Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
confidentiality
biblio
Survey on data remanence in Cloud Computing environment
Submitted by grigby1 on Wed, 01/10/2018 - 12:38pm
IT concept
Virtualization
virtual machines
Servers
security of data
sanitization
Resiliency
remanence
pubcrawl
privacy
Policy
outsourced sensible data
Media
Cloud Computing
Human Factors
Human behavior
encryption
Data Sanitization
data remanence
Cryptography
confidentiality
Compositionality
collaboration
cloud provider server
cloud computing security
cloud computing environment
biblio
Security vulnerability analysis of design-for-test exploits for asset protection in SoCs
Submitted by grigby1 on Tue, 12/12/2017 - 1:31pm
integrity
test structures
system-on-chips
system-on-chip
SoC integration
Security Policies Analysis
secure microprocessors
secret keys
pubcrawl
policy-based governance
memory read-write functions
Logic gates
IP networks
internal modules
asset protection
information leakage vulnerabilities
encryption algorithms
encryption
Discrete Fourier transforms
design-for-test exploits
design for testability
Cryptography
Controllability
control finite state machines
confidentiality
collaboration
availability policies
automated security vulnerability analysis framework
biblio
Security challenges and methods for protecting critical infrastructure cyber-physical systems
Submitted by grigby1 on Tue, 12/12/2017 - 1:28pm
denial of service
weak information security applications
sensors
security of data
security
Scalability
Resiliency
replay
pubcrawl
Protocols
Modbus
integrity
integrated circuits
information technology systems
Information Assurance
Industrial Control Systems
agent based game theoretic
cyber-physical systems
cyber-physical attackers
cyber-physical adversary
cyber attackers
critical infrastructures
critical infrastructure cyber-physical systems
CPS system
covert communications channel
covert channels
confidentiality
Computer crime
Compositionality
Communication networks
attack tree
biblio
Generated Un-detectability Covert Channel Algorithm for Dynamic Secure Communication Using Encryption and Authentication
Submitted by grigby1 on Tue, 12/12/2017 - 1:28pm
fake key
un-detectability
telecommunication security
telecommunication channels
Servers
Scalability
Resiliency
pubcrawl
Protocols
message authentication
Heuristic algorithms
hashed message authentication code
generated un-detectability covert channel algorithm
advanced encryption standard
encryption
dynamically
dynamic secure communication
cryptography algorithms
Cryptography
covert channels
covert channel
confidentiality
Compositionality
authentication
Algorithm
biblio
A Design and Verification Methodology for Secure Isolated Regions
Submitted by grigby1 on Mon, 05/22/2017 - 1:42pm
channel coding
composability
confidentiality
confinement
Enclave Programs
formal verification
Human behavior
pubcrawl
Resiliency
Secure computation
Securing Compilers
biblio
STYX: Stream Processing with Trustworthy Cloud-based Execution
Submitted by grigby1 on Tue, 05/16/2017 - 12:45pm
composability
confidentiality
IoT
pubcrawl
Stream data processing
trustworthiness
trustworthy
biblio
On implementing a client-server setting to prevent the Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext (BREACH) attacks
Submitted by grigby1 on Thu, 04/20/2017 - 12:43pm
Dictionaries
Bandwidth
BREACH attack
BREACH attacks
browser reconnaissance and exfiltration via adaptive compression of hypertext attacks
Browsers
client-server setting
client-server systems
Compression
Compression algorithms
confidentiality
Cryptographic Protocols
Cryptography
data compression
Data protection
DEFLATE compression algorithm
Web traffic
encoding
encryption
fixed-dictionary compression
high-value secrets protection
HTTP compression
Network reconnaissance
plaintext
pubcrawl
Resiliency
security
security model
Servers
SSL/TLS
TLS protocol
transport protocols
biblio
"Approach to Enhancing Concurrent and Self-Reliant Access to Cloud Database: A Review"
Submitted by grigby1 on Thu, 02/23/2017 - 12:54pm
encryption algorithm
storage management
Servers
self-reliant access
security
pubcrawl170105
Protected Database-as-a-Service
power station
multiple geographically distributed clients
multiple business
metadata storage
metadata
meta data
Master key
Advance Encryption Standard
encryption
Distributed databases
database-as-a-service
database management
database installation
customer services
Cryptography
confidentiality
concurrent access
concurrency (computers)
commerce
cloud database
Cloud Computing
biblio
Towards robust, scalable and secure network storage in Cloud Computing
Submitted by BrandonB on Wed, 05/06/2015 - 2:11pm
security of data
networking
on-demand access
operating system
pay per use model
privacy
proactive security
RAID
remote application access
remote service access
robust scalable secure network storage
network storage architecture
server
Servers
service availability
service outsourcing
storage management
ubiquitous computing
ubiquitous next generation information technology architecture
virtualisation
Virtualization
data integrity
authentication
Availability
built in security
client overhead
Cloud Computing
cloud computing environment
cloud service provider
Compliance
computer architecture
confidentiality
adaptive security
data privacy
Data Security
data sharing
data storage
Distributed databases
information centric security
integrity
internet
middleware
biblio
Overview on vehicular ad hoc network and its security issues
Submitted by BrandonB on Wed, 05/06/2015 - 8:52am
telecommunication switching
safekeeping
Safety
security
security issues
self-configurable network connectivity
signal-weakening barrier
telecommunication network routing
telecommunication security
Roads
travel comfort
unauthorized message injection
VANET
vehicles
vehicular ad hoc networks
Vehicular ad-hoc networks (VANET)
vehicular communications
wireless links
eavesdropping
attacks
authentication
Availability
Computer crime
confidentiality
Cryptography
data privacy
data trust
active safety enhancement
information exchange
information transmission
message alteration
message routing
non-repudiation
Position based routing
preventive safety enhancement
privacy
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »