Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computer hacking
biblio
Comparative Analysis of Password Storage Security using Double Secure Hash Algorithm
Submitted by grigby1 on Fri, 08/11/2023 - 1:53pm
Hash functions
password security
Message Digest (MD)
collision attack
Brute Force Attack
passwords
Spraying
Secure Hash Algorithm (SHA)
hash algorithms
Computer hacking
Force
Compositionality
Companies
Databases
Resiliency
resilience
pubcrawl
biblio
A Safe Approach to Sensitive Dropout Data Collection Systems by Utilizing Homomorphic Encryption
Submitted by grigby1 on Fri, 08/11/2023 - 11:33am
sensitive data
Dropout
Homomorphic encryption
Technological innovation
data leakage
Manuals
Databases
data privacy
Scalability
Computer hacking
Resiliency
resilience
Metrics
Human Factors
Human behavior
pubcrawl
Data collection
biblio
More Efficient Data Security by DEVELOINV AES Hybrid Algorithm
Submitted by grigby1 on Fri, 07/14/2023 - 10:48am
encryption
Computer hacking
information security
pubcrawl
Metrics
resilience
Safety
Data Security
Compositionality
Transportation
Data protection
Resiliency
encryption audits
biblio
An Efficient Approach to Reduce the Encryption and Decryption Time Based on the Concept of Unique Values
Submitted by grigby1 on Thu, 07/13/2023 - 12:46pm
encryption
privacy
Computer hacking
pubcrawl
resilience
Resiliency
Companies
composability
Elliptic curve cryptography
data analysis
Technological innovation
Informatics
Homomorphic encryption
efficient encryption
hybrid encryption
uniqueness of values
biblio
Topic Modeling for Cyber Threat Intelligence (CTI)
Submitted by grigby1 on Fri, 04/28/2023 - 3:51pm
cyber threat intelligence
threat recommendation
Maryam
application security
electronic commerce
topic modeling
OWASP
computational intelligence
Informatics
Cryptography
natural language processing
Compositionality
composability
Computational modeling
pubcrawl
security
Computer hacking
biblio
A Study on Brute Force Attack on T-Mobile Leading to SIM-Hijacking and Identity-Theft
Submitted by grigby1 on Fri, 04/14/2023 - 4:08pm
Systems architecture
tunneling
T-Mobile
SSH tunneling
SIM Hijacking
Scanning and Enumeration
identity theft
passwords
brute force attacks
Brute force
collaboration
cyber attack
Force
Data Breach
Databases
policy-based governance
Human Factors
Human behavior
pubcrawl
Computer hacking
biblio
Investigating Novel Approaches to Defend Software Supply Chain Attacks
Submitted by grigby1 on Fri, 04/14/2023 - 4:04pm
Computer hacking
Organizations
pubcrawl
resilience
Conferences
Software
Scalability
Cybersecurity
Resistance
supply chains
software security
Chained Attacks
Resiliency
codes
software reusability
Software Supply Chain Attacks
biblio
Intrinsic Decision based Situation Reaction CAPTCHA for Better Turing Test
Submitted by grigby1 on Fri, 04/14/2023 - 3:57pm
captchas
Turing test
Reaction Test
Hard AI Problem
bots
Text recognition
game theory
web security
CAPTCHA
Computer hacking
Web servers
chatbots
Web pages
Games
composability
Computers
Human behavior
pubcrawl
biblio
A Robust Captcha Scheme for Web Security
Submitted by grigby1 on Fri, 04/14/2023 - 3:56pm
web security
Synthetic artifacts
Rotation
optical character recognition
OCR
CAPTCHA attacks
Bot
Text recognition
Web and internet services
Computer hacking
CAPTCHA
captchas
Interference
Three-dimensional displays
Streaming media
composability
Human behavior
pubcrawl
biblio
Traitor Tracing in Broadcast Encryption using Vector Keys
Submitted by aekwall on Fri, 03/31/2023 - 9:38am
Resistance
black box encryption
Traitor Tracing (TT)
Pirate decoder (PD)
Key Generation Center (KGC)
Closed box
Broadcast Encryption (BE)
BlackBox Approach
Decoding
data communication
Computational efficiency
composability
Resiliency
Metrics
pubcrawl
encryption
Computer hacking
1
2
3
4
5
6
7
8
9
next ›
last »