Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Protocols
biblio
Anonymous scheme for blockchain atomic swap based on zero-knowledge proof
Submitted by grigby1 on Thu, 03/04/2021 - 2:05pm
cryptocurrencies
pubcrawl
Human Factors
policy-based governance
resilience
Resiliency
data privacy
Scalability
privacy
Protocols
contracts
Receivers
Public key
privacy leakage
Elliptic curves
smart contract
transaction processing
anonymous improvement scheme
anonymous list
anonymous scheme
atomic exchange
blockchain atomic swap
self-certification
smart contract address information
UTXO unconsumed model
zero-knowledge proof
zero trust
biblio
Explainable Detection of Zero Day Web Attacks
Submitted by grigby1 on Thu, 03/04/2021 - 1:56pm
Anomaly
Anomaly Detection
composability
defense
explanation
Metrics
Pipelines
principal component analysis
Protocols
pubcrawl
resilience
Resiliency
security
Sparse matrices
Task Analysis
web security
zero day
Zero day attacks
biblio
System of Collection and Analysis Event Log from Sources under Control of Windows Operating System
Submitted by grigby1 on Thu, 03/04/2021 - 1:42pm
Windows operating system
security
analysis of incidents
composability
computer security
domain controller
event collector
event forwarding technology
event log
event log analysis
event management
event sources
event-forwarding technology
Industrial engineering
information security
Information systems
Metrics
monitoring events
operating systems
operating systems (computers)
Protocols
pubcrawl
received events
resilience
Resiliency
security information
security of data
Servers
system monitoring
the monitoring center
universal system
Windows Operating System Security
biblio
Clustering Based Incident Handling For Anomaly Detection in Cloud Infrastructures
Submitted by aekwall on Mon, 03/01/2021 - 3:48pm
security of data
Monitoring
Cloud Computing
Scalability
Servers
Protocols
Resiliency
pubcrawl
Prediction algorithms
Clustering algorithms
Anomaly Detection
Data mining
pattern clustering
Cloud Security
cloud
NSL-KDD
Anomaly
anomaly detection mechanisms
cloud infrastructures
clustering based algorithm
DBSCAN
decision based approach
f-score
incident handling model
isolation forest
Isolation Forest algorithm
Kmeans
local outlier factor(LOF)
nonclustering based algorithm
run time metrics
work factor metrics
biblio
Lightweight Testbed for Cybersecurity Experiments in SCADA-based Systems
Submitted by grigby1 on Tue, 02/23/2021 - 1:58pm
ARP Spoofing
computer network security
computer security
container-based SCADA testbed
Containers
critical infrastructure
critical infrastructures
cyber physical systems
cyber-attacks
cybersecurity experiments
Docker
experimental testbeds
financial damages
interoperable platform
learning (artificial intelligence)
machine learning
man in the middle attack
MITM Attack
network classification model
Network reconnaissance
network scanning
network traffic
Open area test sites
pattern classification
physical damages
Protocols
pubcrawl
reconnaissance attack
resilience
Resiliency
SCADA
SCADA systems
SCADA-based Systems
Scalability
telecommunication traffic
testbed
biblio
Decentralized Identifier Distribution for Moving Target Defense and Beyond
Submitted by grigby1 on Tue, 02/23/2021 - 1:56pm
collision probability
concurrency control
Cryptographic Protocols
cryptographically secure random values
Cryptography
Databases
decentralized identifier distribution
IP networks
moving target defense
network entity identifiers
Network Identification
Network reconnaissance
network security
network security objectives
proactive defense
protocol
Protocols
pubcrawl
Reconnaissance
resilience
Resiliency
Scalability
synchronisation
Synchronization
timestamp-based concurrency control algorithms
Twitter
unique universal identifiers
biblio
Malicious user identification scheme for network coding enabled small cell environment
Submitted by grigby1 on Tue, 02/23/2021 - 1:35pm
computer architecture
security
Peer-to-peer computing
pubcrawl
Metrics
resilience
Resiliency
Throughput
telecommunication security
5G mobile communication
cellular radio
composability
Protocols
wireless network
Communication networks
telecommunication network reliability
cooperative communication
network coding
5G
Microprocessors
next generation networks
dense network coding
device to device communication
fifth generation of communication networks
malicious user identification scheme
network coding environment
next generation communication technologies
Pollution
reliable communication
small cell technology
Small Cells
biblio
Blockchain-based Distributed Banking for Permissioned and Accountable Financial Transaction Processing
Submitted by grigby1 on Tue, 02/23/2021 - 1:26pm
accountable financial transaction processing
bank account
bank data processing
banking service
BDB
blockchain-based distributed banking
centralized banks
composability
contracts
cryptocurrencies
Cryptography
Distributed Banking
distributed banking systems
distributed banking transactions
Distributed databases
distributed financial transaction processing
Distributed Ledger Technology
immutable transactions
Metrics
Monitoring
network accountability
permissioned blockchain
Protocols
pubcrawl
public key infrastructure
resilience
Resiliency
Resistance
smart contract
transaction processing
biblio
Smart e-Health Security and Safety Monitoring with Machine Learning Services
Submitted by grigby1 on Tue, 02/23/2021 - 1:25pm
Accountability Solution
composability
Cryptography
data privacy
Distributed databases
e-health blockchains
EU-GDPR
health and safety
health care
Healthcare
HIPAA
HITECH
Intelligent Analytics
intelligent monitoring
Keywords- e-Health Blockchain
learning (artificial intelligence)
machine learning
machine learning services
medical information systems
Medical services
medical treatment process
Metrics
Monitoring
network accountability
patient monitoring
patient treatment
patient treatment medication safety issues
Privacy Requirements
Protocols
pubcrawl
regional regulations
resilience
Resiliency
Safety
safety monitoring
security monitoring
service providers
smart e-health security
transaction flows
trust health information environment
Trusted Computing
biblio
Fast and Secure kNN Query Processing in Cloud Computing
Submitted by aekwall on Mon, 02/22/2021 - 12:44pm
Cloud Computing
Cryptography
encrypted data
data privacy
Protocols
nearest neighbour methods
pubcrawl
query processing
data structures
Measurement
Indexes
Predictive Metrics
location-based services
location based services
nearest neighbor search
RBF
Geospatial analysis
commercial public clouds
data structure
fast and secure kNN query processing
fast location-based query
FSkNN
geospatial data storage
LSPs
process location-based queries
random Bloom filter
secure index
secure location-based query
secure range query protocol
tracking technology
untrusted cloud
1
2
3
4
5
6
7
8
9
…
next ›
last »