Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computers
biblio
Virtual TPM Dynamic Trust Extension Suitable for Frequent Migrations
Submitted by grigby1 on Mon, 11/13/2017 - 10:59am
pubcrawl
vTPM DTE
virtual Trusted Platform Module (vTPM)
virtual trusted platform module
virtual TPM dynamic trust extension
virtual machines
trusted platform modules
Trusted Platform Module (TPM)
Trusted Computing
Trust Extension
time token
Servers
Resiliency
real-time systems
public key cryptography
attestation data
pTPM
physical TPM
performance measurements
IK certificate
identity key certificate
Heuristic algorithms
frequent migrations
Elliptic curve cryptography
Computers
composability
authorisation
authentication server
authentication
biblio
Detecting Ransomware with Honeypot Techniques
Submitted by grigby1 on Fri, 11/03/2017 - 10:27am
Ransomware
malware
malware form
Metrics
Microsoft file server resource manager feature
Monitoring
Network
network administrators
pubcrawl
invasive software
ransomware activity detection
ransomware attacks
ransomware detection
Resiliency
Servers
social engineering methods
Windows security logs
witness tripwire files
Electronic mail
bogus computer resources
composability
computer security
Computers
Cryptography
cyber security
decoy computers
detect
activity
EventSentry
file screening service
file servers
honeypot
honeypot techniques
Human behavior
illicit access detection
biblio
Cyber ethics and cyber crime: A deep dwelved study into legality, ransomware, underground web and bitcoin wallet
Submitted by grigby1 on Fri, 11/03/2017 - 10:27am
pubcrawl
encryption
Human behavior
Information systems
internet
invasive software
legality
locker bot
malware
Metrics
Electronic mail
Ransomware
Resiliency
The Dark Net
Tor
trojan horse
Trojan horses
underground Web
Web threats
cryptolocker ransomware
bitcoin
bitcoin wallet
composability
Computer crime
Computers
consumer confidence
crypto virus
Cryptographic Protocols
Cryptography
Algorithm design and analysis
CTB locker
cyber crime
cyber ethics
cyber Laws
cyber wars
darknet
e-commerce
electronic commerce
biblio
A novel method for recovery from Crypto Ransomware infections
Submitted by grigby1 on Fri, 11/03/2017 - 10:27am
Metrics
System recovery
Software
shadow copies
Servers
Resiliency
recovery
Ransomware
pubcrawl
Payloads
network security
command and control systems
malware
invasive software
infection recovery
Human behavior
extortion
encryption
crypto ransomware infections
crypto ransomware
Computers
composability
biblio
Storage as a parameter for classifying dynamic key management schemes proposed for WSNs
Submitted by grigby1 on Wed, 03/29/2017 - 11:33am
policy-based governance
WSN
wireless sensor networks
Wireless Sensor Network
telecommunication security
telecommunication network management
target tracking
storage
security
secure communications
Resiliency
resilience
pubcrawl
Artificial Neural Networks
neural networks security
Neural networks
neural network
Monitoring
Metrics
knowledge based systems
key management
healthcare monitoring
dynamic key management scheme classification
Computers
composite keys
border control
biblio
Profiling of automobile drivers using car games
Submitted by grigby1 on Wed, 03/08/2017 - 1:47pm
driving log generation
vehicle data
User profiling
traffic engineering computing
Simulator
pubcrawl170115
Part profiles
keystroke identification
Gears
gaming
Games
Acceleration
driving characteristics
digital simulation
Computers
computer games
Computational modeling
car games
biometrics
behavioral patterns
automobiles
automobile driver profiling
biblio
Continuous Authentication in a real world settings
Submitted by grigby1 on Wed, 03/08/2017 - 1:46pm
keystroke dynamics
trust model
Software
pubcrawl170115
Presses
periodic authentication
Mouse Dynamics
Mice
Mathematical model
authentication
feature extraction
data collection software
continuous authentication system
Continuous Authentication
Computers
computer input devices
behavioural biometrics
authorisation
biblio
Hackers topology matter geography: Mapping the dynamics of repeated system trespassing events networks
Submitted by grigby1 on Wed, 03/08/2017 - 1:38pm
SNA technique
Honey-pots network
Hot-spots
internet
IP networks
network topology
pubcrawl170114
repeated system trespassing event network dynamics mapping
SNA
hacking spatial context
social network analysis technique
social networking (online)
spatial attributes
system trespassers
topological positions
Topology
victimized computers
attacker behavior
hacking patterns
hacking network topology
Hacking
hackers topology
Geography
geographic position
Cyberspace Policies
Cybersecurity
Cybercrime
Computers
computer networks
Computer hacking
Computer crime
brute force attacks
BFA
biblio
Automated content detection on TVs and computer monitors
Submitted by grigby1 on Wed, 03/08/2017 - 1:04pm
Image edge detection
TV
television
system manufacturing process
rectangle recognition
quality tests
pubcrawl170111
notebook
Monitoring
line detection algorithms
Inspection
image segmentation
Algorithm design and analysis
image comparison metrics
edge detection algorithms
edge detection
Computers
computer monitors
computer displays
computer aided manufacturing
automatic optical inspection
automatic inspection system images
automated content detection
biblio
Query of Uncertain QoS of Web Service
Submitted by grigby1 on Wed, 03/08/2017 - 12:53pm
Computers
continuous probability distribution
internet
optimization approaches
Probability distribution
pubcrawl170110
Q measurement
QoS
quality of service
query processing
Semantics
uncertain QoS query
uncertainty
Web Service
web services
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
…
next ›
last »