Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
standards
biblio
Deriving Privacy Settings for Location Sharing: Are Context Factors Always the Best Choice?
Submitted by aekwall on Mon, 04/20/2020 - 10:23am
privacy models and measurement
user modeling
Urban areas
text analysis
standards
social networks
social networking (online)
Social network services
pubcrawl
privacy settings
Adaptation
privacy
Metrics
machine learning
location sharing
location based services
fine-grained disclosement policy
data privacy
Current measurement
biblio
Deriving Privacy Settings for Location Sharing: Are Context Factors Always the Best Choice?
Submitted by aekwall on Mon, 04/20/2020 - 10:23am
privacy models and measurement
user modeling
Urban areas
text analysis
standards
social networks
social networking (online)
Social network services
pubcrawl
privacy settings
Adaptation
privacy
Metrics
machine learning
location sharing
location based services
fine-grained disclosement policy
data privacy
Current measurement
biblio
Distributed Threat Intelligence Sharing System: A New Sight of P2P Botnet Detection
Submitted by aekwall on Mon, 04/06/2020 - 10:14am
Human Factors
Threat intelligence sharing
threat intelligence
telecommunication traffic
standards
security
Scalability
Resiliency
pubcrawl
Peer-to-peer computing
peer-to-peer botnet detection
peer to peer security
P2P botnet detection
network traffic analysis
Metrics
invasive software
botnets
Hidden Markov models
evaluating system
distributed threat intelligence sharing system
distributed methods
distributed cyber threat
distributed botnet
cyberspace security
Cyberspace
computer network security
Clustering algorithms
botnet
BAV quantitative TI model
analytic hierarchy process
AHP and HMM based analysis algorithm
biblio
A Mechanised Cryptographic Proof of the WireGuard Virtual Private Network Protocol
Submitted by grigby1 on Fri, 04/03/2020 - 12:43pm
open source Virtual Private Network
WireGuard virtual private network protocol
vpn
Virtual private networks
verification
transport data messages
standards
security protocols
pubcrawl
Protocols
protocol verification
privacy
policy-based governance
Policy Based Governance
authorisation
Noise Protocol Framework
IP networks
Elliptic curve cryptography
CryptoVerif proof assistant
Cryptographic Protocols
cryptographic protocol
cryptographic proof
computer network security
computational model
Compositionality
composability
collaboration
biblio
Enforcing Multilevel Security Policies in Database-Defined Networks using Row-Level Security
Submitted by grigby1 on Fri, 04/03/2020 - 12:04pm
row-level security checks
policy-based governance
pubcrawl
relational database security
relational databases
Resiliency
Routing
routing configuration
Row-Level Security
Policy Based Governance
security
security of data
security policies
Software Defined Network
software defined networking
software-defined networking
standards
Structured Query Language
Human behavior
collaboration
composability
computer networks
database management systems
database tables
database-defined network
Database-Defined Networking
fine-grained security policies
business requirements
Information Flow Control
Metrics
multilevel security
multilevel security policies
network configuration
network hardware administration
network topology
biblio
Quantum Services Architecture in Softwarized Infrastructures
Submitted by aekwall on Mon, 03/30/2020 - 11:41am
quantum technologies
mature development
network integration
open Interfaces.
QKD systems
quantum principles
quantum random number generators
quantum resources
Quantum services architecture
Quantum Switch
quantum switches
Madrid Quantum Network
quantum-safe methods
SDN quantum node architecture
secure bit streams
service automation
single network element
software-defined networking architectures
softwarized infrastructures
specific network cards
Telecommunication standards
quantum computing security
quantum cryptography
security
Protocols
computer architecture
software defined networking
Resiliency
pubcrawl
composability
standards
software-defined networking
quantum computing
Scalability
quality of service
random number generation
security infrastructure
Switches
Predictive Metrics
Quantum Key Distribution
current networking technology
forward key material
key exchange primitive
logically centralized SDN controller
biblio
Efficient Group Data Sharing In Cloud Environment Using Honey Encryption
Submitted by grigby1 on Wed, 03/18/2020 - 12:27pm
group data sharing
Secure File Sharing
resilience
Resiliency
pubcrawl
standards
security
resource sharing
information sharing
honey encryption
Group Manager
Ciphers
efficiency
cloud environment
advanced encryption standard
cloud
resource allocation
Servers
Cloud Computing
encryption
Cryptography
biblio
The Strength of Weak Randomization: Easily Deployable, Efficiently Searchable Encryption with Minimal Leakage
Submitted by grigby1 on Wed, 03/18/2020 - 12:15pm
Metrics
weak randomization
untrusted service
standards
Servers
searchable encryption
searchable database encryption scheme
Resiliency
resilience
relational databases
relational database security
relational database engine
pubcrawl
probability
outsourcing
Cloud Computing
legacy service
inference attacks
Human behavior
Entropy
encryption
encrypted data
document management systems
document handling
deployable database encryption scheme
data privacy
Cryptography
computer security
composability
biblio
Scalable Simulation-Based Verification of SystemC-Based Virtual Prototypes
Submitted by aekwall on Mon, 03/16/2020 - 10:39am
SystemC VP
Computer simulation
design verification
Electronic System Level
semiconductor industry
simulation behavior
Simulation-based Verification
SystemC
SystemC language
scalable verification
SystemC-based virtual prototypes
systems analysis
TLM
TLM-2.0 rules
Transaction Level Modeling framework
Virtual Prototype
virtual prototyping
Scalability
Protocols
Resiliency
pubcrawl
Computational modeling
standards
Formal Specification
verification
timing
Hardware
Predictive Metrics
Prototypes
Compositionality
formal verification
Clang
hardware description languages
Object oriented modeling
biblio
Smart Grid Cyber Security and Substation Network Security
Submitted by grigby1 on Mon, 03/09/2020 - 2:56pm
Smart Grid Cyber Security
NIST interoperability framework process
personnel training
policy-based governance
power system security
power system simulation
pubcrawl
resilience
Resiliency
Scalability
security architecture
Metrics
Smart Grid Privacy
smart grid-related data privacy
Smart Grids
smart power grids
standards
substation network security
substation protection
Substations
ZigBee Smart Energy
Data Minimization
Advanced Metering Infrastructure (AMI)
Advanced Security Acceleration Project for the Smart Grid
Automated Data Exchange (ADE)
collaboration
composability
computer security
consumer privacy
consumer privacy audits
cyber security controls
cyber vulnerability assessments
(ASP-SG)
data privacy
Data Security
Demand Response and Smart Grid Coalition (DRSG)
electric power infrastructure
Home Area Network (HAN)
Human behavior
Human Factors
IP Security (IPSec)
Law
« first
‹ previous
…
14
15
16
17
18
19
20
21
22
…
next ›
last »