Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information technology
biblio
Data Security and Confidentiality in Public Cloud Storage by Extended QP Protocol
Submitted by grigby1 on Thu, 05/24/2018 - 12:24pm
public cloud storage
internet
outsourcing
outsourcing protocol
Policy
privacy
Privacy Policies
Protocols
pubcrawl
integrity
QP Protocol
Quadratic programming
Scalability
secure outsourcing
secure protocol
security of data
storage management
clients cloud provider
information technology
Human behavior
encryption
data storage
data security correctness
data privacy
data confidentiality
confidentiality
computer user
computer system
cloud technology
cloud computing technology
cloud computing data storage technology
Cloud Computing
cloud access
biblio
A Framework for Cognitive Recommender Systems in the Internet of Things (IoT)
Submitted by grigby1 on Thu, 05/24/2018 - 12:10pm
Internet of Things(IoT)
Servers
sensors
Scalability
Resiliency
resilience
recommender systems
pubcrawl
peer-to-peer networks
Peer-to-peer computing
IoT
cognitive radio
Internet of Things
information technology
Human Factors
Human behavior
Engines
cognitive systems
cognitive system
cognitive recommender systems
cognitive radio networks
biblio
Sybil attack in IOT: Modelling and defenses
Submitted by K_Hooper on Wed, 05/02/2018 - 10:41am
legitimate nodes
trust value
Throughput
sybil nodes
sybil attacks
security
Routing protocols
Routing
Resiliency
pubcrawl
Peer-to-peer computing
neighbouring nodes
Metrics
ad hoc on-demand distance vector
IoT network
Internet of Things
information technology
enhanced AODV protocol
EAODV protocol
EAODV
delays
defense mechanism
computer network security
composability
behavioural profiling
AODV
biblio
Studying cyber security threats to web platforms using attack tree diagrams
Submitted by K_Hooper on Wed, 02/14/2018 - 11:59am
information technology
WordPress vulnerabilities
WordPress platform
Web platforms
Web platform
trees (mathematics)
security threats
security personnel
security of data
Scalability
Resiliency
pubcrawl
Organizations
Open Source Software
Metrics
internet
artificial intelligence security
information systems designers
Information systems
Human behavior
graphical analysis
global reference system
cyber-attack
cyber security threats
Computers
computer system
computer security threats
computer security
common vulnerabilities
Attack Tree method
attack tree diagrams
attack tree
biblio
A Communication Security Protocol for Ubiquitous Sensor Networks
Submitted by grigby1 on Tue, 02/06/2018 - 1:54pm
Metrics
wireless sensor networks
ubiquitous sensor networks
ubiquitous network system
Ubiquitous Computing Security
ubiquitous computing
telecommunication security
security
Scalability
Resiliency
Public key
pubcrawl
Protocols
privacy
Access Credential
Medical services
Logic gates
key exchange computation process
information technology
Human Factors
Human behavior
gateway
Cryptography
cryptographic access
communication security protocol
communication protocol
cipher content
authentication
biblio
Ransomware: The CryptoVirus Subverting Cloud Security
Submitted by grigby1 on Tue, 02/06/2018 - 1:54pm
security
malware
Metrics
pubcrawl
Ransomware
ransomware attack
ransomware vulnerabilities
Resiliency
Scalability
IT security specialists
security effectiveness
security threat
Servers
threats
ubiquitous computing
Ubiquitous Computing Security
ubiquitous environment
vulnerabilities
cloud threat mechanisms
business enterprises
cloud
Cloud architecture
Cloud Computing
cloud network
cloud platforms
Cloud Security
cloud technology
Business
computer architecture
computer viruses
Cryptography
CryptoVirus
disparate locations
Human behavior
Human Factors
information technology
biblio
Chaos-based video steganography
Submitted by grigby1 on Wed, 12/27/2017 - 1:08pm
Metrics
video coding
Tinkerbell 2D chaotic map
Tinkerbell
Steganography
shift registers
Resiliency
randomized data hiding points
pubcrawl
PSNR
NonLinear Feedback Shift Register
nonlinear dynamics physics
NLFSR
Mutual information
chaos
information technology
Image Steganography
Image color analysis
frame embedding position
data hiding limit
data hiding
Cryptography
composability
chaotic map
chaotic cryptography
chaotic communication
chaos-based video steganography mechanism
biblio
A more secure scheme for CAPTCHA-based authentication in cloud environment
Submitted by grigby1 on Wed, 12/20/2017 - 1:03pm
Phishing
human beings
Human Factors
information technology
message authentication
modified characters
on-demand network access
passkey
password guessing
password-based authentication
Human behavior
pubcrawl
salted hashes
secure scheme
security-related issues
short-password attack
single password
social engineering
user authentication
composability
authentication mechanism
authorisation
CAPTCHA
CAPTCHA-based authentication
captchas
Cloud Computing
cloud environment
cloud provider
cloud providers
authentication
Computer crime
configurable adaptive resources
critical security function
Cryptography
Dictionaries
dictionary attack
elastic collection
Handheld computers
biblio
On the Possibility of Insider Threat Prevention Using Intent-Based Access Control (IBAC)
Submitted by grigby1 on Tue, 12/12/2017 - 1:23pm
motivation detection
Insider Threats
intellectual property
intent authentication
intent-based access control
intention detection
involuntary electroencephalogram reactions
malicious insiders
Metrics
insider threat prevention
nonidentity-based authentication
P300
physiology
policy-based governance
pubcrawl
Resiliency
Terrorism
Human behavior
Accuracy
authentication
authorisation
brain signals
collaboration
electroencephalogram (EEG)
electroencephalography
event-related potential (ERP)
Access Control
Human Factors
IBAC
identity enrolment
identity recognition
industrial property
information technology
insider threat
biblio
Autonomic and Integrated Management for Proactive Cyber Security (AIM-PSC)
Submitted by grigby1 on Tue, 12/12/2017 - 1:22pm
automation
Autonomic Security
behavior analysis
cyber security
Data Analytics
information technology
machine learning
Metrics
network security
pubcrawl
Resiliency
Scalability
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
next ›
last »