Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
integrity
biblio
Analysis of the random shuffling of message blocks as a low-cost integrity and security measure
Submitted by grigby1 on Fri, 04/14/2023 - 4:08pm
Memory management
Shuffling
Low cost
Brute force
Force measurement
brute force attacks
integrity
Current measurement
Force
Proposals
collaboration
Information systems
Cryptography
privacy
policy-based governance
Human Factors
Human behavior
pubcrawl
IoT
security
biblio
Data Integrity Auditing Scheme for Preserving Security in Cloud based Big Data
Submitted by grigby1 on Fri, 03/31/2023 - 11:17am
cloud
medical data
auditing
Costs
Resiliency
integrity
big data security in the cloud
data integrity
simulation
Cloud Computing
Big Data
Medical services
data privacy
Scalability
resilience
Metrics
pubcrawl
biblio
Discovering the Need for Information Assurance to Assure the End Users: Methodologies and Best Practices
Submitted by grigby1 on Fri, 02/17/2023 - 5:40pm
software reliability
threats
Information-Assurance
Hack
Operating-Systems
legislation
attack
software assurance
integrity
vulnerabilities
supply chains
Virtual private networks
security
pubcrawl
resilience
Resiliency
Software
Safety
Scalability
privacy
Standards organizations
biblio
Predicting Confidentiality, Integrity, and Availability from SQL Injection Payload
Submitted by grigby1 on Fri, 02/03/2023 - 3:49pm
confidentiality
SQL injection detection
security information and event management
SIEM
Availability
support vector machine
SQL injection
Firewalls (computing)
integrity
Detectors
Training data
Adaptation models
privacy
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
Support vector machines
deep learning
biblio
ID-based Data Integrity Auditing Scheme from RSA with Forward Security
Submitted by grigby1 on Fri, 01/13/2023 - 1:46pm
forward security
RSA signature
ID-based auditing protocol
Security Audits
Costs
Resists
data integrity
integrity
Public key
Cloud Computing
Data Security
Protocols
Scalability
Resiliency
resilience
Human behavior
pubcrawl
biblio
Trustworthiness Evaluation of Smart Grids Using GSPN
Submitted by grigby1 on Wed, 08/03/2022 - 4:12pm
pubcrawl
security
Stochastic processes
composability
sensors
Smart Grids
integrity
simulation
Petri nets
Reliability
Substations
trustworthiness
Steady-state
Availability
GSPN
biblio
Securing Remote Access Networks Using Malware Detection Tools for Industrial Control Systems
Submitted by aekwall on Thu, 06/09/2022 - 11:39am
industrial control
scalable systems
remote access trojans
Rats
Purdue control hierarchy
operational technology
hash calculation
Availability
integrity
Object recognition
integrated circuits
malware detection
telecommunication traffic
Smart homes
Industrial Control Systems
confidentiality
Resiliency
Scalability
pubcrawl
tools
biblio
EPF-CLPA: An Efficient Pairing-Free Certificateless Public Auditing for Cloud-based CPS
Submitted by aekwall on Fri, 05/06/2022 - 12:51pm
Cloud Computing
Servers
Public key
cloud storage
pubcrawl
Resiliency
Computational efficiency
Elliptic curve cryptography
Compositionality
Performance analysis
Predictive Metrics
Certificateless Auditing
Cyber Physical Systems (CPS)
Identity-based encryption
integrity
encryption audits
biblio
Data Security and Privacy using DNA Cryptography and AES Method in Cloud Computing
Submitted by grigby1 on Fri, 05/06/2022 - 10:32am
cloud
Data Security
DNA cryptography
decryption
integrity
Hazards
Data protection
cloud computing security
DNA
Force
encryption
resilience
Metrics
Computers
privacy
Instruments
AES
Resiliency
Human behavior
pubcrawl
biblio
Encryption, File Splitting and File compression Techniques for Data Security in virtualized environment
Submitted by grigby1 on Fri, 04/01/2022 - 1:16pm
Software algorithms
steganography algorithm
Pressure
Decryption Technique
data storage
cloud data
Compression
Secure File Sharing
integrity
Data protection
Steganography
Distributed databases
Encryption technique
Cloud Computing
Decoding
Metrics
encoding
composability
Safety
AES
Resiliency
resilience
Human behavior
pubcrawl
security
1
2
3
4
5
6
next ›
last »