Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
sensitive information
biblio
Encrypted Keyword Search in Cloud Computing using Fuzzy Logic
Submitted by aekwall on Mon, 01/18/2021 - 10:34am
Fuzzy Keyword Sets
information management
search engines
sensitive information
vital information
cloud service providers
complex Boolean queries
encrypted keyword search
fuzzy keyword search
Indexes
information management professionals
keyword privacy
keyword safety
N-grams
Privacy Preserving Fuzzy Search
user document protection
Fuzzy Cryptography
Cloud Computing
fuzzy set theory
Fuzzy logic
Data protection
query processing
Metrics
pubcrawl
Resiliency
data encryption
encryption
data confidentiality
Cryptography
authorisation
Keyword search
Servers
Scalability
biblio
Security and Privacy Analysis of Wearable Health Device
Submitted by grigby1 on Mon, 12/28/2020 - 11:28am
security
mobile computing
mobile devices
mobile health
mobile wearable health devices
privacy
privacy breach
privacy features
Privacy Risk
pubcrawl
resilience
Resiliency
malicious attack
Security analysis
security risk
security vulnerability
sensitive data information
sensitive information
Servers
telecommunication security
user data security
user sleeping arrangements
Wearable devices
dieting formula
authorisation
Biomedical monitoring
Bluetooth
Bluetooth networking
Bluetooth pairing process
bluetooth security
composability
Computer crime
data privacy
Data Security
wearables security
eating constraint
fitbit
Google Glass
Hacker
health care
health monitor system
health tracker devices
Human behavior
human health parameter monitoring
Jawbone
biblio
Copker: A Cryptographic Engine Against Cold-Boot Attacks
Submitted by aekwall on Mon, 11/30/2020 - 11:08am
key-encryption key
cold-boot attack
cold-boot attacks
Copker stores kilobytes
CPU registers
cryptographic engine
cryptographic services
deterministic random bit generators
disk encryption
ECDSA signing
Cache-as-RAM
multiple private keys
on-chip CPU caches
PGP Email clients
plain-text sensitive data
popular asymmetric cryptosystems
public-key cryptography implementation
RAM chips
suspend mode
Magnetic Remanence
Computers
private key cryptography
Kernel
Resiliency
pubcrawl
Cryptography
cyber physical systems
random number generation
Random access memory
RSA
Internet of Things
Compositionality
Registers
memory data
cryptographic keys
sensitive information
deterministic random bit generator
private key
Cathode ray tubes
biblio
Social Engineering for Diagnostic the Information Security Culture
Submitted by aekwall on Mon, 10/12/2020 - 10:46am
Phishing
Human Behavior and Cybersecurity
social engineering techniques
public university
ISCA survey questionnaire
information security culture assessment
Information Security Culture
information assets protection
information assets
controlled social engineering attacks
social engineering
security
security culture
sensitive information
Human Factors
Cybersecurity
confidential information
Computer crime
pubcrawl
Human behavior
data privacy
biblio
An Adversarial Perturbation Approach Against CNN-based Soft Biometrics Detection
Submitted by aekwall on Mon, 10/12/2020 - 10:33am
Privacy Threats
Expert Systems and Privacy
unwanted soft biometrics-based identification
subject ethnicity
keystroke dynamics
Gender
daily life consumer electronics
computer vision tasks
CNN-based soft biometrics detection
biometric-based authentication systems
biometric approaches
adversarial stickers
adversarial perturbation approach
authentication systems
sensitive information
Perturbation methods
security of data
computer vision
Human Factors
biometrics (access control)
Data processing
authentication
convolutional neural nets
Neural networks
privacy
deep learning
pubcrawl
Human behavior
learning (artificial intelligence)
data privacy
Scalability
biblio
Automated Repair of Cross-Site Scripting Vulnerabilities through Unit Testing
Submitted by aekwall on Mon, 09/28/2020 - 11:33am
software debugging
commit frauds
common programming error
Cross Site Scripting attacks
cross site scripting(XSS)
cross-site scripting vulnerabilities
detecting vulnerable web pages
dynamic program analysis
injection attacks
open source medical record application
application vulnerable
suggested encoder
Unit testing
untrusted data
untrusted dynamic content
vulnerability repair
vulnerable codes
XSS vulnerability
Cross Site Scripting
program analysis
Scalability
Resiliency
Human behavior
pubcrawl
internet
web applications
Web sites
program testing
security of data
software maintenance
program diagnostics
software reliability
online front-ends
Web pages
sensitive information
fraud
static program analysis
biblio
Analyzing the Security of Bluetooth Low Energy
Submitted by grigby1 on Fri, 09/04/2020 - 3:26pm
IoT
bluetooth security
Cyber Physical System
Ubertooth
malicious actors
bluetooth low energy
BLE devices
Bluetooth
Internet of Things devices
security standards
cyber physical systems
Software
sensitive information
encryption
Human behavior
resilience
Resiliency
composability
pubcrawl
standards
Hardware
Protocols
security of data
security
Internet of Things
biblio
Bridging The Gap: Data Exfiltration In Highly Secured Environments Using Bluetooth IoTs
Submitted by grigby1 on Fri, 09/04/2020 - 3:25pm
malicious actor
covert
data
Data Exfiltration
exfiltration
free-space optical communication
highly secured network
home networks
Image color analysis
insecure IoT
IoT
Chromium
professional networks
security measures
security standard
sensitive environments
smart bulb
strict security policies
unprecedented threats
web bluetooth api
Cyber Physical System
bluetooth security
sensitive information
Internet of Things
security
computer network security
invasive software
pubcrawl
composability
Resiliency
resilience
Human behavior
IoT devices
Cryptography
Software
cyber physical systems
Payloads
Browsers
botnets
air gapped network
Bluetooth
Bluetooth IoT
Bluetooth smart bulb
biblio
Extreme SDN Framework for IoT and Mobile Applications Flexible Privacy at the Edge
Submitted by aekwall on Mon, 08/10/2020 - 9:33am
prominent network interface
Mobile communication
WLAN
Metrics
Android devices
application usage information
encrypted wireless traffic
Internet gateways
lightweight programmable privacy framework
PrivacyGuard framework
edge
software defined network-like paradigm
traffic shaping
WiFi encryption
WiFi links
WiFi networks
wireless network edge
wireless traffics
android encryption
Cryptography
Scalability
telecommunication traffic
Internet of Things
software defined networking
Resiliency
Human behavior
pubcrawl
privacy
IoT
smart phones
Mobile Applications
wireless LAN
Wireless fidelity
Software Defined Network
Wireless communication
mobile device
sensitive information
biblio
Bridging The Gap: Data Exfiltration In Highly Secured Environments Using Bluetooth IoTs
Submitted by grigby1 on Fri, 08/07/2020 - 2:38pm
invasive software
unprecedented threats
strict security policies
Software
sensitive information
sensitive environments
security standard
security measures
security
Science of Security
pubcrawl
professional networks
Payloads
malicious actor
IoT devices
IoT
air gapped network
Internet of Things
insecure IoT
Image color analysis
home networks
highly secured network
free-space optical communication
Data Exfiltration
Cryptography
computer network security
Browsers
botnets
Bluetooth smart bulb
Bluetooth IoT
Bluetooth
« first
‹ previous
1
2
3
4
5
next ›
last »