Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Companies
biblio
Insider Threat Data Expansion Research using Hyperledger Fabric
Submitted by grigby1 on Fri, 08/25/2023 - 3:41pm
real-time systems
Insider Threat Dataset
Behavioral sciences
blockchains
Resiliency
Hyperledger Fabric
smart contract
Fabrics
distributed ledger
Policy Based Governance
smart contracts
insider threat
Companies
resilience
policy-based governance
Metrics
Human Factors
Human behavior
pubcrawl
blockchain
Insider Threats
biblio
Identity of Things (IDoT): A Preliminary Report on Identity Management Solutions for IoT Devices
Submitted by grigby1 on Thu, 08/17/2023 - 4:40pm
resource management
Identity of Things (IDoT)
Identity Management (IdM)
IAM
digital certificates
device identity
Device Certificates
Block Chain
Fog computing
Internet of Things (IoT)
IoT security
Public key
Internet of Things
edge computing
Companies
Computer crime
PKI
Identity management
Scalability
Resiliency
resilience
Human behavior
pubcrawl
security
biblio
Comparative Analysis of Password Storage Security using Double Secure Hash Algorithm
Submitted by grigby1 on Fri, 08/11/2023 - 1:53pm
Hash functions
password security
Message Digest (MD)
collision attack
Brute Force Attack
passwords
Spraying
Secure Hash Algorithm (SHA)
hash algorithms
Computer hacking
Force
Compositionality
Companies
Databases
Resiliency
resilience
pubcrawl
biblio
A Meta-Analysis of Efficient Countermeasures for Data Security
Submitted by grigby1 on Fri, 07/14/2023 - 10:48am
Training data
encryption audits
sensitive data
security risks
data attacks
threats
Resiliency
Data protection
renewable energy sources
feature extraction
Compositionality
Data Security
security vulnerabilities
Companies
resilience
Metrics
pubcrawl
machine learning algorithms
biblio
An Efficient Approach to Reduce the Encryption and Decryption Time Based on the Concept of Unique Values
Submitted by grigby1 on Thu, 07/13/2023 - 12:46pm
encryption
privacy
Computer hacking
pubcrawl
resilience
Resiliency
Companies
composability
Elliptic curve cryptography
data analysis
Technological innovation
Informatics
Homomorphic encryption
efficient encryption
hybrid encryption
uniqueness of values
biblio
Development of Cyber Attack Model for Private Network
Submitted by grigby1 on Fri, 06/09/2023 - 2:18pm
cyberattack
private network
network threat
LAN
firewalls
DMZ
cyber threat
Cyber Dependencies
Backdoor
Payload
Resiliency
honeypot
network vulnerabilities
cyber attack
Technological innovation
security
Python
Compositionality
malware
composability
Companies
Computational modeling
Scalability
resilience
Metrics
Human Factors
Human behavior
pubcrawl
Servers
biblio
Business Continuity & Disaster Recovery A simulation game for holistic cyber security education
Submitted by grigby1 on Fri, 06/09/2023 - 2:00pm
composability
Simulation Game
cyber security education
engineering education
policy governance
Human Factors
business continuity
cybersecurity education
resilience
Games
security
Companies
Computer crime
IT security
Scalability
Conferences
Resiliency
Human behavior
pubcrawl
biblio
Message Source Identification in Controller Area Network by Utilizing Diagnostic Communications and an Intrusion Detection System
Submitted by grigby1 on Fri, 05/12/2023 - 10:11am
Planning
Vehicular and wireless technologies
Vehicle configuration identification
Topology
Source identification
security
Resiliency
resilience
Regulation
pubcrawl
CAN Intrusion Detection System
network topology
Intrusion Detection
Human Factors
Human behavior
Diagnostic communication
Controller area network (CAN)
controller area network
Companies
biblio
An LSTM-based Intent Detector for Conversational Recommender Systems
Submitted by grigby1 on Fri, 05/12/2023 - 10:07am
machine learning
Neural networks
pubcrawl
Human behavior
Metrics
Scalability
Companies
Detectors
Natural languages
recommender systems
conversational agents
Vehicular and wireless technologies
Conversational recommendation
Intent detection
biblio
Diverse Approaches Have Been Presented To Mitigate SQL Injection Attack, But It Is Still Alive: A Review
Submitted by grigby1 on Thu, 05/11/2023 - 4:47pm
malicious code
SQLIA
SQL injection attack
review
Resiliency
Mobile Security
command injection attacks
web security
Government
SQL injection
Market research
machine learning
Cybersecurity
Vulnerability
Structured Query Language
application security
Data Security
composability
Companies
resilience
Metrics
pubcrawl
1
2
3
4
5
6
7
8
9
…
next ›
last »