Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Costs
biblio
Representation Learning with Function Call Graph Transformations for Malware Open Set Recognition
Submitted by grigby1 on Mon, 09/18/2023 - 4:34pm
malware
self-supervised learning
open set recognition
Resiliency Coordinator
representation learning
Costs
Malware Analysis
malware classification
graph theory
Task Analysis
Training
privacy
Resiliency
resilience
Metrics
Human behavior
pubcrawl
Neural networks
security
biblio
Analysis of the Optimized KNN Algorithm for the Data Security of DR Service
Submitted by grigby1 on Fri, 09/08/2023 - 4:17pm
Compositionality
smart energy
IoT device
supply and demand
Costs
system integration
Memory
supervised learning
Internet-scale Computing Security
demand response
denial-of-service attack
KNN
Cloud Computing
composability
information security
Scalability
Resiliency
resilience
collaboration
policy-based governance
Metrics
Human Factors
Human behavior
pubcrawl
biblio
Drone Forensics: A Case Study on DJI Mavic Air 2
Submitted by grigby1 on Fri, 09/01/2023 - 3:19pm
information forensics
Mavic Air 2
Drone Forensics
DJI
autonomous aerial vehicles
unmanned aerial vehicle
Human Factors
Costs
FTP
Communications technology
pubcrawl
Digital Forensics
Floods
Protocols
Scalability
performance evaluation
Resiliency
resilience
Metrics
Human behavior
biblio
Cloud Security Analysis Based on Virtualization Technology
Submitted by grigby1 on Fri, 09/01/2023 - 2:49pm
network security
Virtualized cloud security
Information Reuse
Costs
cloud services
Trusted Computing
cloud computing security
Compositionality
Dynamic scheduling
security
composability
Computers
Hardware
Software
Resiliency
resilience
pubcrawl
biblio
Insider Attack Detection and Prevention using Server Authentication using Elgamal Encryption
Submitted by grigby1 on Fri, 08/25/2023 - 3:42pm
Protocols
Two way authentication
secure authentication
legitimate node
insider attacks
ElGamal encryption
passwords
location awareness
Costs
Resiliency
Elliptic curve cryptography
Policy Based Governance
insider threat
web services
Cryptography
authentication
resilience
policy-based governance
Metrics
Human Factors
Human behavior
pubcrawl
Insider Threats
biblio
Automating Safety and Security Risk Assessment in Industrial Control Systems: Challenges and Constraints
Submitted by grigby1 on Thu, 08/24/2023 - 3:00pm
risk management
security
pubcrawl
resilience
Resiliency
Scalability
industrial control
industrial control system
information technology
control systems
Safety
risk assessment
automation
Industrial Control Systems
Hazards
Costs
biblio
Cost-Efficient Network Protection Games Against Uncertain Types of Cyber-Attackers
Submitted by grigby1 on Fri, 08/04/2023 - 11:16am
security
pubcrawl
Human behavior
Human Factors
Metrics
Scalability
Games
Nash Equilibrium
Bayes methods
heterogeneous networks
Costs
Bayesian game
game theoretic security
US Department of Homeland Security
network protection
non-zero-sum game
biblio
A Study on Fuzzy Keywords Search Techniques and Incorporating Certificateless Cryptography
Submitted by grigby1 on Mon, 07/31/2023 - 1:26pm
encryption
Cloud Computing
Servers
pubcrawl
Metrics
resilience
Resiliency
Scalability
authentication
maintenance engineering
Keyword search
searchable encryption
Costs
Fuzzy Cryptography
CertificateLess cryptography
Fuzzy keyword search techniques
biblio
A Fuzzy Multi-Identity Based Signature
Submitted by grigby1 on Mon, 07/31/2023 - 1:24pm
pubcrawl
Metrics
resilience
Resiliency
Scalability
authentication
Big Data
public key cryptography
digital signatures
Costs
Fuzzy Cryptography
CDH assumption
Existentially Unforgeable
Fuzzy Identity-based Signature
Multi-Identity
biblio
ZeeStar: Private Smart Contracts by Homomorphic Encryption and Zero-knowledge Proofs
Submitted by grigby1 on Thu, 07/20/2023 - 4:16pm
ethereum
zero-knowledge proofs
Programming Language
compilation
Homomorphic encryption
blockchains
Costs
annotations
Resiliency
expert systems
blockchain
smart contracts
encoding
data privacy
privacy
Scalability
resilience
Human behavior
pubcrawl
1
2
3
4
5
6
7
8
9
…
next ›
last »