Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
blockchain security
biblio
A Multi-Layered Network Model for Blockchain Based Security Surveillance system
Submitted by grigby1 on Tue, 02/23/2021 - 2:25pm
Multi -layer Network Model
surveillance systems
surveillance
sensors
Sensor Systems
security
resilience
pubcrawl
Peer-to-peer computing
network accountability
peer to peer security
distributed ledger
composability
blockchain security
blockchain
Human Factors
Metrics
Resiliency
Scalability
biblio
Access Control for Electronic Health Records with Hybrid Blockchain-Edge Architecture
Submitted by aekwall on Mon, 09/28/2020 - 11:42am
medical information systems
off-chain edge nodes
hyperledger composer fabric blockchain
hybrid blockchain-edge architecture
hybrid architecture
global electronic health record market
EHR privacy
EHR data management
blockchain-based controller
blockchain-based access control logs
access control policies
Access Control List
distributed ledger
transaction processing
Fabrics
edge computing
Scalability
health care
blockchain security
hyperledger
smart contracts
Distributed databases
smart contract
blockchain
pubcrawl
Resiliency
computer architecture
Medical services
data privacy
Access Control
authorisation
attribute-based access control
biblio
Energy Data Security and Multi-Source Coordination Mechanism Based on Blockchain
Submitted by aekwall on Mon, 09/28/2020 - 11:42am
blockchain-based energy data supervision
transaction model
summary directory tree
multisource synergy mechanism
multisource coordination mechanism
multisource collaboration
multi-source collaboration
internet technology
energy industry
energy data security
consensus mechanism
clean energy
Scalability
blockchain security
blockchain technology
power system security
power engineering computing
Distributed databases
internet
pubcrawl
Resiliency
Data Security
Cryptography
biblio
A Security Reference Architecture for Blockchains
Submitted by aekwall on Mon, 09/28/2020 - 11:42am
ISO standards
threat-risk assessment
surveys and tutorials
security reference architecture
operational security issues
layered systems
ISO/IEC 15408
reference architecture
blockchain security
security countermeasures
consensus protocol
security of data
IEC standards
security vulnerabilities
risk management
blockchain
Cryptography
Peer-to-peer computing
Routing
pubcrawl
Resiliency
Scalability
biblio
Traceability in Permissioned Blockchain
Submitted by aekwall on Mon, 09/28/2020 - 11:41am
Scalability
encryption
Resiliency
pubcrawl
bitcoin
blockchain
cryptocurrencies
blockchain security
fully homomorphic encryption
Traceability
Hidden Markov models
zero knowledge proof
permissioned blockchain
hidden Markov model
permissionless blockchain
biblio
Security Management and Visualization in a Blockchain-based Collaborative Defense
Submitted by aekwall on Mon, 09/28/2020 - 11:41am
Ethereum blockchain
security management dashboard
realworld defense systems
defense alliance
DDoS threat
DDoS defense system
cooperative network defense
BloSS
blockchain-based collaborative defense
blockchain signaling system
attack information
autonomous system
denial-of-service attacks
cyber security analysts
network defense
Computer crime
groupware
visualization
data visualisation
Data visualization
blockchain security
collaboration
blockchain
pubcrawl
Resiliency
DDoS Attacks
telecommunication security
Cryptography
Scalability
ddos mitigation
biblio
Contract-Based Approach for Security Deposit in Blockchain Networks with Shards
Submitted by aekwall on Mon, 09/28/2020 - 11:41am
Economics
Sharding
security-deposit based consensus protocol
security of data
security incentive
security deposit
Scalability
Resiliency
pubcrawl
individual rationality
incentive compatibility
hash-puzzle-solving consensus protocol
flexible deposits
beacon chain
economic incentive
Cryptographic Protocols
cryptocurrencies
contracts
contract-based approach
contract theory
consensus protocol
blockchain security
blockchain networks
blockchain
bitcoin
biblio
CoDAG: An Efficient and Compacted DAG-Based Blockchain Protocol
Submitted by aekwall on Mon, 09/28/2020 - 11:41am
transaction processing
transaction verification time
transaction demand
linear structure
directed graphs
directed acyclic graph structure
directed acyclic graph
decentralized characteristic
compacted directed acyclic graph
compacted DAG structure
CoDAG
blockchain protocol
navigation
Scalability
electronic money
Throughput
blockchain security
blockchain platforms
ethereum
blockchain
bitcoin
pubcrawl
Resiliency
Protocols
Cryptography
biblio
Effective Scheme against 51% Attack on Proof-of-Work Blockchain with History Weighted Information
Submitted by aekwall on Mon, 09/28/2020 - 11:41am
blockchain security
proof-of-work blockchain
PoW blockchains
mining
history weighted information
hash power
double-spending problems
double-spending attack
Double spending attack
blockchain systems
51% Attack
Switches
security of data
cryptocurrencies
Data mining
blockchain
Cryptography
Peer-to-peer computing
pubcrawl
Resiliency
Protocols
History
Cryptographic Protocols
Scalability
biblio
Air Gapped Wallet Schemes and Private Key Leakage in Permissioned Blockchain Platforms
Submitted by grigby1 on Fri, 08/07/2020 - 3:37pm
permissioned blockchain
Markov
Markov model
Markov processes
mathematical analysis
Mathematical model
Media
Metrics
outline justification
malware
permissioned blockchain platforms
private key leakage
Private Key Storage
pubcrawl
resilience
Resiliency
Scalability
security
composability
Air Gapped Wallet
air gapped wallet schemes
Air gaps
Atmospheric modeling
attack surface
blockchain
blockchain security
Channel Exfiltration
Air Gapped Storage
cryptocurrencies
data privacy
Distributed databases
Electromagnetics
Human behavior
Human Factors
key extraction
1
2
3
4
5
next ›
last »