Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information technology
biblio
Test Method for Automatic Detection Capability of Civil Aviation Security Equipment Using Bayesian Estimation
Submitted by aekwall on Tue, 04/27/2021 - 1:10pm
Safety
false alarm rate
security
Bayes methods
cyber-physical systems
Resiliency
pubcrawl
detection rate
information technology
Markov processes
estimation
Monte Carlo methods
belief networks
Bayesian estimation
civil aviation security equipment
prohibited items
biblio
Image And Text Encrypted Data With Authorized Deduplication In Cloud
Submitted by grigby1 on Tue, 04/27/2021 - 12:30pm
Software
Secure File Sharing
Role authorized tree
Proxy re-encryption
privacy leakage
Approved deduplication
composability
information technology
Computational modeling
encryption
Resiliency
resilience
Metrics
Human behavior
pubcrawl
Servers
security
Cloud Computing
biblio
Data Sharing Attribute-Based Secure with Efficient Revocation in Cloud Computing
Submitted by grigby1 on Tue, 04/27/2021 - 12:30pm
Human behavior
Security analysis
Secure File Sharing
Resiliency
resilience
pubcrawl
process control
Metrics
information technology
authorization
encryption
Efficient revocation
data privacy
Data encryption key
computer science
composability
Cloud Computing
biblio
Harmonizing IT Frameworks and Agile Methods: Challenges and Solutions for the case of COBIT and Scrum
Submitted by grigby1 on Fri, 04/09/2021 - 11:23am
information technologies infrastructure library
solution
software prototyping
software development management
service CMMI
service capability maturity model
Scrum
Scalability
Resiliency
resilience
pubcrawl
policy-based governance
Metrics
knowledge management
information technology
agile
Information Assurance
independent cases
Human behavior
DP management
digitalization pushes organizations
corresponding previous case study
composability
complex domain
collaboration
COBIT
challenge
Capability maturity model
agile transformation
agile approach
biblio
Identifying indicators of insider threats: Insider IT sabotage
Submitted by grigby1 on Thu, 04/08/2021 - 4:53pm
software engineering
software installation
Sociotechnical
sabotage
Materials
insider threats indicators
insider threat cases
insider IT sabotage
indicators
Educational institutions
chronological timelines
attack planning
Weapons
insider threat
Metrics
information technology
Databases
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
security
Organizations
security of data
biblio
Developing Root Problem Aims to Create a Secure Digital Signature Scheme in Data Transfer
Submitted by aekwall on Mon, 02/08/2021 - 1:44pm
Safety
Scalability
Resiliency
pubcrawl
testing
Mathematical model
digital signatures
Public key
information technology
digital signature
electronic data interchange
Digital signature scheme
expanded root problem
high-security digital signature platform
Root problem
data transfer
biblio
Preventive Techniques of Phishing Attacks in Networks
Submitted by grigby1 on Wed, 02/03/2021 - 2:02pm
malware
Web sites
spam
social engineering
security threats
Scalability
Resiliency
resilience
pubcrawl
phishing attack preventive techniques
Phishing
online businesses
online applications
network security
Anti-phishing
machine learning
internet
information technology
information security
Human Factors
Human behavior
honey pots
Honey Pot
fake Websites
fake applications
Electronic mail
e-hunting websites
Computer crime
biblio
Security Improvement of Cloud Data Using Hybrid Cryptography and Steganography
Submitted by aekwall on Mon, 01/25/2021 - 12:58pm
hashing functions
Steganography
cloud data
security issue
asymmetric cryptography
Asymmetric Encryption
AES symmetric encryption
compressed data
data encryption phase
data validation phase
symmetric cryptography
information concealment technology
LSB algorithm
LZW algorithm
mixed encryption
RSA asymmetric encryption
SHA hashing algorithm
Steganographic
strong data security
data compression
encrypted data
encryption
hybrid encryption
cloud storage
Resiliency
Human behavior
pubcrawl
composability
Metrics
Cloud Computing
public key cryptography
security improvement
Image coding
information technology
cloud environment
Software algorithms
Image Processing
data storage
biblio
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
Submitted by grigby1 on Fri, 01/22/2021 - 1:51pm
encryption
traditional cryptography algorithms
symmetric encryption
symmetric cipher
stream cipher
Salsa20
pseudorandom keys
NIST suite
NIST
lightweight cryptography
information technology
Information systems
hybrid modified lightweight algorithm
generated sequence keys
chaotic cryptography
data communication
cryptography algorithms PRESENT
Cryptography
Constrained Devices
computational complexity
Classification algorithms
Ciphers
cipher algorithm
chaotic system
chaotic communication
block ciphers
2D logistic map
pubcrawl
biblio
The privacy paradigm : An overview of privacy in Business Analytics and Big Data
Submitted by grigby1 on Mon, 12/28/2020 - 12:37pm
Big Data
Technology management
privacy paradigm
GPDR
data mining technologies
dados
business analytics
analytics
big data privacy
Google
Data protection
Companies
privacy
information technology
data privacy
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
business data processing
Data mining
data analysis
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »