Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security issue
biblio
Security Improvement of Cloud Data Using Hybrid Cryptography and Steganography
Submitted by aekwall on Mon, 01/25/2021 - 11:58am
hashing functions
Steganography
cloud data
security issue
asymmetric cryptography
Asymmetric Encryption
AES symmetric encryption
compressed data
data encryption phase
data validation phase
symmetric cryptography
information concealment technology
LSB algorithm
LZW algorithm
mixed encryption
RSA asymmetric encryption
SHA hashing algorithm
Steganographic
strong data security
data compression
encrypted data
encryption
hybrid encryption
cloud storage
Resiliency
Human behavior
pubcrawl
composability
Metrics
Cloud Computing
public key cryptography
security improvement
Image coding
information technology
cloud environment
Software algorithms
Image Processing
data storage
biblio
LuNet: A Deep Neural Network for Network Intrusion Detection
Submitted by grigby1 on Fri, 05/08/2020 - 1:43pm
recurrent neural nets
Metrics
network attack
network intrusion detection
network intrusion detection techniques
network traffic data
network traffic datasets
network users
Neural Network Security
policy-based governance
pubcrawl
machine learning
recurrent neural network
Recurrent neural networks
Resiliency
security issue
signature-based approach
spatial features
telecommunication traffic
temporal features
Training
feature extraction
AI-based solutions
Artificial Neural Networks
collaboration
computer network security
convolutional neural nets
convolutional neural network
cyber physical systems
Deep Neural Network
detection capability
advanced network attacks
hierarchical CNN+RNN neural network
input traffic data learning
intelligent capability
Intrusion Detection
intrusion detection system
Kernel
large scale network
learning (artificial intelligence)
LuNet
biblio
Architecture for security monitoring in IoT environments
Submitted by grigby1 on Tue, 12/12/2017 - 12:30pm
IoT
architecture
composability
computer network security
Data collection
data exchange
electronic data interchange
embedded systems
Human behavior
Human Factors
image sensors
innovative topology paradigm
Internet of Things
Internet-of-Things
video surveillance technology
IoT environments
IoT security
IoT technology
Metrics
Monitoring
network topology
pubcrawl
Resiliency
security issue
security monitoring
telecommunication network topology
video data transmission
video surveillance
biblio
A Novel PUF Based SST to Prevent Distribution of Rejected ICs from Untrusted Assembly
Submitted by grigby1 on Wed, 03/08/2017 - 1:33pm
intellectual property infringement
untrusted assembly packaging and test
security issue
secure split test
rejected IC distribution
PUF based SST
pubcrawl170112
Physical Unclonable Function
partially functional chip
intellectual property rights
connecticut sst
integrated circuit manufacture
integrated circuit cloning
Information systems
industrial property
hardware metering
faulty chip
counterfeiting
copy protection
biblio
#x201C;Role of metadata in forensic analysis of database attacks #x201C;
Submitted by BrandonB on Wed, 05/06/2015 - 12:55pm
fraudulent transaction
trail obfuscation
table storage
SQL injection
security issue
reconnaissance attack
privacy issue
open source database forensics tool
online activities
metadata
meta data
linked hash technique
Law
information retrieval
Information analysis
Handheld computers
anti-forensics attacks
forensic analysis
e-transactions
digital notarization
Digital Forensics
digital evidence
database server artifacts
database security breaches
database forensics
database attacks
data privacy
court of law
Conferences
cache
audit logs
antiforensics attacks
biblio
A secured distributed OCR system in a pervasive environment with authentication as a service in the Cloud
Submitted by BrandonB on Thu, 04/30/2015 - 1:18pm
multiprocessing
vocabularies
security of data
security issue
security
secured distributed OCR system
recognition process
pervasive environment
Pattern recognition
Optical character recognition software
optical character recognition
natural language processing
authentication
mobile environment
mobile computing
Mobile communication
Distributed OCR system
distributed computing technologies
distributed Arabic optical character recognition
Computational modeling
cloud computing technology
Cloud Computing
authentication as a service