Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
security model
biblio
Modular Security Analysis of OAuth 2.0 in the Three-Party Setting
Submitted by aekwall on Tue, 10/12/2021 - 3:12pm
authorization
Compositionality
Cryptographic Protocols
OAuth
Predictive Metrics
provable security
pubcrawl
Resiliency
security model
biblio
Research on Security Evaluation Technology of Wireless Access of Electric Power Monitoring System Based on Fuzzy
Submitted by grigby1 on Thu, 09/09/2021 - 9:00am
power systems
wireless security assessment
wireless networks
security model
security
Safety
Resiliency
resilience
pubcrawl
Communication system security
power monitoring system
Monitoring
fuzzy theory
delphi method
Control Theory
composability
component
biblio
Modeling and measurement internal threat process based on advanced stochastic model*
Submitted by grigby1 on Fri, 11/20/2020 - 1:52pm
security model
Stochastic Computing Security
threat behaviors
stochastic petri nets
risk measurement
real-time risk measurement
Petri net computing characteristics
network protection
internal threats
Internal Threat
illegal data
firewall-password model
advanced stochastic model
Petri nets
security of data
complex networks
risk analysis
Stochastic processes
Computational modeling
Data models
Scalability
Mathematical model
Analytical models
Resiliency
resilience
pubcrawl
security
biblio
Analysis of Cyber-Physical Security in Electric Smart Grid : Survey and challenges
Submitted by aekwall on Mon, 09/28/2020 - 12:10pm
cyber-physical system
power engineering computing
Smart Grids
Human Factors
attack motivation
CPS
Meters
security model
ICT
Smart Grid
communication system
defence
electric smart grid
information and communication technology
privacy issue
security concern
CPS Privacy
Monitoring
cyber physical systems
smart power grids
privacy
cyber-physical security
Reliability
Vulnerability
pubcrawl
Human behavior
cyber-physical systems
SCADA systems
SCADA
security
privacy concerns
data privacy
architecture
biblio
Generic Approach to Outsource the Decryption of Attribute-Based Encryption in Cloud Computing
Submitted by grigby1 on Fri, 09/04/2020 - 4:16pm
resilience
modified decryption outsourcing mode
OD-ABE scheme
outsourced decryption
outsourcing
private key cryptography
pubcrawl
public key cryptography
public transformation key
Metrics
Resiliency
security model
selective security model
shorter bit length
standards
underlying ABE scheme
underlying standard ABE
ABE ciphertext
generic construction
generic approach
faster decryption time
encryption
efficient transformation key generation algorithm
concrete constructions
composability
Cloud Computing
black-box way
black box encryption
authorisation
attribute-based encryption
adaptive security
Adaptation models
ABE outsourcing schemes
biblio
A Security Model for the Enhancement of Data Privacy in Cloud Computing
Submitted by aekwall on Mon, 07/13/2020 - 11:05am
Scalability
user privacy in the cloud
internet acts
cyberspace data
Access Control
security model
data integrity
data confidentiality
privacy protection
Ciphers
Cloud Computing
Metrics
pubcrawl
Resiliency
Organizations
data privacy
encryption
Data Security
Cryptography
biblio
Security Analysis of Intelligent Transportation Systems Based on Simulation Data
Submitted by grigby1 on Fri, 05/08/2020 - 4:40pm
threat model
resilience
road safety
road traffic
roadside infrastructure units
security
Security analysis
security model
security of data
pubcrawl
traffic control
traffic engineering computing
Transportation
transportation efficiency
transportation security
vehicle ad hoc networks
Veins
Information systems
Intelligent Data Security
Compositionality
Resiliency
Scalability
Analytical models
Buildings
composability
information security
Intelligent Data and Security
Intelligent Transportation Systems
ITS
ITS system
layered network security model
malicious node threat
Metrics
Networked Control Systems Security
biblio
Research on the Simulation Algorithm of Object-Oriented Language
Submitted by grigby1 on Fri, 04/24/2020 - 4:20pm
object-oriented languages
write-back cache
visualization
system analysis and design
static protection
simulation algorithm
security model
safety-critical software
Resiliency
resilience
pure object oriented language
pubcrawl
process language
object-oriented programming
cache storage
Object-Oriented Language
object oriented security
Object oriented modeling
mixed object oriented language
Metrics
low-energy independence complexity theory
Local area networks
inheritance
GUT
Extraterrestrial measurements
dynamic protection
composability
Complexity theory
biblio
Code-based Pseudorandom Generator for the Post-Quantum Period
Submitted by grigby1 on Fri, 04/03/2020 - 12:56pm
“Provable”
resilience
security model
Resistance
Random sequences
Periodic Properties
Fischer-Stern Generator
Cryptographically Resistance Pseudorandom Sequences
Code-based Pseudorandom Number Generator
pubcrawl
provable security
Compositionality
Decoding
Metrics
Prototypes
Cryptography
Generators
Resiliency
biblio
Network Reconnaissance and Vulnerability Excavation of Secure DDS Systems
Submitted by aekwall on Mon, 03/16/2020 - 10:40am
Scalability
middleware
Network reconnaissance
open systems
Peer-to-peer computing
permission attestation
Predictive Metrics
Protocols
pubcrawl
realtime peer-to-peer protocol
Resiliency
leaked context
scalable middleware
scalable verification
secure DDS systems
Secure DDS v
security
Security by Default
security model
Service Plugin Interface architecture
vulnerability excavation
default plugin specifications
authenticated encryption
authorisation
capability lists
Compositionality
crypto handshake
Cryptography
data bus
data centric access control
Data Distribution Service
attacker model
digital signatures
distributed networked systems
electronic data interchange
formal verification
Industrial IoT
initial ratification
internet
interoperable data exchange
IoT protocol
1
2
3
next ›
last »