Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Licenses
biblio
A Vehicle Trajectory Adversary Model Based on VLPR Data
Submitted by aekwall on Mon, 08/03/2020 - 10:38am
traffic engineering computing
qualified identifier attributes
Resiliency
road average speed
road traffic
road vehicles
Roads
Scalability
target trajectory
pubcrawl
Trajectory
trajectory linking
vehicle information
vehicle license plate recognition data
vehicle suspicion list
vehicle trajectory adversary model
VLPR system
image recognition
Adversary Modeling
Adversary Models
closest time method
Data models
data privacy
desensitized VLPR data
Foshan City VLPR data
Human behavior
adversary model
ITS
Licenses
Metrics
privacy
privacy attacking method
privacy disclosure
privacy protection
biblio
A New Pay-Per-Use Scheme for the Protection of FPGA IP
Submitted by grigby1 on Thu, 07/30/2020 - 1:53pm
complex FPGA designs
ip protection
reusable intellectual property design blocks
Physical Unclonable Function
pay-per-use
IP instance
IP infringement
FSM
FPGA IP vendor
FPGA IP protection
finite state machine
Field-Programmable Gate Arrays
Design methodology
copy protection
logic design
application specific integrated circuits
finite state machines
Licenses
composability
PUF
industrial property
field programmable gate arrays
Resiliency
resilience
policy-based governance
pubcrawl
IP networks
security
biblio
Comparative Evaluations of Privacy on Digital Images
Submitted by aekwall on Mon, 04/20/2020 - 10:24am
differential privacy
privacy models and measurement
societal issue
personal privacy analysis
digital images
comparative evaluations
privacy measurement
Face
Sensitivity
data privacy
social networks
Metrics
social networking (online)
Licenses
privacy
privacy preservation
pubcrawl
feature extraction
biblio
Comparative Evaluations of Privacy on Digital Images
Submitted by aekwall on Mon, 04/20/2020 - 10:24am
differential privacy
privacy models and measurement
societal issue
personal privacy analysis
digital images
comparative evaluations
privacy measurement
Face
Sensitivity
data privacy
social networks
Metrics
social networking (online)
Licenses
privacy
privacy preservation
pubcrawl
feature extraction
biblio
Blockchain-Based Management of Video Surveillance Systems
Submitted by aekwall on Mon, 04/13/2020 - 10:27am
video surveillance system
video metadata
trusted internal managers
private DB
internal manager
DRM-applied video player
decryption key
data forgery
blockchain-based management
blockchain system
blockchain network
Hyperledger Fabric
IPFS
Fabrics
authorisation
video surveillance
Streaming media
meta data
distributed ledger
blockchain
Metrics
Peer-to-peer computing
Licenses
pubcrawl
Human behavior
Resiliency
Cryptography
biblio
CAG: Compliance Adherence and Governance in Software Delivery Using Blockchain
Submitted by grigby1 on Fri, 04/03/2020 - 12:04pm
SDLC
License verification
Licenses
litigations
metadata
noncomplaint license software
nonconformant behavior
open source components
open-source software components
Policy Based Governance
pubcrawl
public domain software
Libraries
security risks
smart contracts
Software
software delivery
software development life cycle
software development management
software engineering
standard compliances
technical challenges
vulnerability assessment
decentralized CAG
blockchain
blockchain technologies
building software
client industry
collaboration
compliance adherence and governance
compliance specifications
contracts
copyright issues
Crowd Sourcing
cryptocurrencies
auditing
development activities
disparate sources
distributed teams
economic challenges
extraordinary amounts
functional specifications
geographically distributed teams
Global Software Development
legislation
level agreements
biblio
Cross Site Scripting: Investigations in PHP Web Application
Submitted by aekwall on Mon, 12/16/2019 - 2:17pm
PHP Web application
XSS
World Wide Web
web security
Web application utilisation
tools
static analysis
Servers
security of data
Scalability
resilience
pubcrawl
-Software-Security
PHP technology
Licenses
internet
Human behavior
Cross-Site-Scripting
cross-site scripting
Cross Site Scripting
Browsers
-XSS
-Web-Application-Security
-Vulnerability
biblio
Enumerating Active IPv6 Hosts for Large-Scale Security Scans via DNSSEC-Signed Reverse Zones
Submitted by grigby1 on Wed, 10/30/2019 - 10:52am
Licenses
ZMap
unintended IPv6 connectivity
sensitive data exposure
Security by Default
security
Scalability
RNA
Revere DNS (rDNS)
Resiliency
resilience
pubcrawl
privacy
principal component analysis
network scanning
Network reconnaissance
computer network security
large-scale security scans
IPv6 hosts
IPv6 address space
IPv6
IPv4 hosts
IP networks
internet-wide scans
Internet-connected devices
Internet of Things devices
Internet of Things
internet
integrated circuits
DNSSEC-signed IPv6 reverse zones
DNSsec
DNS
biblio
Choice of Control Parameters of Complex System on the Basis of Estimates of the Risks
Submitted by grigby1 on Wed, 10/23/2019 - 12:36pm
patents
Security Risk Estimation
security
search problems
Scalability
risk estimation
risk analysis
Resiliency
resilience
rational managing directors
Qualifications
pubcrawl
Personnel
asset management
minimization of risk
Metrics
Meteorology
Licenses
intangible assets
Human Factors
Human behavior
group of the operating factors
estimation
estimate of the risk of functioning
criteria factor
biblio
Novel Sybil Defense Scheme for Peer–to–peer Applications
Submitted by aekwall on Mon, 02/18/2019 - 12:58pm
peer–
trusted nodes
to–
sybil nodes
sybil defense scheme
sybil attacks
Sybil attack
Social network services
simulation
Servers
resource management
radio frequency allocation incensing
pubcrawl
proactive
peer to peer security
peer-to-peer network overlays
Peer-to-peer computing
peer
p2p
overlay networks
Metrics
malicious data
logically connected hosts
Licenses
data availability
computer network security
composability
component
« first
‹ previous
1
2
3
next ›
last »