Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Worm
biblio
Towards Enabling Deletion in Append-Only Blockchains to Support Data Growth Management and GDPR Compliance
Submitted by aekwall on Mon, 01/11/2021 - 1:30pm
deletion
data deletion
Worm
truncation
rollover
Regulation
redactability
PII
Mutability
modifiability
erasability
editability
DLT
Scalability
append-only storage
decentralization
personally identifiable information
distributed ledgers
Consensus
GDPR
Semantics
privacy
blockchain
pubcrawl
Conferences
biblio
Cyber Security at a Glance
Submitted by grigby1 on Fri, 09/04/2020 - 3:16pm
Sniffing
data records
DDoS and DOS attacks
DDoS Attack
distributed denial-of-service attack
firewall
hacking techniques
man in the middle attack
polymorphic virus
proxy
computer malwares
social engineering
spoofing
Tor browser
trojan
Trojan horses
Trojans
vpn
Worm
BIOS Security
Human Factors
Computer crime
Firewalls (computing)
internet
pubcrawl
Metrics
Resiliency
resilience
cyber security
malware
Scalability
Cyber Attacks
Computer hacking
denial-of-service attack
computer viruses
antivirus
BeEF
boot sector virus
Brute forcing
biblio
Modeling Worm Propagation and Insider Threat in Air-Gapped Network using Modified SEIQV Model
Submitted by grigby1 on Fri, 08/07/2020 - 3:38pm
resilience
insider threat
invasive software
malware
Mathematical model
Metrics
modified SEIQV model
Patching
pubcrawl
Immune system
Resiliency
SEIQP model
SEIQV
susceptible-exposed-infected-quarantined-patched model
susceptible-exposed-infected-quarantined-vaccinated model
Worm
worm propagation modeling
computer network security
air-gapped network
anti-virus
Atmospheric modeling
Biological system modeling
biologically based epidemic models
Communication networks
composability
Computational modeling
Air gaps
computer networks
Computer worms
differential equations
Epidemic model
Grippers
Human behavior
Human Factors