Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authorisation
biblio
Towards Modelling Insiders Behaviour as Rare Behaviour to Detect Malicious RDBMS Access
Submitted by aekwall on Mon, 11/04/2019 - 11:23am
Insider Threats
access control mechanisms
and Data mining
anomaly-based Intrusion Detection Systems
application data
data leakage
Database intrusion detection
Database monitoring
detect malicious RDBMS access
relational database security
malicious access
malicious RDBMS accesses
persistent concern
RDBMS
relational database management systems
SQL queries
towards modelling insiders
unauthorized employees
Metrics
authorisation
Big Data
Organizations
Data models
Resiliency
Human behavior
pubcrawl
composability
security of data
query processing
SQL
Training
Data mining
malicious insiders
insider attacks
relational databases
biblio
Detection of Temporal Data Ex-Filtration Threats to Relational Databases
Submitted by aekwall on Mon, 11/04/2019 - 11:23am
Training
temporal data ex-filtration threat detection
Temporal Attacks
Insider Threats
Data Analytics for Security
anomaly detection techniques
anomalous access detection
relational database security
unauthorized access
relational databases
data theft
Anomaly Detection
Inspection
query processing
Metrics
composability
pubcrawl
Human behavior
Resiliency
feature extraction
real-time systems
authorisation
Monitoring
biblio
Anomaly Detection in Role Administered Relational Databases — A Novel Method
Submitted by aekwall on Mon, 11/04/2019 - 11:23am
relational databases
User profile
security feature
Role-Based Access Control database
Role administered relational databases
Quiplet
database management systems
database management system
database access control
common security measures
anomaly detection technique
anomaly detection system
access control measures
relational database security
authorisation
Intrusion Detection
Anomaly Detection
Training
Databases
Metrics
composability
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
Support vector machines
support vector machine
Access Control
biblio
Secure Coding Practices in Java: Challenges and Vulnerabilities
Submitted by grigby1 on Wed, 10/30/2019 - 10:53am
Security by Default
multiple security vulnerabilities
programming
programming challenges
programming obstacles
pubcrawl
resilience
Resiliency
Scalability
Secure Coding
secure coding assistance
secure coding practices
Libraries
Spring security
SSL-TLS security
SSL/TLS
StackOverflow
StackOverflow forum
StackOverflow posts
third-party framework
third-party libraries
XML
XML-based approaches
cryptographic hash functions
security
application program interfaces
authentication
authorisation
authorization
authorization features
Certificate Validation
complex Java-based
complicated cross-language data handling
Computer crime
cross-site request forgery attacks
coding theory
Cryptography
cryptography API
CSRF
developers time
empirical study
encoding
insecure coding practices
Java
Java platform
Java secure coding
biblio
Don't Talk Unless I Say So! Securing the Internet of Things with Default-Off Networking
Submitted by grigby1 on Wed, 10/30/2019 - 10:53am
Logic gates
Web browser
smart lock
smart devices
Servers
Security by Default
Scalability
Resiliency
resilience
pubcrawl
policy language
network security
minimal access permissions
Access Control
IoT networks
IoT device communications
IoT application protocols
Internet of Things
internet
default-off networking
Computer crime
Cloud Computing
bluetooth low energy
Bluetooth
Bark phrases access control policies
authorisation
biblio
Secure Device Bootstrapping Without Secrets Resistant to Signal Manipulation Attacks
Submitted by grigby1 on Wed, 10/30/2019 - 10:53am
Secret free
industrial automation sensors
key establishment
key establishment processes
man in the middle attack
medical devices
Message Integrity Protection
multiple devices
multiple legitimate devices
ON OFF Keying
out-of-band channels
pairing process
physical layer security
physical-layer group message integrity
in-band message integrity verification
secure deployment
secure device bootstrapping
secure pairing
shared secrets
signal manipulation attacks
VERSE
wireless channel
wireless devices
wireless signal annihilation
wireless signal injection
Wireless Signal Manipulation Attack
wireless signal manipulations
Security by Default
Cryptographic Protocols
Internet of Things
security of data
resilience
wireless sensor networks
pubcrawl
Resiliency
Scalability
Protocols
Wireless communication
telecommunication security
message authentication
performance evaluation
Communication system security
authentication
authorisation
wireless channels
body area networks
public key cryptography
data integrity
autonomous vehicles
man-in-the-middle attacks
advanced wireless attacks
authenticated channels
bootstrapping protocol
extensive human involvement
Group Bootstrapping
hub
biblio
Certificate Transparency Using Blockchain
Submitted by grigby1 on Wed, 10/23/2019 - 12:39pm
Protocols
web domains
web communication
telecommunication security
SSL-TLS protocols
SSL Trust Models
Servers
Scalability
safe distributions
Resiliency
resilience
public logs
public keys
public key cryptography
Public key
pubcrawl
authorisation
PKI
Metrics
IBM Hyperledger Fabric blockchain platform
hyperledger
Human behavior
Google
Computed tomography
certification authorities
certification
certificate validation process
certificate transparency
certificate revocation mechanism
certificate authorities
Browsers
blockchain
biblio
(Short Paper) Towards More Reliable Bitcoin Timestamps
Submitted by grigby1 on Wed, 10/23/2019 - 12:38pm
pubcrawl
Web sites
timestamping service
timestamping
Synchronization
SSL/TLS servers
SSL Trust Models
Servers
secure timestamping service
Scalability
Resiliency
resilience
Reliability
public key cryptography
authorisation
Protocols
Metrics
Human behavior
freshness properties
freshness
electronic money
digital signatures
Cryptographic Protocols
blockchain
bitcoin timestamps
Bitcoin protocol
Bitcoin participants
bitcoin
biblio
IPsec/Firewall Security Policy Analysis: A Survey
Submitted by aekwall on Tue, 10/22/2019 - 9:53am
internetworking
Security Policies Analysis
traffic control
security policy verification
security policy misconfigurations
security policy management
Security policy anomalies
policy analysis
network security protection
network safety
IPsec security policy analysis
IPsec gateways
formal verification
Firewall Security policy analysis
firewall
Conflicts analysis
computer network security
Virtual private networks
security policy
Firewalls (computing)
Logic gates
IPsec
network security
computer networks
Communication networks
Correlation
Filtering
policy-based governance
pubcrawl
authorisation
IP networks
biblio
Secure Sign: Signing Document Online
Submitted by grigby1 on Tue, 10/15/2019 - 2:45pm
secure sign
legal offices
main security goals
Metrics
online
pubcrawl
Repudiation
resilience
Resiliency
Secure
Law
SecureSign system
sign
signatories
signatory
signature
signing documents
signing parties
user fingerprint
digital signatures
authenticity
authorisation
biometric
component
composability
contracts
Cryptography
data integrity
authentication
document
document online
electronic signature tablet
face-to-face
fingerprint reader
Fingerprint recognition
fraud
Human behavior
« first
‹ previous
…
20
21
22
23
24
25
26
27
28
…
next ›
last »