Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computers
biblio
A Lightweight Quantum-Safe Security Concept for Wireless Sensor Network Communication
Submitted by aekwall on Mon, 03/30/2020 - 10:42am
quantum computers
wireless sensor networks
Wireless Sensor network communication
ubiquitous internetworking
tiny sensor nodes
telecommunication security
stage permeated filtering mechanism
security of data
Scalability
resource-aware security
Resiliency
quantum cryptography
quantum computing security
quantum computing
Pervasive Computing Security
pubcrawl
Predictive Metrics
lightweight quantum-safe security concept
Intrusion Detection Systems
internetworking
Internet of Things
filtering theory
distributed sensor nodes
contemporary cryptographic mechanisms
Computers
composability
Ciphers
Base stations
biblio
Heterogenic Multi-Core System on Chip for Virtual Based Security
Submitted by aekwall on Mon, 02/10/2020 - 10:58am
multiprocessing systems
multicore computing security
virtual-based security
the GOST
standard symmetric key block cipher
neuromatrix
neural network emulation
heterogenic multicore system on chip
heterogenic multi-core system-on-chip
GOST
coding information
Cipher
virtual reality
AES
signal processing
DES
Scalability
Image Processing
assembly language
Computers
microsoft windows
Decoding
neural nets
standards
Metrics
pubcrawl
Resiliency
Kernel
system-on-chip
Hardware
encryption
Cryptography
biblio
A Cyber Communication Package in the Application of Grid Tied Solar System
Submitted by grigby1 on Mon, 02/10/2020 - 10:30am
Rivest
internet
internet connected computers
latency reduction
Load modeling
Metrics
power engineering computing
power grids
power system security
pubcrawl
resilience
Resiliency
Human Factors
RSA algorithms
Scalability
secured socket layer
secured socket layer (SSL)
Servers
Shamir and Adleman (RSA)
Shamir and Adleman algorithms
Solar system
SSL
SSL Trust Models
Cryptography
advanced encryption standard (AES)
AES algorithm
bidirectional communication strategy
communication concept
communication methodology
communication process
communication program
Computational modeling
Computer crime
Computers
advanced encryption standard
cyber communication package
cyber network
cyber security
cyber security arrangement
data exchange
electrical data
electronic data interchange
grid connected solar system
grid tied solar system
Human behavior
biblio
Developing an international cooperation on cyber defense and deterrence against Cyber terrorism
Submitted by aekwall on Wed, 12/18/2019 - 1:38pm
Terrorism
information technology security
government data processing
cyber security countermeasures
Cyber defence
social aspects of automation
cyber deterrence
Computers
cyber defense
cyber terrorism
security of data
Cyberspace
resilience
Government
Deterrence
internet
pubcrawl
Human behavior
Scalability
biblio
Securing IS assets through hacker deterrence: A case study
Submitted by aekwall on Wed, 12/18/2019 - 1:36pm
wireless networks
internal threat deterrence
information systems security
hacker deterrence
external threat deterrence
external computer criminals
e-commerce organization
cyber attack
broken windows theory
Deterrence
electronic commerce
Computer crime
Computers
Information systems
resilience
Companies
Computer hacking
pubcrawl
Human behavior
Scalability
computer network security
biblio
A Study on the Use of Quantum Computers, Risk Assessment and Security Problems
Submitted by grigby1 on Tue, 10/08/2019 - 3:42pm
Resiliency
quantum approaches
quantum computer
quantum computers
quantum computing
quantum computing security
Quantum mechanics
quantum physics
resilience
pubcrawl
risk assessment
Scalability
security
security problems
simultaneous operation
threat
wide solution space
high-resolution image
computational complexity
computer based solutions
Computers
Cryptography
cryptosystems
encryption
high complexity value
high performance
composability
information storage
internet
large-scale data processing
long processing times
Metrics
optimisation
optimization problems
biblio
Blockchain-Based Mutual Authentication Security Protocol for Distributed RFID Systems
Submitted by grigby1 on Wed, 10/02/2019 - 2:03pm
potential attacks
Supply Chain
SQL injection attack
SQL
Servers
security
RFIDs
RFID
Resiliency
resilience
radiofrequency identification
radio frequency identification technology
pubcrawl
Protocols
privacy
access control system
identity related information
Human Factors
Human behavior
high security demand
distributed system
distributed RFID systems
distributed environment
Cryptographic Protocols
credit card
Computers
blockchain-based mutual authentication security protocol
blockchain
authorisation
authentication
biblio
Information Assurance in modern ATE
Submitted by aekwall on Mon, 08/05/2019 - 9:40am
Instruments
tools
Task Analysis
software footprint
security of data
security
Resiliency
pubcrawl
policy-based governance
operating systems (computers)
operating system
microsoft windows
Metrics
internet
anti-virus
Information Assurance
Human behavior
electronic devices
cyber security
Computers
computer viruses
computer
composability
automatic test equipment
ATE system software
ATE OS settings
ATE
biblio
Comprehensive Behavior Profiling Model for Malware Classification
Submitted by grigby1 on Mon, 06/10/2019 - 1:02pm
Metrics
telecommunication traffic
specific traffic selection
security
Resiliency
resilience
pubcrawl
Protocols
privacy
Payloads
pattern classification
partial network behavior
network security
Network behavior profiling
network behavior based classification methods
appropriate countermeasures
malware variants
malware network activities
malware classification method
malware classification
malware
invasive software
Human behavior
feature extraction
Computers
computer network security
Computational modeling
comprehensive behavior profiling model
complex activities
behavior profiling models
biblio
Survey on Cryptanalysis of Code-Based Cryptography: From Theoretical to Physical Attacks
Submitted by grigby1 on Thu, 02/14/2019 - 10:12am
linear codes
theoretical cryptography
structural attacks
strong mathematical background
side-channel attacks
public-key cryptosystem
public-key cryptography
post-quantum standardization
Post-quantum cryptography
polynomials
polynomial time
oldest quantum-resistant proposition
number theory problems
number theory
NIST's announcement
McEliece scheme
pubcrawl
elliptic curve
discrete logarithm
coding theory
code-based cryptography
adequate post-quantum cryptographic schemes
quantum cryptography
side-channel analysis
public key cryptography
quantum computer
Decoding
Computers
Compositionality
physical attacks
encryption
composability
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
…
next ›
last »