Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Social network services
biblio
Ubiquitous Interpersonal Communication over Ad-hoc Networks and the Internet
Submitted by BrandonB on Wed, 05/06/2015 - 8:56am
Public key
IP networks
low-level software
mobile ad hoc networks
mobile computing
mobile devices
mobile-to-mobile communication
Networking Protocol
packet radio networks
Priority Mechanism
Interpersonal Communication
Receivers
rendezvous points
RP
social network
Social network services
telecommunication network routing
ubiquitous interpersonal communication
Wireless communication
wireless LAN
delay tolerant networks
ad-hoc 802.11 networks
Ad-Hoc Network
authentication
Bluetooth
cognitive radio
Cryptography
decentralized model
decentralized network routing
delay tolerant networking
Ad hoc networks
Delay-Tolerant Network
DHT
distributed hash tables
DTN
encryption
flexible trust network
hop-limited broadcast
Infrastructureless Communication
internet
biblio
A survey of Internet security risk over social networks
Submitted by BrandonB on Tue, 05/05/2015 - 11:55am
Internet security risk
social risks
social networks
social networking integration
social networking (online)
Social network services
social network
security of data
security
rural community
risk management
Organizations
civil society
Internet risks
internet
hackers
global economy
geography climate
Educational institutions
dangers to society
crimes social networking
Computers
Communities
biblio
Secure Multimedia Big Data Sharing in Social Networks Using Fingerprinting and Encryption in the JPEG2000 Compressed Domain
Submitted by BrandonB on Tue, 05/05/2015 - 9:33am
JPEG2000 coding
TSH transform
tree-structured Harr transform
Transforms
social networking (online)
Social network services
social network analysis
secure multimedia big data sharing
multimedia computing
Multimedia communication
media distribution protection
JPEG2000 compressed domain
Big Data
Image coding
hybrid multicast-unicast
Homomorphic encryption
hierarchical community structure
Fingerprinting
fingerprint code
encryption
Data protection
data compression
Cryptography
Communities
biblio
Social network security management model using Unified Communications as a Service
Submitted by BrandonB on Tue, 05/05/2015 - 9:25am
security of data
virtual machines
virtual machine
unified communications as a service
UCaaS approach
UCaaS
TRAIN model
Switches
Software as a service
social networks
social networking (online)
Social network services
social network security management model
Servers
access management processes
security management
security conditions
PC-FAST algorithm
multitenant services
multitenancy SaaS application
multi-tenancy
hosted services vulnerability
Communities
communication errors identification
communication errors detection
Cloud Computing
authentication
asynchronous asymmetric communications
biblio
Improving security mechanism to access HDFS data by mobile consumers using middleware-layer framework
Submitted by BrandonB on Tue, 05/05/2015 - 8:38am
public cloud
Mobile communication
mobile computing
mobile consumers
OAuth 2.0
OAuth 2.0 protocol
one-time password generation technique
online data storage system
online stored data
Permission
Protocols
MiLAMob model
security
security mechanism
Social network services
social networking (online)
Social networking sites
storage management
Token
tokens
Yahoo
flexible user based policies
authentication
authorisation
authorization
authorization process
Cloud Computing
computing
Cryptography
Data models
encryption
Facebook
AES method
Gmail
HDFS
HDFS data access
information retrieval
IT resources
middleware
middleware-centric framework
middleware-layer framework
MiLAMob
biblio
Wifi authentication through social networks #x2014; A decentralized and context-aware approach
Submitted by BrandonB on Mon, 05/04/2015 - 2:48pm
telecommunication security
search time reduction
security principles
Servers
smartphone
Social Devices
Social network services
social networking (online)
social networks
search problems
Trusted Computing
ubiquitous computing
WebID
WiFi authentication
WiFi Authentication and Authorization
WiFi router
WiFi-enabled devices
wireless LAN
heuristic
authentication mechanism
authorisation
authorization
context-aware approach
decentralized approach
EAP-SocTLS
EAP-TLS
embedded trust relations
authentication
IEEE 802.11 Standards
message authentication
password
physical proximity
Probes
Protocols
quadratic search complexity
biblio
Development of a keyboardless social networking website for visually impaired: SocialWeb
Submitted by BrandonB on Mon, 05/04/2015 - 11:33am
message authentication
Web Speech API
visually impaired people
user friendliness
STT conversion
speech to text conversion technologies
Speech recognition
Speech
SocialWeb
social networking (online)
Social network services
screen readers
screen reader
Acoustic Fingerprinting
Media
malicious attackers
keyboardless social networking Website
human computer interaction
handicapped aids
Fingerprint recognition
Computers
computer proficiency
Communities
Audio fingerprinting
Assitive technologies
assistive technologies
biblio
Collaboration Pattern and Topic Analysis on Intelligence and Security Informatics Research
Submitted by BrandonB on Fri, 05/01/2015 - 8:31am
network security
topic analysis
Terrorism
social networking (online)
Social network services
social network analysis approach
social network analysis
small-world effect
security of data
scale-free property
collaboration
ISI
Intelligent systems
intelligence and security informatics research
Intelligence and Security Informatics
Informatics
groupware
computer security
collaboration pattern
biblio
Secure distributed data structures for peer-to-peer-based social networks
Submitted by BrandonB on Thu, 04/30/2015 - 2:22pm
online social network
trees (mathematics)
social networking (online)
Social network services
social enterprise network
secure distributed data structure
Public key
prefix trees
peer-to-peer technology
peer-to-peer networks
Peer-to-peer computing
Access Control
network security
global scale
file organisation
Distributed social networks
distributed list data structure
distributed hash table
distributed data management
data structures
authorisation
biblio
A Fuzzy Clustering-Based Credibility Model for Trust Assessment in a Service-Oriented Architecture
Submitted by BrandonB on Thu, 04/30/2015 - 1:53pm
human computer interaction
web services
Web Service
Trusted Computing
trust assessment
trust
Social network services
service-oriented architecture
Robustness
pattern clustering
majority rating
Clustering algorithms
fuzzy set theory
fuzzy clustering
Equations
customer satisfaction
credibility model
Credibility
consumer ratings
consumer credibility
Computational modeling
Communities
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »