Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Internet services
biblio
A Study of Evaluation Methods of WEB Security Threats Based on Multi-stage Attack
Submitted by grigby1 on Wed, 03/17/2021 - 12:43pm
Formal Specification
Chained Attacks
Web security threats
Web application services
security vulnerability model
security specification
Security Evaluation
multistage attack
Measures
Kill Chain
Classified protection
Reconnaissance
Internet services
tools
web services
internet
Data models
Scalability
Analytical models
Resiliency
resilience
pubcrawl
Servers
security
security of data
biblio
Privacy Policies Model in Access Control
Submitted by grigby1 on Fri, 04/03/2020 - 12:32pm
access control management
Privacy Policies
user identification
Task Analysis
Proposals
privacy policy strategy
privacy policy model
privacy policies model
personal data privacy
Internet services
data exchange
privacy
access control language
cloud environments
information security
authorization
Scalability
data privacy
Human behavior
pubcrawl
Cloud Computing
authorisation
biblio
"ID Based Web Browser with P2P Property"
Submitted by grigby1 on Tue, 02/21/2017 - 12:14pm
Internet projects
web applications
usage pattern
Uniform resource locators
Streaming media
streaming content services
Servers
pubcrawl170103
Peer-to-peer computing
P2P property
p2p
overlay networks
online front-ends
ISP-friendly P2P content delivery technology
Internet services
browser
Internet content
internet
IDNet
ID based Web browser
ID
host-to-host central model
domain-insulated autonomous network architecture
DIANA
content dissemination model
CDN-P2P-hybrid architecture
CDN
caching function
Browsers
browser-based Web application
biblio
Catch Me If You Can: A Cloud-Enabled DDoS Defense
Submitted by BrandonB on Tue, 05/05/2015 - 11:19am
Internet services
Web and internet services
turning victim servers
system architecture
shuffling mechanism
Shuffling
Servers
optimal reassignment strategy
network attacks
moving targets
moving target mechanism
moving target defense
large-scale DDoS attacks
IP networks
Amazon EC2
intelligent client reassignment
DDoS
computer network security
Computer crime
computer architecture
computational distributed denial-of-service attacks
cloud-enabled DDoS defense
Cloud Computing
cloud
client-to-server reassignment plans
client-server systems
attack mitigation
attack dilution strategies
biblio
Poster Abstract: Security Comes First, a Public-key Cryptography Framework for the Internet of Things
Submitted by BrandonB on Thu, 04/30/2015 - 11:53am
IoT
smart devices
security issues
safety issues
public-key cryptography
public key cryptography
Protocols
open systems
IP-based security solutions
IP networks
Acceleration
interoperability
Internet-connectivity
Internet services
Internet of Things
internet
Hardware
Engines
end-to-end communication
Cryptography
biblio
Poster Abstract: Security Comes First, a Public-key Cryptography Framework for the Internet of Things
Submitted by BrandonB on Wed, 04/29/2015 - 10:47am
IoT
smart devices
security issues
safety issues
public-key cryptography
public key cryptography
Protocols
open systems
IP-based security solutions
IP networks
Acceleration
interoperability
Internet-connectivity
Internet services
Internet of Things
internet
Hardware
Engines
end-to-end communication
Cryptography