Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Servers
biblio
XSSDM: Towards detection and mitigation of cross-site scripting vulnerabilities in web applications
Submitted by grigby1 on Tue, 03/07/2017 - 1:31pm
Reactive power
XSSDM
Web Application Security
Web application
static taint analysis
static analysis
standards
source code (software)
source code
Servers
Sensitivity
security vulnerability
security
Computer crime
pubcrawl170109
program diagnostics
pattern matching technique
pattern matching
internet
HTML
cyber crime
cross-site scripting vulnerability detection
Cross-site scripting (XSS)
context-sensitive approach
Context Sensitive
Context
biblio
Securing MDSplus for the NSTX-U Digital Coil Protection System
Submitted by grigby1 on Thu, 02/23/2017 - 2:27pm
NSTX-U digital coil protection system
Tokamak devices
superconducting coils
Software algorithms
Software
Servers
Relays
real-time systems
real-time
pubcrawl170106
protection
plasma toroidal confinement
CAMAC
NSTX
MDSplus
machine protection
Hardware
electrical limit
DCPS
data acquisition
data
control data acquisition hardware
control
biblio
"Approach to Enhancing Concurrent and Self-Reliant Access to Cloud Database: A Review"
Submitted by grigby1 on Thu, 02/23/2017 - 12:54pm
encryption algorithm
storage management
Servers
self-reliant access
security
pubcrawl170105
Protected Database-as-a-Service
power station
multiple geographically distributed clients
multiple business
metadata storage
metadata
meta data
Master key
Advance Encryption Standard
encryption
Distributed databases
database-as-a-service
database management
database installation
customer services
Cryptography
confidentiality
concurrent access
concurrency (computers)
commerce
cloud database
Cloud Computing
biblio
"P2V: Effective Website Fingerprinting Using Vector Space Representations"
Submitted by grigby1 on Thu, 02/23/2017 - 12:45pm
natural language processing
word vector representations
Web sites
Web site fingerprinting attack
Web pages
Web page destination
VSM
vector space representations
users navigation privacy
Servers
real-valued vector
pubcrawl
passive traffic analysis attack
packet to vector approach
P2V
online activists
anonymous communication
Mathematical model
machine learning
learning (artificial intelligence)
language vector space models
Internet users
Fingerprint recognition
features extraction
feature extraction
data privacy
cyber security
pubcrawl170105
Context
Computer crime
Computational modeling
biblio
"Semantic-Based Searchable Encryption in Cloud: Issues and Challenges"
Submitted by grigby1 on Thu, 02/23/2017 - 12:43pm
Cloud Computing
Cryptography
data privacy
encryption
Indexes
pubcrawl170105
information security
information security technique
privacy-preserving issue
pubcrawl
searchable encryption
semantic search
semantic-based searchable encryption
Semantics
Servers
biblio
"Using Honey Templates to Augment Hash Based Biometric Template Protection"
Submitted by grigby1 on Thu, 02/23/2017 - 12:30pm
hash
Sugar
Servers
secure sketch
pubcrawl
privacy leakage concern
machine learning based protected template generation protocol
learning (artificial intelligence)
honeywords
honeyword
honey templates
honey template
hashed password cracking
hash based BTPS
hash based biometric template protection
authentication
fuzzy vault
fuzzy commitment
Databases
database leakage
Data protection
data privacy
Cryptography
cryptographic hash calculation
biometrics (access control)
biometric template verification
biometric template storage
pubcrawl170105
biometric template protection
biometric template database leakage detectability
biblio
"Cost and Communication Efficient Auditing over Public Cloud"
Submitted by grigby1 on Thu, 02/23/2017 - 12:16pm
pubcrawl
third party authentication system
third party auditor
Storage technology
storage management
storage collection
software performance evaluation
Servers
security of data
security
Secure storage
auditing
Protocols
Memory
database
data storage security
data privacy
data acquisition security
cost efficient auditing
communication efficient auditing
cloud data security
Cloud Computing
biblio
"Hiding User Privacy in Location Base Services through Mobile Collaboration"
Submitted by grigby1 on Thu, 02/23/2017 - 11:40am
mobile networks
Web surfing
web services
user privacy
telecommunication security
Smartphones
smart phones
Servers
pubcrawl170105
privacy
Peer-to-peer computing
mobility management (mobile radio)
collaboration
mobile crowd method
Mobile communication
mobile collaboration
location-based services
location privacy
location base services
location aware system
LBS server
GPS
Global Positioning System
biblio
"On scaling software-Defined Networking in wide-area networks"
Submitted by grigby1 on Tue, 02/21/2017 - 12:22pm
computer architecture
domain name system
internet
IP networks
next-generation network design
OpenFlow
pubcrawl170103
Reliability
Scalability
SDN
Servers
software defined networking
software-defined networking
software-defined wide-area networks
wide area networks
biblio
"ID Based Web Browser with P2P Property"
Submitted by grigby1 on Tue, 02/21/2017 - 12:14pm
Internet projects
web applications
usage pattern
Uniform resource locators
Streaming media
streaming content services
Servers
pubcrawl170103
Peer-to-peer computing
P2P property
p2p
overlay networks
online front-ends
ISP-friendly P2P content delivery technology
Internet services
browser
Internet content
internet
IDNet
ID based Web browser
ID
host-to-host central model
domain-insulated autonomous network architecture
DIANA
content dissemination model
CDN-P2P-hybrid architecture
CDN
caching function
Browsers
browser-based Web application
« first
‹ previous
…
78
79
80
81
82
83
84
85
86
…
next ›
last »