-networks
IoV
message authentication
Network reconnaissance
open systems
pubcrawl
biblio
An Appraisal over Intrusion Detection Systems in Cloud Computing Security Attacks
Submitted by grigby1 on Wed, 02/03/2021 - 1:01pm
Intrusion Detection
wrapping attacks
Virtual machining
specific honey pot algorithm
Servers
security issues
security
Scalability
Resiliency
resilience
pubcrawl
procedural intrusion way
malware
invasive software
Intrusion Detection Systems
Browser Security
intrusion
Human Factors
Human behavior
honey pots
honey pot attack
Honey pot (computing)
Honey Pot
Flooding Attacks
common security breaches
cloud computing security attacks
Cloud Computing
browser malware-injection attacks
authentication
attacks
biblio
Automated Vulnerability Testing via Executable Attack Graphs
Submitted by aekwall on Mon, 01/25/2021 - 12:04pm
automated vulnerability testing
vulnerability scans
vulnerability assessments
virtual environment
suboptimal decision making
individual attack paths
executable attack graphs
end-to-end process
cyber risk reduction
cyber risk assessments
cyber risk assessment uncertainty
cyber risk assessment process
cyber attack graphs
AVRA
computer network security
automated vulnerability and risk analysis
automatic test software
attack graphs
Predictive Metrics
security issues
risk analysis
Decision Making
reachability analysis
graph theory
composability
pubcrawl
Resiliency
1
2
3
4
5
6
7
8
next ›
last »