Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Internet applications
biblio
A Access Control Model of Associated Data Sets Based on Game Theory
Submitted by aekwall on Mon, 09/21/2020 - 2:48pm
cyber-physical systems
Control Theory and Privacy
sensitive information owner
sensitive information divulgence
privacy protection issue
privace protection
Nash equilbrium
Internet applications
associated data sets protection model
associated data sets
access control model
cyber physical systems
Games
Scalability
Analytical models
internet
privacy
pubcrawl
Human behavior
Resiliency
Data models
game theory
data privacy
Access Control
authorisation
biblio
Front-End IoT Application for the Bitcoin based on Proof of Elapsed Time (PoET)
Submitted by grigby1 on Fri, 09/04/2020 - 2:58pm
key location
complete block
constructive exchanges
elapsed time
front-end applications
front-end IoT application
front-end Web applications
Internet applications
IoT
block-dependent IoT applications
mandatory IoT gadget
neighborhood gadget
PoET
possible designs
registry agreements
remote Bitcoin customers
remote blockchain client
remote server
financial data processing
data privacy
Scalability
internet
blockchain
pubcrawl
Human behavior
cryptocurrencies
bitcoin
Internet of Things
bitcoin security
active exchanges
BC IoT
Bitcoin block chain customer
Bitcoin distributor
Bitcoin store
block block
biblio
Evaluation of Web Security Mechanisms Using Vulnerability amp; Attack Injection
Submitted by BrandonB on Thu, 04/30/2015 - 2:06pm
security
Web application security mechanism evaluation
vulnerability-&-attack injector tool
vulnerability injection methodology
VAIT
TV
SQL Injection attacks
SQL
software fault tolerance
Software
security of data
attack injection methodology
review and evaluation
Probes
intrusion detection system
Internet applications
internet
Input variables
Fault injection
fault diagnosis
Educational institutions
Databases
biblio
Analysis of Field Data on Web Security Vulnerabilities
Submitted by BrandonB on Thu, 04/30/2015 - 2:03pm
security of data
XSS
Web security vulnerabilities
Web application vulnerabilities
vulnerability scanners
static code analyzers
SQL injection
SQL
source code (software)
source code
software faults
software fault tolerance
Software
security patches
attack injectors
security mechanisms
security
review and evaluation
realistic vulnerability
languages
Java
Intrusion Detection Systems
Internet applications
internet
field data analysis
code inspectors
Blogs
Awards activities