Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Internet security
biblio
Chaos based Combined Multiple Recursive KEY Generator for Crypto-Systems
Submitted by grigby1 on Wed, 12/27/2017 - 12:56pm
cryptosystems
Resiliency
pubcrawl
Plain Text
Metrics
Internet usage
Internet security
internet
information security
Generators
Encryption technique
encryption
Decryption Technique
chaos
Cryptography
composability
communication channel threats
combined multiple recursive generator
CMRG
Ciphers
cipher text
chaotic cryptography
chaotic communication
chaos theory
Chaos Function
chaos based combined multiple recursive KEY generator
biblio
Gamification of internet security by next generation CAPTCHAs
Submitted by grigby1 on Wed, 12/20/2017 - 1:03pm
Human behavior
Turing tests
pubcrawl
Pattern recognition
Next generation networking
machine learning algorithms
Internet security
Informatics
Human Factors
human beings
attacks
Gamification
Games
computer security
composability
captchas
CAPTCHA
bots
Birds
biblio
Detecting mobile botnets through machine learning and system calls analysis
Submitted by grigby1 on Mon, 12/04/2017 - 12:57pm
malware
threat minimization
system call analysis
statistical feature extraction
statistical analysis
self-generated dataset
Resiliency
pubcrawl
pattern detection
Monitoring
Mobile handsets
mobile environment
mobile computing
Mobile communication
mobile botnet detection
Metrics
anomalous behavior identification
machine learning algorithms
machine learning
legitimate application
learning (artificial intelligence)
invasive software
Internet security
internet
host-based approach
feature extraction
desktop domain
computer network security
Compositionality
close-to-reality scenario
botnets
anomaly-based approach
biblio
User Disbelief in Privacy Paradox: Heuristics That Determine Disclosure
Submitted by grigby1 on Fri, 11/03/2017 - 11:24am
cognitive heuristics
information disclosure
Internet security
predictability
privacy
privacy paradox
pubcrawl
Resiliency
Scalability
Security Heuristics
biblio
A Survey on Zero-Day Polymorphic Worm Detection Techniques
Submitted by BrandonB on Wed, 05/06/2015 - 2:58pm
payload encryption
zero-day polymorphic worm detection techniques
zero-day malware
Zero-day attacks
Vectors
signature-based defenses
Signature Generation
security layers
Polymorphic worms
Payloads
detection systems
Monitoring
malware
key per infection
invasive software
Internet security
internet
Grippers
Fingerprinting
biblio
A support middleware solution for e-healthcare system security
Submitted by BrandonB on Wed, 05/06/2015 - 2:10pm
Logic gates
wireless sensor networks
system security
support middleware solution
security vulnerabilities
security of data
patient information security
patient information privacy
network security
middleware
Medical services
medical administrative data processing
masquerade attack
authentication
Internet security
information sharing
health care-specific security standards
health care organizations
health care
electronic health care
e-Healthcare
e-health care system security
Data Security
data privacy
data integrity
Communication system security
biblio
SharkFin: Spatio-temporal mining of software adoption and penetration
Submitted by tdumitra on Fri, 01/09/2015 - 9:35pm
data analysis
Empirical Models for Vulnerability Exploits
Internet security
Jan'15
Malware propagation
Metrics
UMD
Metrics
UMD
Empirical Models for Vulnerability Exploits
UMD PROJECTS:
Jan'15
Empirical Models for Vulnerability Exploits
« first
‹ previous
1
2
3