Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
user privacy
biblio
Privacy Smells: Detecting Privacy Problems in Cloud Architectures
Submitted by grigby1 on Thu, 07/08/2021 - 1:35pm
privacy
user privacy in the cloud
Quantifying privacy
privacy metrics
data flow analysis
Cloud Privacy
cloud
Measurement
user privacy
web services
computer architecture
Scalability
Resiliency
resilience
Metrics
pubcrawl
Monitoring
Cloud Computing
tools
biblio
Identity-based Secret Sharing Access Control Framework for Information-Centric Networking
Submitted by aekwall on Thu, 04/08/2021 - 3:29pm
IBS
Information Centric Networks
polynomials
user privacy
secret sharing
telecommunication network planning
Identity-based encryption
content distribution
IBE
information-centric networking
IBSS
identity-based secret sharing access control framework
next generation network design
polynomial degree
request-response communication mode
secure identity encryption
Shamir's secret sharing method
pubcrawl
Scalability
Access Control
authorisation
authorization
Cryptography
encryption
data privacy
Resiliency
computer network security
privacy
internet
delays
user identity
Next generation networking
next generation networks
ICN
biblio
High-Performance Monitoring Sensors for Home Computer Users Security Profiling
Submitted by grigby1 on Tue, 03/30/2021 - 11:05am
Monitoring
user security profile
User profiling
user privacy
user modelling
software agents
sensors
security profile
security
Risky Behaviours
Real-time User Behaviour Monitoring
real-time systems
Python
pubcrawl
privacy
computer security
machine learning
learning (artificial intelligence)
Implicit Modeling
Human Factors
human computer interaction
Human behavior
home computing
home computer users security profiling
High-Performance Sensors
high-performance monitoring sensors
high-performance intelligent agent
decision making model
Decision Making
Cybersecurity
biblio
IoT-APIScanner: Detecting API Unauthorized Access Vulnerabilities of IoT Platform
Submitted by grigby1 on Wed, 01/20/2021 - 3:22pm
IoT security
Web API
user privacy
unauthorized access
tools
timing
Task Analysis
Smart homes
security
Resiliency
resilience
pubcrawl
program testing
permission verification
IoT-APIScanner
API
IoT devices
Internet of Things
formal verification
data privacy
Compositionality
cloud services
Cloud Computing
cloud API
authorisation
application programming interface
application program interfaces
APIs
API unauthorized access vulnerability detection
API test cases
biblio
Big Data Encryption Technology Based on ASCII And Application On Credit Supervision
Submitted by grigby1 on Mon, 12/28/2020 - 11:39am
data utilization
user privacy
user payment information
Scalability
Resiliency
resilience
pubcrawl
Metrics
market supervision business
Licenses
Internet of Things
Human behavior
financial data processing
Electronic mail
electronic data interchange
Desensitization
Artificial Intelligence
data privacy
data leakage
Data Governance
data desensitization technology
Cryptography
Cross-Platform
credit supervision application
Credit Supervision
credit construction
Conferences
BIGDATA
big data privacy
Big Data encryption technology
Big Data
ASCII
biblio
An approach to Privacy on Recommended Systems
Submitted by aekwall on Mon, 10/12/2020 - 10:31am
user security
Expert Systems and Privacy
users personal information
referral systems
recommended systems
privacy protection techniques
online companies
website
expert systems
Europe
recommender systems
user privacy
Human Factors
security
data privacy
Companies
social networks
Data protection
internet
social networking (online)
Facebook
privacy
pubcrawl
Human behavior
History
Scalability
biblio
Achieving Secure and Effective Search Services in Cloud Computing
Submitted by aekwall on Mon, 09/28/2020 - 10:55am
cloud services
Computing Theory and Privacy
WMFS scheme
wildcard-based multikeyword fuzzy search scheme
wildcard
substring matching
secure fuzzy search schemes
search services
search patterns
keyword misspellings
fuzzy search
database indexing
file organisation
Dictionaries
user privacy
Cloud Computing
Indexes
fuzzy set theory
data structures
query processing
pubcrawl
Human behavior
Resiliency
searchable encryption
data privacy
encryption
encrypted data
Cryptography
Scalability
biblio
Incentive Mechanism for User Collaboration on Trajectory Privacy Preservation
Submitted by aekwall on Mon, 09/28/2020 - 10:54am
Incentive mechanism
Computing Theory and Privacy
user payoff
user collaboration incentive mechanism
trajectory privacy
Repeated game
rational users
game analysis
CTPP
continuous query users
collaborative user behaviour
collaborative trajectory privacy preservation
location based services
LBS
Scalability
Trajectory
user privacy
Games
collaboration
Analytical models
query processing
privacy
pubcrawl
Human behavior
Resiliency
game theory
data privacy
Servers
biblio
Robust and Responsive Acoustic Pairing of Devices Using Decorrelating Time-Frequency Modelling
Submitted by aekwall on Mon, 08/03/2020 - 9:16am
Acoustic Fingerprinting
Acoustic Fingerprints
voice-related information
voice user interfaces
Voice User Interface
unified voice user interface
time-frequency representation
natural interaction
decorrelation
decorrelating time-frequency modelling
DCT
audio quality
audio fingerprint
acoustic pairing
authorisation
access management rules
Acoustic signal processing
Time-frequency Analysis
acoustic signal
audio signal processing
user interfaces
user privacy
Robustness
composability
pubcrawl
Human behavior
Resiliency
data privacy
biblio
Security in iOS and Android: A Comparative Analysis
Submitted by aekwall on Mon, 07/27/2020 - 11:20am
android
iOS Security
permission analysis
ios
hybrid mobile application
Apache Cordova
iOS (operating system)
security features
Permission
Compositionality
user privacy
mobile devices
Android (operating system)
security of data
Human Factors
internet
Metrics
privacy
pubcrawl
Resiliency
mobile computing
Kernel
security
Hardware
data privacy
« first
‹ previous
1
2
3
4
5
6
next ›
last »