Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Electronic mail
biblio
A Secure Multi-party Computation Protocol Combines Pederson Commitment with Schnorr Signature for Blockchain
Submitted by grigby1 on Thu, 05/13/2021 - 12:10pm
anonymous messaging
blockchain
contracts
data privacy
Electronic mail
privacy
privacy computing
Protocols
pubcrawl
Public key
resilience
Resiliency
secure multi-party computation
zero-knowledge proof
biblio
Who Would Bob Blame? Factors in Blame Attribution in Cyberattacks Among the Non-Adopting Population in the Context of 2FA
Submitted by aekwall on Thu, 05/13/2021 - 11:49am
Electronic mail
Human behavior
pubcrawl
composability
Metrics
Sociology
Statistics
Cybersecurity
Companies
computer security
attribution
Biological system modeling
Blame Attribution
risk communication
biblio
Vision: Shred If Insecure – Persuasive Message Design as a Lesson and Alternative to Previous Approaches to Usable Secure Email Interfaces
Submitted by aekwall on Tue, 04/27/2021 - 1:33pm
Scalability
encryption
security
Electronic mail
Resiliency
pubcrawl
Cryptography
tools
usability
Phishing
Security Heuristics
predictability
usable secure email
user interface design
biblio
Assessing Anomaly-Based Intrusion Detection Configurations for Industrial Control Systems
Submitted by grigby1 on Tue, 03/30/2021 - 11:52am
information technology network
Scalability
risk quantification
Resiliency
resilience
pubcrawl
production engineering computing
Production
operational technology systems
maintenance engineering
maintenance
Local area networks
Intrusion Detection Systems
Intrusion Detection
integrated circuits
anomaly-based intrusion detection configurations
Industrial Control Systems
industrial control
ICS Anomaly Detection
ICs
Government
full-scale ICS test bed
Ethernet based interconnections
Electronic mail
cost reduction
control engineering computing
computer network security
Assessment
anomaly-based network IDS settings
biblio
Making Encryption Feel Secure: Investigating how Descriptions of Encryption Impact Perceived Security
Submitted by grigby1 on Mon, 03/29/2021 - 1:15pm
privacy
user interface management systems
user interface design
user experience
usable security and privacy
tools
security perceptions
Scalability
pubcrawl
Protocols
cognitive science
Perceived security
Human Factors
human computer interaction
expert systems
ethical concerns
ethical aspects
encryption
Electronic mail
Cryptography
biblio
Increasing Participation and Security in Student Elections through Online Voting: The Case of Kabarak University
Submitted by grigby1 on Tue, 03/09/2021 - 3:04pm
online access
voting processes
three factor authentication
testing
student elections management
security
secure online voting system
Scalability
resultant system
Resiliency
resilience
pubcrawl
politics
password
Participation
online voting
authentication
offline electronic voting system
Mobile handsets
Metrics
Kabarak University
internet
Human behavior
further education
Electronic voting systems
electronic voting
Electronic mail
Educational institutions
e-voting systems
Dynamic Systems Development Methodology (DSDM)
campus hall voting
BIOS
biblio
Evaluation of Security and Performance of Master Node Protocol in the Bitcoin Peer-to-Peer Network
Submitted by grigby1 on Tue, 03/09/2021 - 2:48pm
electronic money
telecommunication network topology
security
pubcrawl
proximity-aware extensions
Protocols
propagation delay
physical topology
Peer-to-peer computing
named Master Node
Master Node protocol
logical neighbors
information propagation delay
Human behavior
peer to peer security
Electronic mail
delays
delay overhead
current Bitcoin protocol
clustering
Bitcoin peer-to-peer network
Bitcoin network
bitcoin
Human Factors
Metrics
Resiliency
Scalability
biblio
Can We Predict the Quality of Spectrum-based Fault Localization?
Submitted by aekwall on Mon, 03/01/2021 - 4:47pm
fault diagnosis
work factor metrics
static test suite
static test metrics
spectrum-based fault localization
prediction model
potential effectiveness
fault-related metrics
fault localization techniques
fault localization effectiveness
effective fault localization
dynamic test suite
dynamic test metrics
debugging
automated fault localization
Scalability
Couplings
software fault tolerance
software metrics
program debugging
Predictive models
Complexity theory
Measurement
machine learning
program testing
tools
Metrics
pubcrawl
Resiliency
Electronic mail
biblio
Random Bit Generator Mechanism Based on Elliptic Curves and Secure Hash Function
Submitted by aekwall on Mon, 02/15/2021 - 4:57pm
NIST
unpredictability properties
statistical testing
security strengths
secure hash function
Scalability
Resiliency
random number generation
random bit generator mechanism
Random Bit Generator
public key cryptography
pubcrawl
pseudorandom bit generators
pseudorandom bit generator mechanism
cryptographic hash functions
Metrics
Hash Function
hard number theoretic problems
Generators
encryption
Elliptic curves
elliptic curve discrete logarithm problem
Elliptic curve cryptography
Electronic mail
derivation function
decryption
cryptographic tasks
biblio
Preventive Techniques of Phishing Attacks in Networks
Submitted by grigby1 on Wed, 02/03/2021 - 2:02pm
malware
Web sites
spam
social engineering
security threats
Scalability
Resiliency
resilience
pubcrawl
phishing attack preventive techniques
Phishing
online businesses
online applications
network security
Anti-phishing
machine learning
internet
information technology
information security
Human Factors
Human behavior
honey pots
Honey Pot
fake Websites
fake applications
Electronic mail
e-hunting websites
Computer crime
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »