Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security requirements
biblio
Secure Storage System Using Cryptographic Techniques
Submitted by grigby1 on Fri, 04/14/2023 - 4:08pm
denial of service attack
random password
honey encryption
Brute Force Attack
passwords
brute force attacks
user interfaces
storage system
DoS
hashing
Force
encryption
real-time systems
security requirements
Databases
internet
policy-based governance
Human Factors
Human behavior
pubcrawl
collaboration
biblio
Critical Infrastructure Protection and Supply Chain Risk Management
Submitted by grigby1 on Thu, 01/05/2023 - 2:27pm
critical infrastructure
risk management
pubcrawl
resilience
Resiliency
Conferences
Computer crime
security requirements
Cybersecurity
requirements engineering
supply chains
Ransomware
Critical Infrastructure Protection
supply chain risk management
supply chain security
biblio
Anonymous Authentication Protocol for Efficient Communications in Vehicle to Grid Networks
Submitted by aekwall on Fri, 02/04/2022 - 10:31am
attacks
Repudiation
X.509 PKI
Vehicle-to-grid
Vehicle to Grid
security requirements
ISO standards
ISO 15118 Standard
data integrity
simulation
composability
Human behavior
Resiliency
Metrics
pubcrawl
Protocols
authentication
Computational modeling
biblio
Performance Analysis on Enhanced Round Function of SIMECK Block Cipher
Submitted by grigby1 on Tue, 03/09/2021 - 2:39pm
enhanced round function
policy-based governance
Human Factors
security measurements
Performance analysis
lightweight block ciphers
security requirements
resource-constrained devices
Internet of Things technologies
security level
algorithm design
enhanced ARX structure
Cryptography
LBC
IoT
encryption time
SIMON
SIMECK family block cipher
avalanche effect
Brute-force Attack
brute force attacks
software performance evaluation
Internet of Things
biblio
Security Requirements for Cloud-based C4I Security Architecture
Submitted by grigby1 on Fri, 11/20/2020 - 2:25pm
national innovation
US military
Task Analysis
Servers
security vulnerabilities
security requirements
Security Policies Analysis
security of data
secure security architecture
public sector
pubcrawl
policy-based governance
Cloud Computing
national defense command control system
military computing
Korea national defense information system
Korea Military
Information systems
computer security
command and control systems
Cloud-based C4I Security Requirements
cloud-based C4I security architecture
cloud computing technology
cloud computing system
biblio
A Reliable Ring Analysis Engine for Establishment of Multi-Level Security Management in Clouds
Submitted by grigby1 on Fri, 11/20/2020 - 2:14pm
ring analysis engine
trust boundaries
syntactic analysis
structural index
service provider
Semantics
Semantic Mapping
semantic analysis
security requirements
Security Policies Analysis
security of data
security mechanism
security management
security levels
security
Cloud Computing
Reliability
pubcrawl
Protocols
policy-based governance
policy management framework
Policy Management
multilevel security management
mapping process
indexing
Indexes
index-based engine
Engines
collaboration
cloud customers
biblio
OWASP Risk Analysis Driven Security Requirements Specification for Secure Android Mobile Software Development
Submitted by grigby1 on Tue, 11/17/2020 - 2:41pm
OWASP
access sensitive information
Android development
data leaks
defensive requirements analysis
development lifecycle
development stage
guided security requirement analysis
Mobile Apps
mobile apps flaws
mobile software engineers
necessary security knowledge
information confidentiality
OWASP mobile top ten risks
OWASP risk analysis driven security requirements specification
secure Android mobile software development
secure mobile SDLC
secure mobile software development education
security defects open doors
security requirements
software developers
useful mobile security guidelines
Operating systems security
software engineering
security
pubcrawl
Metrics
Resiliency
data integrity
security threats
composability
mobile computing
smart phones
malware
software development management
security of data
security vulnerabilities
SDLC
risk analysis
resilience
testing
Detectors
Mobile Applications
Banking
Android (operating system)
security holes
biblio
Challenges and prospects of communication security in real-time ethernet automation systems
Submitted by aekwall on Mon, 11/09/2020 - 1:13pm
industrial control
Information Reuse and Security
real-time Ethernet automation systems
PROFINET
open systems
automation-friendly security solution
operational technology
communication security
Compositionality
security requirements
information technology
computer network security
Local area networks
security architecture
automation
standards
pubcrawl
Resiliency
Industrial Control Systems
real-time systems
Protocols
security
biblio
Cognitive Internet of Vehicles: Motivation, Layered Architecture and Security Issues
Submitted by aekwall on Mon, 10/19/2020 - 11:46am
cutting-edge technologies
Internet of Vehicles
cyber physical systems
technological advancements
cyber-physical impact
automobile scenario
automotive
automotive ecosystem
CIoV
cloud-based artificial intelligence
Cognitive Internet of Vehicles
communication field
vehicles
industrial revolution
industrial revolution 4.0
Intelligent Transportation System
Intelligent Transportation System concept
layer abstractions
local network
prime security
smart decision
technological evolution
ubiquitous 5G mobile network
Transportation
Cloud Computing
data privacy
security
computer architecture
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
Metrics
internet
Data processing
security of data
sensors
layered architecture
edge computing
next generation networks
Human Factors
security issues
security requirements
Artificial Intelligence
ubiquitous computing
privacy issues
biblio
Inclusive Security Models To Building E-Government Trust
Submitted by grigby1 on Fri, 10/16/2020 - 11:14am
nonrepudiation properties
trusted security solution
Trusted Computing
trust of government
trust
security threats
security requirements
security perspective
Resiliency
resilience
pubcrawl
Privacy Requirements
privacy relationships
privacy properties
privacy
policy-based governance
Access Control
message authentication
internet
inclusive security model
inclusive security
Human behavior
government data processing
e-government trust
E-Government
e-gov
data privacy
Cybersecurity
collaboration
authorization
authorisation
authentication
1
2
3
4
5
next ›
last »