Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Electronic mail
biblio
Implementation of Two Factor Authentication (2FA) and Hybrid Encryption to Reduce the Impact of Account Theft on Android-Based Instant Messaging (IM) Applications
Submitted by grigby1 on Thu, 01/28/2021 - 1:31pm
QR Code (4)
Instant messaging
Instant messaging (1)
instant messaging application security
message decryption process
message security
Metrics
pubcrawl
public key cryptography
implementation designs
QR code implementation
RSA 2048
Scalability
security
Servers
two factor authentication
two-factor authentication
Two-factor authentication (3)
Electronic mail
resilience
Resiliency
account theft
AES 128
android
android encryption
authentication
confidential messages
QR codes
electronic messaging
encryption
end-to-end encryption
Fingerprint (5)
Fingerprint recognition
Human behavior
hybrid encryption
Hybrid Encryption (2)
biblio
A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses
Submitted by grigby1 on Thu, 01/28/2021 - 1:13pm
Metrics
tools
stealthy attackers
Scalability
Resiliency
resilience
Reconnaissance
quantitative framework
pubcrawl
persistent cyber adversaries
passive reconnaissance techniques
Organizations
network reconnaissance capabilities
model reconnaissance
military computing
Network reconnaissance
Knowledge engineering
Human behavior
foothold
Electronic mail
defensive capabilities
deception-based defenses
cyber deception
critical capability
Computer worms
computer network security
Computer crime
Adversary Models
advanced adversaries
biblio
Attack Graph-Based Moving Target Defense in Software-Defined Networks
Submitted by aekwall on Mon, 01/25/2021 - 1:01pm
hierarchical attack graph
network configurations
Attack Path
attack graphs
adaptive defense services
advanced SDN technology
affordable defense services
Asset Criticality
attack graph-based MTD technique
attack path prediction
attack success probability
complex system operations
critical hosts
complex network
hierarchical attack graph model
highly exploitable hosts
interrupt attack execution
minimum MTD cost
MTD shuffling decisions
network address shuffling
potential attacker
proactive defense mechanism
proactive defense services
proactive/adaptive defense
SDN functionalities
composability
IP networks
telecommunication traffic
telecommunication security
security
attack surface
Protocols
Software
software defined networking
Electronic mail
Resiliency
pubcrawl
computer network security
graph theory
software-defined networking
network topology
Measurement
probability
control systems
Software-Defined Networks
moving target defense
target defense
Predictive Metrics
SDN controllers
biblio
Data-driven Stealthy Actuator Attack against Cyber-Physical Systems
Submitted by aekwall on Mon, 01/25/2021 - 12:54pm
actuators
stealthy attack
data-driven stealthy actuator attack
Data-Driven
cyber-physical system security
convex optimization problem
attack signal
arbitrary detectors
Technological innovation
Covariance matrices
convex programming
actuator security
computer network security
Metrics
detection rate
composability
pubcrawl
Human behavior
Resiliency
Electronic mail
cyber-physical systems
security
Detectors
biblio
Fuzzy-Import Hashing: A Malware Analysis Approach
Submitted by aekwall on Mon, 01/18/2021 - 11:25am
Import Hashing
Task Analysis
Scalability
Resiliency
Ransomware
pubcrawl
Metrics
Malware Analysis
invasive software
Attack Surfaces
fuzzy-import hashing
fuzzy set theory
Fuzzy Hashing
Fuzzy Cryptography
fuzzy c-means clustering
Electronic mail
Cryptography
counterfeit malware samples
biblio
Classification of Websites Based on the Content and Features of Sites in Onion Space
Submitted by grigby1 on Fri, 01/15/2021 - 12:23pm
feedback
website classification
Tor
text analysis methods
site features
site content
parsing sites
onion-sites
onion space
onion site classification
features of onion sites
Dark Net
categories of onion sites
analysis of onion sites
Human Factors
dark web
learning (artificial intelligence)
neural network training
Python
Uniform resource locators
Electronic mail
documentation
Web sites
feature extraction
neural nets
pattern classification
internet
Human behavior
pubcrawl
Neural networks
machine learning
Training
biblio
Computational Approaches to Detect Illicit Drug Ads and Find Vendor Communities Within Social Media Platforms
Submitted by aekwall on Mon, 01/11/2021 - 1:39pm
drugs
Text Mining
Opioid Abuse Epidemic
Illicit Drug Ads
Flickr
community detection
Bipartite graph
social media
Deterrence
Scalability
deep learning
machine learning
pubcrawl
Human behavior
Resiliency
Electronic mail
Support vector machines
biblio
Big Data Encryption Technology Based on ASCII And Application On Credit Supervision
Submitted by grigby1 on Mon, 12/28/2020 - 12:39pm
data utilization
user privacy
user payment information
Scalability
Resiliency
resilience
pubcrawl
Metrics
market supervision business
Licenses
Internet of Things
Human behavior
financial data processing
Electronic mail
electronic data interchange
Desensitization
Artificial Intelligence
data privacy
data leakage
Data Governance
data desensitization technology
Cryptography
Cross-Platform
credit supervision application
Credit Supervision
credit construction
Conferences
BIGDATA
big data privacy
Big Data encryption technology
Big Data
ASCII
biblio
Information security policy compliance: Investigating the role of intrinsic motivation towards policy compliance in the organization
Submitted by grigby1 on Fri, 11/20/2020 - 2:15pm
Mathematical model
variable perceived value congruence
Task Analysis
self-determination theory
Security policy compliant behaviour
Security Policies Analysis
security performance
security of data
Saudi Arabia
relatedness
pubcrawl
policy-based governance
Personnel
perceived value congruence
perceived legitimacy
organisational aspects
autonomy
ISP compliance intentions
intrinsic motivation
information security policy compliance
information security policy
information security
Human Factors
Fortune 600 organization
employees motivation
Electronic mail
Data models
computer security
competence
collaboration
behavioral research
biblio
Compositional Data Analysis with PLS-DA and Security Applications
Submitted by aekwall on Mon, 11/09/2020 - 1:13pm
Euclidean distance
Information Reuse and Security
spam filters
PLS-DA algorithm
partial least squares discriminant analysis
Least squares approximations
isometric log ratio transformation
information system security applications
ILR
data-based power transformation
data science models
compositional vectors
compositional data analysis
Compositional data
Aitchison transformation
Intrusion Detection
Loading
Compositionality
statistical analysis
data analysis
Mathematical model
spam filtering
unsolicited e-mail
standards
pubcrawl
Resiliency
Electronic mail
Data models
security of data
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »