Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Security Evaluation
biblio
An Evaluation of the Security of the Bitcoin Peer-To-Peer Network
Submitted by
grigby1
on Tue, 11/26/2019 - 2:38pm
bitcoin
bitcoin core software
bitcoin message exchanges
bitcoin mining process
Bitcoin peer-to-peer network
blockchain
Computer crime
computer network security
cryptocurrencies
Cryptographic Protocols
Data mining
DDoS Attacks
denial of service
distributed denial of service attacks
Human behavior
human factor
Human Factors
Metrics
network message exchanges
network protocol
P2P network
peer to peer security
Peer-to-peer computing
Protocols
pubcrawl
resilience
Resiliency
Scalability
Security Evaluation
service attacks
Software
transaction confirmation process
biblio
A Proposed Security Evaluator for Cryptosystem Based on Information Theory and Triangular Game
Submitted by
grigby1
on Mon, 05/20/2019 - 3:29pm
Ciphers
collaboration
composability
Cryptography
cryptosystem
cryptosystem security
Entropy
game theory
Games
Human behavior
Human Factors
information theoretic security
information theory
Mathematical model
Metrics
policy-based governance
pubcrawl
resilience
Resiliency
Scalability
Security Evaluation
security evaluator
triangular game
biblio
Attack Graph-Based Assessment of Exploitability Risks in Automotive On-Board Networks
Submitted by
aekwall
on Wed, 02/13/2019 - 11:01am
Security Risk Management
Attack Graph Construction
Attack vectors
Human behavior
network hardening
probabilistic model
pubcrawl
Resiliency
Scalability
Security Evaluation
vehicle security
vulnerability assessment
biblio
A Framework for Measurability of Security
Submitted by
grigby1
on Wed, 11/14/2018 - 12:21pm
Communication Systems
computer network security
data privacy
Databases
Embedded System
embedded systems
Engines
ES
expert knowledge retrieval
expert systems
experts knowledge systematic storage
Human behavior
internet
Internet of Things
Measurement
MM framework
multi metrics
Multi-Metrics
privacy
privacy and dependability evaluation complexity
pubcrawl
resilience
Resiliency
Scalability
security
security attribute
security enhancement
Security Evaluation
security function
security measurability
security metric
SPD evaluation complexity
system analysis and design
biblio
Cryptosystem Security Evaluation Based on Diagonal Game and Information Theory
Submitted by
grigby1
on Fri, 10/26/2018 - 4:04pm
Ciphers
cognitive radio
cognitive radio networks
Cryptography
cryptosystem security evaluation
diagonal Game
Entropy
game theoretic security
game theory
Games
Human Factors
information theory
Metrics
pubcrawl
Random variables
Scalability
Security Evaluation
telecommunication security
wireless communications networks
biblio
How formal analysis and verification add security to blockchain-based systems
Submitted by
grigby1
on Thu, 08/23/2018 - 10:37am
blockchain
blockchain security
blockchain-based system security
contracts
Cryptography
domain specific language
formal analysis
formal method
formal verification
IEC standards
integrated technology
ISO standards
process transactions
Protocols
pubcrawl
resilience
Resiliency
Scalability
Security Evaluation
security layers
security of data
tools
biblio
Poisoning Behavioral Malware Clustering
Submitted by
grigby1
on Fri, 07/06/2018 - 1:06pm
pubcrawl
Human behavior
Unsupervised Learning
clustering
Scalability
computer security
malware detection
resilience
Security Evaluation
Resiliency
Adversarial Machine Learning
AI Poisoning
biblio
Research of Security Risk in Electric Power Information Network
Submitted by
grigby1
on Wed, 05/30/2018 - 3:01pm
collaboration
Communication networks
electric power information network
evaluation index system
fuzzy judgment
fuzzy set theory
Human behavior
Human Factors
Metrics
multilevel fuzzy comprehensive judgment
network security
operating systems
password
policy-based governance
power engineering computing
power system management
power systems
Production
pubcrawl
resilience
Resiliency
risk assess
risk management
Security Evaluation
security of data
security risk
security weaknesses
styling
synthesis evaluation model
biblio
Security, privacy and safety evaluation of dynamic and static fleets of drones
Submitted by
grigby1
on Fri, 02/02/2018 - 12:20pm
Unmanned Aerial Vehicles
uav
Swarm Intelligence
static drone fleets
Security Evaluation
security
safety evaluation
Safety
Robot sensing systems
Resiliency
remotely operated vehicles
pubcrawl
privacy evaluation
privacy
particle swarm optimization
multi-robot systems
mobile robots
military aircraft
Metrics
localised fleet control
Internet of Vehicles
independent fleet control
Human Factors
Human behavior
flight control management
effective fleet control
dynamic drone fleets
drones
cyber physical systems
collision avoidance
autonomous aerial vehicles
air-traffic control management
biblio
"Pattern classification under attack on spam filtering"
Submitted by
grigby1
on Thu, 02/23/2017 - 11:26am
adversarial attacks
adversarial classification
Classification algorithms
pubcrawl170105
Electronic mail
Filtering
filtering algorithms
pattern classification
pattern classification system
privacy
pubcrawl
security
Security Evaluation
security issues
security of data
spam attack scenario
spam email security evaluation
spam filtering
unsolicited e-mail
1
2
next ›
last »