Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Law
biblio
A privacy-aware distributed software architecture for automation services in compliance with GDPR
Submitted by grigby1 on Mon, 01/21/2019 - 11:17am
privacy-aware software architecture
human-centric automation
human-machine collaboration
Law
legal regulation
legislation
Metrics
privacy
privacy breach protection
Privacy policy analysis for digital ecosystems
privacy-aware distributed software architecture
human behaviour analysis
pubcrawl
Resiliency
robots
secure communication
Security and Privacy in Digital Ecosystems
Software Architecture
virtualisation
virtualization privacy
virtualization techniques
distributed processing
authorisation
authorization
automation
automation services
Automation systems
composability
Cryptography
data breaches
Data protection
Databases
ART
distributes services
encryption
end-to-end encryption
EU citizens
factory automation
factory domain
GDPR compliance
General Data Protection Regulation
Human behavior
biblio
A generic framework for information security policy development
Submitted by grigby1 on Mon, 04/30/2018 - 2:26pm
Law
security policy development
security policy content
security policies
security of data
risk management
replicated policy
pubcrawl
Organizations
maintenance engineering
education
information security policy development process
information security policy
information security policies
information security
improper development process
higher education institutions
generic framework
further education
biblio
A study of intellectual property protection for mass innovation spaces
Submitted by grigby1 on Tue, 01/23/2018 - 2:21pm
ip protection
Technological innovation
standards
Resiliency
pubcrawl
policy-based governance
Policy
patents
mass innovation space innovative development
Mass Innovation Space
mass entrepreneurship and innovation
Law
collaboration
Intellectual Property Service Standards
Intellectual Property Protection
intellectual property
intellectual cluster management innovation
innovation management
industrial property
industrial economics
Entrepreneurship
economic model
Conferences
composability
biblio
Identifying Personal DNA Methylation Profiles by Genotype Inference
Submitted by grigby1 on Tue, 01/23/2018 - 1:54pm
Human behavior
whole-genome sequencing
Resiliency
pubcrawl
privacy-sensitive data
privacy
predictive medicine
personalized medicine
personal DNA methylation profiles
Metrics
medical computing
Law
inference mechanisms
human health
bioinformatics
health care
genotype inference
genomics
genomic data
epigenetic element
DNA methylation data
DNA cryptography
DNA
data privacy
Cryptography
cryptographic scheme
Cancer
biomedical research community
biblio
DDOS Attack Detection System Based on Analysis of Users' Behaviors for Application Layer
Submitted by grigby1 on Tue, 01/16/2018 - 5:24pm
pubcrawl
feature extraction
Human behavior
internal attackers
internal threats detection
Intrusion Detection
Law
Markov processes
Metrics
DTMC
query processing
Resiliency
Servers
SQL
SQL queries
User behavior
users behaviors analysis
database system
Anomaly Detection
anomaly detection system
Application Layer
behavior features extraction
composability
Computer crime
computer network security
database management systems
anomaly behavior
Databases
DDoS attack detection
DDOS attack detection system
discrete-time markov chain
discrete-time Markov chains
distributed denial of service attack
distributed denial of service attacks
biblio
Detecting phishing attacks from URL by using NLP techniques
Submitted by K_Hooper on Wed, 01/10/2018 - 10:15am
natural language processing
URL
unsolicited e-mail
Uniform resource locators
security of data
Scalability
Resiliency
random forest algorithm
pubcrawl
Postal services
phishing attack analysis report
phishing attack
NLP
natural language processing techniques
Computer crime
Nanoelectromechanical systems
Markov processes
machine learning-based system
machine learning
learning (artificial intelligence)
Law
Internet users
internet
Human behavior
cyber security
cyber attack threats
Cyber Attack Detection
biblio
Privacy and Security: How to Differentiate Them Using Privacy-Security Tree (PST) Classification
Submitted by grigby1 on Thu, 12/28/2017 - 12:34pm
Metrics
security of data
Science of Security
Scalability
Resiliency
pubcrawl
PST classification
privacy-security tree classification
privacy
Policy-Governed Secure Collaboration
pattern classification
authentication
Law
information system domain
information security
information privacy
Human Factors
Human behavior
Data protection
data privacy
composability
collaboration
biblio
Deploying Honeypots and Honeynets: Issue of Privacy
Submitted by grigby1 on Wed, 03/08/2017 - 1:38pm
IP networks
security
pubcrawl170114
privacy
network security
network forensics
Monitoring
legal issues
legal framework
Law
Data collection
honeypots
honeypot
honeynets
honeynet
EU law
Digital Forensics
data retention
Data processing
data privacy
biblio
Recovery of Evidence and the Judicial Identification of Electronic Data Based on ExFAT
Submitted by grigby1 on Tue, 03/07/2017 - 12:41pm
ExFAT
pubcrawl170109
process monitoring
media mirror
legal effect
lawsuit
Law
judicial identification
hash authentication
Forensics
File systems
file location algorithm
file locating
file character code algorithm
file character code
ExFAT file system
Algorithm design and analysis
evidence recovery
electronic data recovery forensics
electronic data
document fragment reassembly algorithm
document fragment
Distributed Bragg reflectors
digital signatures
digital multisignature
Digital Forensics
destroyed situation
data recovery
Data models
Cryptography
Computer crime
Classification algorithms
biblio
An efficient remote mutual authentication scheme using smart mobile phone over insecure networks
Submitted by grigby1 on Tue, 03/07/2017 - 12:37pm
session key agreement scheme
password change operation
Protocols
pubcrawl170109
remote mutual authentication protocol
remote server
secure connection
security attacks
Servers
OFMC
smart cards
smart mobile phone
Smart Mobile Phones
smart phones
telecommunication security
user anonymity
user-server impersonation attacks
Law
AVISPA
AVISPA simulator tool
CL-AtSe back-ends
Computer crime
Cryptographic Protocols
insecure networks
insider attack
key secrecy
authentication
MAS
message authentication
mobile application software
mobile computing
mobile radio
mobile user
off-line identity-password guessing attacks
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »