Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Educational institutions
biblio
A transparent middleware for encrypting data in MongoDB
Submitted by BrandonB on Wed, 05/06/2015 - 1:11pm
Blogs
Cloud Computing
Cryptography
database
dataset level
Educational institutions
Encrypting
middleware
MongoDB
MongoDB database
NoSQL
NoSQL database
relational databases
security vulnerability
sensitive data encryption
Transparent Middleware
biblio
Detection of cyber intrusions using network-based multicast messages for substation automation
Submitted by BrandonB on Wed, 05/06/2015 - 12:59pm
sampled value
network security
network-based cyber intrusion detection system
network-based multicast messages
NIDS
packet modification
power engineering computing
predefined security rules
replay
misclassified abnormal packets
SaS
security of data
simultaneous cyber attacks
specification-based algorithm
substation automation
substation automation systems
SV
GOOSE
computer security
cyber security of substations
cyber security testbed
denial-of-service attacks
Educational institutions
false negative ratio
FNR
generic object-oriented substation event
Anomaly Detection
GOOSE and SV
IEC 61850
IEC standards
IEEE 39-bus system model
Intrusion Detection
intrusion detection system
low-fault negative rate
biblio
Provably Secure Group Key Management Approach Based upon Hyper-Sphere
Submitted by BrandonB on Wed, 05/06/2015 - 12:49pm
PRF
Vectors
security
secure group communication systems
robust group key management approach
re-keying messages
random number
public key cryptography
pseudorandom function assumption
pseudo-random function (PRF)
provably secure group key management approach
provable security
Protocols
private key cryptography
Algorithm design and analysis
member private point
massive membership change
key management
hyper-sphere theory
hyper-sphere
group controller
Group communication
GC
Galois fields
Educational institutions
Concrete
central point
biblio
Secure Deduplication with Efficient and Reliable Convergent Key Management
Submitted by BrandonB on Wed, 05/06/2015 - 12:37pm
private key cryptography
storage space reduction
storage management
Servers
security model
secure deduplication
reliable convergent key management
Reliability
ramp secret sharing scheme
public key cryptography
proof of ownership
baseline key management scheme
key management
encryption
Educational institutions
Dekey
Deduplication
data deduplication
convergent encryption
cloud storage
Cloud Computing
Bismuth
biblio
Global convergence in digital identity and attribute management: Emerging needs for standardization
Submitted by BrandonB on Wed, 05/06/2015 - 12:17pm
attribute format
attribute management
authentication
authorisation
authorization
Context
data privacy
digital identification
digital identity management
Educational institutions
global convergence
Identity management
privacy
privacy maintaining international framework
standards
biblio
Implementation of randomize-then-combine constructed hash function
Submitted by BrandonB on Wed, 05/06/2015 - 10:58am
Message systems
Vectors
Resistance
randomize-then-combine technique
randomize-then-combine
Random access memory
programming
parallel multithreaded programming
pair block chaining
multi-threading
block-by-block message processing
Merkle-Damgard construction
Iterative methods
iterative hash function
incremental hash function
Hash function implementation
hash function construction
Educational institutions
Cryptography
biblio
Tutorial T4: All You Need to Know about Hardware Trojans and Counterfeit ICs
Submitted by BrandonB on Wed, 05/06/2015 - 10:35am
hardware-software codesign
Very large scale integration
vertical business model
Tutorials
Trojan horses
system integrity
original IC designs
life-critical systems
invasive software
integrated circuit testing
horizontal business model
Awards activities
Hardware Trojans
Hardware
electronic component supply chain
Educational institutions
counterfeit prevention
counterfeit IC
counterfeit electronic parts
counterfeit detection
Conferences
biblio
SkyTracer: Towards fine-grained identification for Skype traffic via sequence signatures
Submitted by BrandonB on Wed, 05/06/2015 - 10:08am
ISP
VoIP service
unique sequence signatures
transport protocols
telecommunication traffic
SkyTracer
Skype UDP flow
Skype
Sequence Signature
Protocols
Payloads
optimisation
network performance optimization
Accuracy
IP networks
Internet telephony
internet
information security
host level identification
Flow-level Identification
fine grained Skype traffic identification accuracy
Educational institutions
digital signatures
Correlation-based Approach
computer network performance evaluation
Complexity theory
biblio
Re-engineering Cybersecurity Education in the US: An Analysis of the Critical Factors
Submitted by BrandonB on Wed, 05/06/2015 - 9:48am
Industries
US government
student success factors
security of data
school programs
programmatic factors
NSA
NIST
NICE effort
National Security Agency
National Initiative for Cybersecurity Education
information security
CAE program
Government
Educational institutions
education systems
DHS
Department of Homeland Security
cybersecurity education re-engineering
cyber security professionals
critical factors analysis
computer security
computer science education
biblio
A Method of Evaluation for Insider Threat
Submitted by BrandonB on Wed, 05/06/2015 - 9:42am
pubcrawl
Analytical models
Cloud Computing
Computer crime
Computers
cyber security
Educational institutions
insider threat
insider threat analysis
insider threat evaluation
insider threat mitigation
Organizations
security of data
System Dynamic
vulnerability scanner
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »