Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Servers
biblio
Improving student learning performance in a virtual hands-on lab system in cybersecurity education
Submitted by grigby1 on Wed, 11/04/2020 - 12:58pm
computer aided instruction
computer science education
computer security
cyber physical systems
cybersecurity education
education
educational courses
Informatics
lab tasks
learning activities
learning activity
learning outcomes
learning performance
Logic gates
privacy
professional aspects
pubcrawl
reading lab materials
security of data
Servers
student learning performance
Task Analysis
virtual hands-on lab system
biblio
Chronos: Secure and Accurate Time-Stamping Scheme for Digital Files via Blockchain
Submitted by grigby1 on Mon, 11/02/2020 - 11:30am
bitcoin
blockchain
blockchain-based storage
blockchain-based time-stamping scheme
chain quality
Chronos
Cloud Computing
composability
Cryptography
digital files
digital investigations
earliest creation time
file protection
industrial property
intellectual property security
intellectual property systems
patentable ideas
patents
policy-based governance
pubcrawl
resilience
Resiliency
Resistance
secure time-stamping schemes
Servers
time interval
biblio
Cyber security issues of Internet of electric vehicles
Submitted by grigby1 on Mon, 11/02/2020 - 11:11am
5G
batteries
battery limit
Charging stations
connected vehicles
cyber security issues
Electric Vehicles
electrical vehicle communication
energy conservation
energy consumption
Energy Efficiency
environmental benefits
Human Factors
Infrastructure
Intelligent Transportation Systems
internet
Internet information exhange
Internet of electric vehicles
Internet of Things
Internet of Vehicles
IoEV
Metrics
MFemtocell
pubcrawl
resilience
Resiliency
Roads
security
security of data
sensors
Servers
biblio
Real-time Processing and Storage of Multimedia Data with Content Delivery Network in Vehicle Monitoring System
Submitted by grigby1 on Mon, 11/02/2020 - 11:10am
Big Data
Big Data curation
CDN
content delivery network
DASH
hidden trouble
Human Factors
Internet of Things
Internet of Vehicle
Internet of Vehicles
Logistics
Media
Metrics
Monitoring
MPD files
MPEG-DASH standard
multimedia computing
multimedia data storage
pubcrawl
real-time processing
real-time systems
real-time vehicle monitoring system
resilience
Resiliency
Servers
Streaming media
vehicle monitoring system
vehicular ad hoc networks
video streaming
Videos
biblio
Public String Based Threshold Cryptography (PSTC) for Mobile Ad Hoc Networks (MANET)
Submitted by grigby1 on Thu, 10/29/2020 - 10:57am
ad hoc network
Compositionality
data privacy
default threshold value
denial of service
denial-of-service attack
MANET
manet privacy
message privacy
Metrics
mobile ad hoc network
mobile ad hoc networks
PSTC
pubcrawl
Public key
public key cryptography
public string based threshold cryptography
Receivers
resilience
Resiliency
robust cryptography scheme
Servers
space analysis
telecommunication security
threshold cryptography
time analysis
trust value
wireless technology
biblio
Evolutionary Computation for Improving Malware Analysis
Submitted by aekwall on Mon, 10/26/2020 - 11:13am
Servers
malware
security
invasive software
Resiliency
Human behavior
pubcrawl
Metrics
tools
privacy
software maintenance
genetic algorithms
Malware Analysis
malware samples
program debugging
Predictive Metrics
malicious software
evolutionary computation
Genetics
benign software
automated malware analysis
automated repair
genetic improvement
GI-based approach
GI-based bug repair
individual software artifacts
malicious code
software improvement
variable-strength covering arrays
biblio
A Demonstration of Privacy-Preserving Aggregate Queries for Optimal Location Selection
Submitted by aekwall on Mon, 10/26/2020 - 10:54am
sensitive data
privacy-preserving aggregate queries
privacy preserving solutions
partially homomorphic cryptosystem
optimal location selection
mobile operators
location-based queries
enormous extent
demonstration
collected location data
mobile phones
organization
Aggregates
location information
private data
Homomorphic encryption
Compositionality
service providers
Business
query processing
Metrics
privacy
pubcrawl
Human behavior
Resiliency
mobile computing
Protocols
Cryptographic Protocols
security
data privacy
encryption
Servers
vertical businesses
wireless services
Location Privacy in Wireless Networks
biblio
A Dynamic Security Control Architecture for Industrial Cyber-Physical System
Submitted by grigby1 on Fri, 10/16/2020 - 10:31am
composability
Resiliency
cyber-physical system security
trusted platform modules
Anomaly Detection
control system security
control systems
Cryptography
data fusion
dynamic security control architecture
dynamic security control strategy
Dynamic strategy
firewalls
Firewalls (computing)
hardware encryption
ICs
industrial control
industrial control system
Industrial Control Systems
industrial cyber-physical system
information security
information security requirements
internal fire control wall
intrusion detection system
linkage verification
Protocols
pubcrawl
resilience
Scalability
secure industrial control information security system
Servers
Trusted Computing
trusted connection server
Trusted Platform Module
biblio
SMSBotHunter: A Novel Anomaly Detection Technique to Detect SMS Botnets
Submitted by aekwall on Mon, 10/12/2020 - 10:43am
botnet
Servers
malware
invasive software
mobile computing
feature extraction
Human behavior
pubcrawl
Mobile handsets
Cryptography
internet
Training
electronic messaging
Anomaly Detection
anomaly detection technique
dynamic analysis
SMS messages
detect SMS botnets
mobile botnets
one-class classification
SMS botnet
SMS spammer botnets
SMS stealer botnets
SMSBotHunter
Human Behavior and Cybersecurity
biblio
Empirical Validation of System Dynamics Cyber Security Models
Submitted by aekwall on Mon, 10/12/2020 - 10:37am
False Data Detection
Computational modeling
computer security
continuous simulation
cyber security
cyber security modeling
cyber-attacks/defenses
empirical behavior test
empirical structural test
empirical validation
Expert Systems and Security
Human behavior
Mathematical model
model builder
model structure
Numerical models
pubcrawl
Resiliency
Scalability
security of data
Servers
simulation and modeling
standards
System Dynamics
system dynamics cyber security models
system dynamics model validation
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »