Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security concern
biblio
A Network Covert Timing Channel Detection Method Based on Chaos Theory and Threshold Secret Sharing
Submitted by grigby1 on Wed, 02/10/2021 - 11:50am
resilience
unique channel traits
traditional security policies
time series
Threshold secret sharing
telecommunication traffic
telecommunication channels
stable channel traits
security of data
security concern
secret reconstruction strategy
Scalability
Robustness
Resiliency
channel identifier
pubcrawl
one-dimensional time series
network traffic
network covert timing channel detection method
network covert timing channel
NCTC detection method
inter-packet delay
high-dimensional phase space
covert channels
Compositionality
chaos theory
chaos
biblio
SDN\_Based Secure Healthcare Monitoring System(SDN-SHMS)
Submitted by aekwall on Mon, 10/12/2020 - 10:32am
Biomedical monitoring
Expert Systems and Privacy
security platform
security integration framework
secure Healthcare Monitoring System
SDN-SHMS
IoT-based remote health monitoring systems
IoT-based healthcare monitoring systems
HMS
geriatrics
elderly people
security concern
biomedical communication
privacy concern
patient monitoring
medical computing
Monitoring
Software Defined Network
health care
Human Factors
sensors
Mobile Applications
pubcrawl
Human behavior
software defined networking
computer architecture
security
Internet of Things
Medical services
data privacy
Scalability
biblio
Analysis of Cyber-Physical Security in Electric Smart Grid : Survey and challenges
Submitted by aekwall on Mon, 09/28/2020 - 11:10am
cyber-physical system
power engineering computing
Smart Grids
Human Factors
attack motivation
CPS
Meters
security model
ICT
Smart Grid
communication system
defence
electric smart grid
information and communication technology
privacy issue
security concern
CPS Privacy
Monitoring
cyber physical systems
smart power grids
privacy
cyber-physical security
Reliability
Vulnerability
pubcrawl
Human behavior
cyber-physical systems
SCADA systems
SCADA
security
privacy concerns
data privacy
architecture
biblio
NeXUS: Practical and Secure Access Control on Untrusted Storage Platforms using Client-Side SGX
Submitted by grigby1 on Wed, 03/18/2020 - 11:26am
protected volumes
file-sharing services
fine-grained access control policies
google drive
Hardware
key revocation
management burdens
NEXUS prototype
NEXUS volumes
nontrivial key management
openafs
outsourcing
performance overheads
performant platform-agnostic
file servers
pubcrawl
re-encryption overheads
resilience
rising popularity
rootkey
secure access control
Secure File Sharing
security concern
selective sharing
server-side support
Servers
severe re-encryption penalties
Cloud Computing
Metrics
composability
Resiliency
Access Control
access revocations
access rights
application program interfaces
authorisation
client side
client-outsourced data
client-side Intel SGX enclave
client-side SGX
Outsourced Database Integrity
common file
cryptographic approaches
cryptographic keys
cryptographic solutions
Cryptography
data privacy
database operations
dropbox
dynamic sharing
encryption
file access API
file organisation
biblio
Checkpoints Assignment on Cyber-Physical Digital Microfluidic Biochips for Early Detection of Hardware Trojans
Submitted by grigby1 on Wed, 02/26/2020 - 3:37pm
Resiliency
Hardware
hardware trojan
hardware Trojans attacks
invasive software
Lab-on-a-Chip
Microfluidics
piracy attacks
pubcrawl
resilience
frequent diseases detection
security
security concern
security study
Sequential analysis
supply chain security
tools
trojan horse detection
Trojan horses
cyber-physical digital microfluidic biochips
biochip design flow
biochips
biological techniques
bioprotocol manipulation attacks
checkpoint
checkpointing
checkpoints assignment
Computer crime
cyber physical systems
biochemical analysis
cyber-physical systems
denial-of-service attacks
digital microfluidic biochip
diseases
DMF biochip
Electrodes
error detection
error-recovery sensing systems
biblio
An Optimal Fully Homomorphic Encryption Scheme
Submitted by grigby1 on Wed, 09/05/2018 - 9:39am
Kronecker product
user data protection
tensor theory
system analysis and design
security concern
Scalability
Resiliency
resilience
pubcrawl
privacy concern
privacy
optimal fully homomorphic encryption scheme
O-FHE scheme
Mathematical model
Algorithm design and analysis
KP
human factor
Human behavior
fully homomorphic encryption
FHE scheme
encryption
distributed computing
Data processing
Cybersecurity
Cryptography
Computing Theory
Cloud Computing
biblio
"Mapping Security Requirements to Identify Critical Security Areas of Focus in PaaS Cloud Models"
Submitted by grigby1 on Thu, 02/23/2017 - 11:47am
Platform-as-a-Service
Software Architecture
service level objectives
security requirement mapping
security of data
Security Mappinng
security concern
security
Science of Security
pubcrawl
privacy concern
platform-as-a-service cloud models
Access Control
PaaS cloud models
PaaS cloud architectures
matrix algebra
encryption
data privacy
critical security area identification
computer architecture
Computational modeling
Cloud Computing
authentication
adaptive security mapping matrix
biblio
Bluetooth technology: ApXLglevel end-to-end security
Submitted by BrandonB on Mon, 05/04/2015 - 12:22pm
NIST Guide
encryption
file transfer
framework compatibility
framework reliability
Indexes
Java
Java language
Mobile communication
mobile phone
MS-Windows 7 operating system
music streaming
embedded appliances
operating system
operating systems (computers)
PAN
personal area network
personal area networks
privacy concern
programming languages
Satellites
security concern
smart phones
strong mutual authentication
communication technologies
ANSI C language
application-layer framework
ApXLglevel end-to-end security
audio streaming
authentication
authorisation
Binary Payload
Bluetooth
Bluetooth security specification
Bluetooth technology
C language
Android operating system
computer network reliability
computer network security
computing technologies
confidentiality
configurable add-on devices
cryptographic service providers
Cryptography
customizable add-on devices
data confidentiality
data integrity