Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Handheld computers
biblio
Differential-Privacy-Based Correlation Analysis in Railway Freight Service Applications
Submitted by grigby1 on Tue, 02/06/2018 - 1:43pm
Knowledge Discovery
Scalability
Resiliency
railway freight service
pubcrawl
privacy protection
privacy
Policy
Metrics
Algorithm design and analysis
Human Factors
Handheld computers
Distributed databases
differential privacy
data sharing
data privacy
big data privacy
apriori
biblio
Prevention of DDoS attacks in cloud environment
Submitted by grigby1 on Thu, 12/28/2017 - 1:37pm
endowment technological data
utility computing
touchy data
Science of Security
Scalability
Resiliency
pubcrawl
Policy-Governed Secure Collaboration
Metrics
Human Factors
Human behavior
honeypot
Handheld computers
gigantic curiosity
Big Data
distributed denial of service
distributed computing
DDoS Defence procedures
DDoS Attack Prevention
DDoS Attack
computer network security
computational intelligence
computational assets
composability
collaboration
cloud services
cloud environment
Cloud Computing
biblio
A more secure scheme for CAPTCHA-based authentication in cloud environment
Submitted by grigby1 on Wed, 12/20/2017 - 1:03pm
Phishing
human beings
Human Factors
information technology
message authentication
modified characters
on-demand network access
passkey
password guessing
password-based authentication
Human behavior
pubcrawl
salted hashes
secure scheme
security-related issues
short-password attack
single password
social engineering
user authentication
composability
authentication mechanism
authorisation
CAPTCHA
CAPTCHA-based authentication
captchas
Cloud Computing
cloud environment
cloud provider
cloud providers
authentication
Computer crime
configurable adaptive resources
critical security function
Cryptography
Dictionaries
dictionary attack
elastic collection
Handheld computers
biblio
Autonomic computing meets SCADA security
Submitted by grigby1 on Tue, 12/12/2017 - 1:22pm
architecture
Autonomic computing
Autonomic Security
computer architecture
computer security
critical infrastructures
Cyber Attacks
Handheld computers
machine learning
Metrics
pubcrawl
Resiliency
SCADA Security
SCADA systems
Scalability
Transportation
biblio
#x201C;Role of metadata in forensic analysis of database attacks #x201C;
Submitted by BrandonB on Wed, 05/06/2015 - 1:55pm
fraudulent transaction
trail obfuscation
table storage
SQL injection
security issue
reconnaissance attack
privacy issue
open source database forensics tool
online activities
metadata
meta data
linked hash technique
Law
information retrieval
Information analysis
Handheld computers
anti-forensics attacks
forensic analysis
e-transactions
digital notarization
Digital Forensics
digital evidence
database server artifacts
database security breaches
database forensics
database attacks
data privacy
court of law
Conferences
cache
audit logs
antiforensics attacks
biblio
A unified model for cherishing privacy in database system an approach to overhaul vulnerabilities
Submitted by BrandonB on Thu, 04/30/2015 - 3:01pm
Inference Detection
security policy
security of data
security
privacy cherished database architecture model
intrusion tolerance subsystem
intrusion thwarting
Intrusion Detection
inference thwarting
data privacy
Handheld computers
Decision support systems
database system privacy
database static protection
Database Security Configurations
Database Security
database management systems
biblio
A unified model for cherishing privacy in database system an approach to overhaul vulnerabilities
Submitted by BrandonB on Thu, 04/30/2015 - 3:01pm
Inference Detection
security policy
security of data
security
privacy cherished database architecture model
intrusion tolerance subsystem
intrusion thwarting
Intrusion Detection
inference thwarting
data privacy
Handheld computers
Decision support systems
database system privacy
database static protection
Database Security Configurations
Database Security
database management systems
biblio
A unified model for cherishing privacy in database system an approach to overhaul vulnerabilities
Submitted by BrandonB on Thu, 04/30/2015 - 3:01pm
Inference Detection
security policy
security of data
security
privacy cherished database architecture model
intrusion tolerance subsystem
intrusion thwarting
Intrusion Detection
inference thwarting
data privacy
Handheld computers
Decision support systems
database system privacy
database static protection
Database Security Configurations
Database Security
database management systems
biblio
Monitoring Translation Lookahead Buffers to Detect Code Injection Attacks
Submitted by BrandonB on Thu, 04/30/2015 - 2:10pm
hackers
translation lookahead buffers monitoring
TLB
system monitoring
security
memory pages identification
legitimate code injection attack
invasive software
Handheld computers
blocks malicious injected code activation
external I/O operations
Decision support systems
data execution prevention
Computer crime
code injection attack detection
Code injection
Buffer storage
« first
‹ previous
1
2
3