Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authorisation
biblio
Security Domain for the Sensor Nodes with Strong Authentication
Submitted by aekwall on Mon, 12/07/2020 - 11:24am
security domain
military communication
mobile radio
neural style transfer
Predictive Metrics
processing power
pubcrawl
Resiliency
Scalability
military applications
security in IoT
sensor node resources
sensory data
tpm
Trusted Platform Module
trusted platform modules
Wireless communication
wireless sensor networks
Data protection
authorisation
composability
cooperating mobile sensor nodes
cryptographic protection
Cryptography
cyber-physical system security
data exchange
data link layer
authentication
data source authentication
data transmission security
domain member
energy resources
Internet of Things
IoT solutions
Logic gates
biblio
Research on Trusted Authentication Model and Mechanism of Data Fusion
Submitted by aekwall on Mon, 12/07/2020 - 11:23am
software engineering
Predictive Metrics
pubcrawl
Resiliency
Scalability
sensor fusion
service model
ship cluster platform
ships
neural style transfer
system design framework
system requirements
Trusted Authentication
trusted authentication model
Trusted Computing
trusted platform modules
unified authentication platform
database design
authorisation
CAS
composability
cyber-physical system security
data fusion
Data integration
Data mining
Data models
authentication
Databases
information fusion
JA-SIG CAS
marine engineering
Marine vehicles
Media
message authentication
biblio
DeepRing: Protecting Deep Neural Network With Blockchain
Submitted by grigby1 on Tue, 12/01/2020 - 1:00pm
DeepRing
technical perspectives
Public key
pubcrawl
optimizers
object detection
neural nets
machine learning
learning (artificial intelligence)
learned parameters
human trust
human intervention
Human behavior
face recognition
appropriate loss functions
Deep Neural Network
deep learning based architectures
decryption algorithms
cybersecurity industry
Cryptography
cryptographic hash
computer vision applications
computer vision
computer architecture
commercial perspectives
centralized authority
blockchain
authorisation
biblio
A Deep Learning Based Intrusion Detection System on GPUs
Submitted by grigby1 on Tue, 12/01/2020 - 12:47pm
information security market
security breaches
Resiliency
resilience
real-world operations
pubcrawl
password protections mechanisms
parallel computing
optimization functions
neural network approach
neural nets
modern learning mechanism
market computers
learning (artificial intelligence)
intrusion detection system
Intrusion Detection
Access controls
IDS system
IDS on GPU
IDS
graphics processing units
GPUs
firewalls
encryption mechanisms
dynamic intrusion detection mechanism
deep learning based intrusion detection system
deep learning algorithms
deep learning
cyber world
composability
Big Data
authorisation
biblio
TARAS: Trust-Aware Role-Based Access Control System in Public Internet-of-Things
Submitted by aekwall on Mon, 11/23/2020 - 10:37am
adaptive systems
trust-aware role-based access control system
trust-aware
trust threshold
TARAS mechanism
system integrity
public IoT environments
public Internet-of-Things
I-sharing
dynamic trust estimation
adaptive authorization
human trust
access rights
Human behavior
Access Control
Dynamic scheduling
security goals
Permission
IoT system
trust relationships
estimation
pubcrawl
Trusted Computing
Internet-of-Things
Internet of Things
authorization
authorisation
biblio
Enforcing a Risk Assessment Approach in Access Control Policies Management: Analysis, Correlation Study and Model Enhancement
Submitted by grigby1 on Fri, 11/20/2020 - 1:27pm
Information systems
Servers
security risks
Security Policies Analysis
risk management
risk assessment model
risk assessment approach
risk assessment
RBAC
pubcrawl
policy-based governance
model enhancement
Access Control
information system security
Databases
Database Security
correlation links
Correlation
authorisation
Anomalies Correlation
access control service
access control policy
access control policies management
biblio
A Graph Theory Approach towards IJTAG Security via Controlled Scan Chain Isolation
Submitted by grigby1 on Mon, 11/02/2020 - 11:28am
Registers
IJTAG network
IJTAG security
Instruments
intellectual property security
isolation signals
microprocessor chips
on-chip access
on-chip instruments
policy-based governance
power consumption
pubcrawl
IJTAG
resilience
Resiliency
scan chain
security
security of data
system-on-chip
system-on-chip designs
third party intellectual property providers
unauthorized user access
untrusted sources
Diagnosis
Clocks
Complexity theory
composability
controlled scan chain isolation
data integrity
Data Integrity Attacks
data manipulation
data protection scheme
data sniffing
debug
design for test
authorisation
electronic design automation
embedded instruments
embedded systems
graph coloring problem
graph colouring
graph theory approach
hidden test-data registers
IEEE standards
IEEE Std 1687
IEEE Std. 1687
biblio
An Efficient Location Privacy Scheme for Wireless Multimedia Sensor Networks
Submitted by aekwall on Mon, 10/26/2020 - 11:01am
Routing protocols
Location Privacy in Wireless Networks
wireless multimedia sensor networks
unobservability scheme
Source/Sink Location Anonymity
multimedia processing technique
location privacy scheme
Global Attacks
cross-layer design
Contextual Privacy
Image Processing
Multimedia communication
Compositionality
energy consumption
authentication
delays
Intrusion Detection
multipath routing
telecommunication network routing
Metrics
Routing
privacy
wireless sensor networks
pubcrawl
Human behavior
Resiliency
data encryption
security
data privacy
Cryptography
authorisation
biblio
Linux Security: A Survey
Submitted by aekwall on Mon, 10/26/2020 - 10:46am
password
Linux Operating System Security
Linux security
firewall security
file permissions
File
antivirus
firewall
Predictive Metrics
microsoft windows
authorisation
Business
Metrics
composability
pubcrawl
Resiliency
Linux
invasive software
security
malware
biblio
Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges, and Solutions
Submitted by aekwall on Mon, 10/19/2020 - 11:08am
Key Policy Attribute Based Encryption (KP-ABE)
trust
tradition access control
Scalability
Resiliency
public key cryptography
pubcrawl
privacy protection laws
privacy
KP-ABE
key policy attribute-based encryption
Access Control
hierarchical encryption
encryption
edge computing
Data Security
data privacy
cloud computing service
Cloud Computing
basic ABE
authorisation
attribute-based encryption
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »