Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
sensitive information
biblio
Differential Inference Testing: A Practical Approach to Evaluate Sanitizations of Datasets
Submitted by grigby1 on Thu, 07/09/2020 - 12:57pm
Predictive models
testing
Sociology
sensitive information
sensitive attribute
Scalability
sanitized data
sanitization techniques
sanitization
Resiliency
resilience
pubcrawl
privacy models
privacy
Compositionality
personal information
machine learning
l-Diversity
k-anonymity
Inferences
inference mechanisms
Human Factors
Human behavior
differential privacy
differential inference testing
Data Sanitization
data privacy
data deletion
biblio
PRETSA: Event Log Sanitization for Privacy-aware Process Discovery
Submitted by grigby1 on Thu, 07/09/2020 - 12:57pm
PRETSA
sensitive information
security of data
Scalability
Resiliency
resilience
pubcrawl
pseudonymized employee information
process model discovery
process execution
process discovery
privacy-disclosure attacks
Privacy-aware Process Mining
privacy-aware process discovery
privacy guarantees
privacy
Analytical models
Personnel
performance-annotated process model
Information systems
Human Factors
Human behavior
event log sanitization
event data
differential privacy
Data Sanitization
data privacy
Data mining
data deletion
Compositionality
business data processing
Business
biblio
CloudDLP: Transparent and Automatic Data Sanitization for Browser-Based Cloud Storage
Submitted by grigby1 on Thu, 07/09/2020 - 12:57pm
Human Factors
user data privacy
transparent data sanitization
textual documents
sensitive information
sensitive image documents
sensitive data
Scalability
Resiliency
resilience
pubcrawl
Protocols
privacy
learning (artificial intelligence)
automatic data sanitization
Human behavior
encryption
document image processing
deep learning
Data Sanitization
data privacy
data deletion
Compositionality
CloudDLP
cloud services
Cloud Computing
Browsers
browser-based cloud storage
biblio
A New Approach of Digital Signature Verification based on BioGamal Algorithm
Submitted by aekwall on Mon, 06/22/2020 - 10:25am
Communication Network
SHA algorithm
secured digital signature algorithm
secure hash code
secure digital signature
existing PlayGamal algorithm
digital signature verification
BioGamal algorithm
encryption algorithm
sensitive information
security of data
digital signature
verification
digital signatures
Cryptography
pubcrawl
Resiliency
security
Data Security
Scalability
biblio
Social Privacy Score Through Vulnerability Contagion Process
Submitted by aekwall on Mon, 04/20/2020 - 9:31am
Diffusion processes
privacy models and measurement
vulnerable social interactions
vulnerable interactions
vulnerable friends
vulnerability measurement
vulnerability diffusion process
vulnerability contagion process
social privacy score
privacy fields
privacy awareness framework
over-trusting vulnerable users
Messaging services
graph-theoretical properties
security of data
sensitive information
Message service
privacy issues
social networking (online)
Metrics
privacy
graph theory
pubcrawl
Electronic mail
Current measurement
security
data privacy
biblio
Phishing URL Detection Via Capsule-Based Neural Network
Submitted by grigby1 on Fri, 04/10/2020 - 11:37am
Neural networks
Web sites
URL Detection
unsolicited e-mail
Uniform resource locators
uniform resource locator
substantial manual feature engineering
social engineering
sensitive information
pubcrawl
phishing Website
phishing detection method
Phishing Detection
phishing criminals
phishing attacks
Phishing
capsule network
machine learning
Human Factors
Human behavior
Heuristic algorithms
feature representations
feature extraction
deep learning
cyber security
cyber attack
critical threat
convolutional neural nets
convolutional layer
convolution
Computer crime
capsule-based neural network
biblio
Need of Private and Public Sector Information Security
Submitted by grigby1 on Fri, 04/03/2020 - 11:03am
private buildings
Intel
Intelligent systems
Internet of Things
knowledge based systems
man in middle
Organizations
personnel security
Policy Based Governance
Portable computers
information technicians
private sector information security
pubcrawl
public sector information security
sensitive information
sentinel systems
smart information security Intel processes
Standards organizations
virtual data tables
Data protection
Airports
AS-IS office system
authorisation
biometric
biometrics (access control)
Buildings
collaboration
conveyor belts
data entry-exit log
airport like security with digital boxes
digital bar-coded air port
digital bar-coded conveyor boxes
evaes-dropping
government buildings
government data processing
government offices
information security
information stealing
biblio
Analysis of Black Hole Router Attack in Network-on-Chip
Submitted by grigby1 on Mon, 03/23/2020 - 3:15pm
Resiliency
Multiprocessors System-on-Chip
network-on-chip
network on chip security
NoC
outsourcing
outsourcing design
Packet loss
processing cores
pubcrawl
resilience
multiprocessing systems
Router Systems Security
Scalability
security
security attacks
sensitive information
System performance
telecommunication network routing
Trojan horses
very strong violent attack
Hardware
BHR attack
Black Hole Router attack
black holes
Blak Hole
communication platform
computer network security
data packets
denial of service attack
Denial-of-Service
DoS.
BHR
hardware trojan
HT
HT model
infected node
Integrated circuit modeling
invasive software
malicious Hardware Trojan
malicious nodes
Metrics
biblio
Identifying Attack Signatures for the Internet of Things: An IP Flow Based Approach
Submitted by grigby1 on Thu, 03/12/2020 - 11:02am
Monitoring
tools
telecommunication traffic
sensitive information
security mechanisms
security
Scalability
resource limitations
Resiliency
resilience
Protocols
privacy
network intrusion detection
network attacks
signature based defense
IP networks
IP flow properties
IoT devices
IoT communications
Intrusion Detection Systems
Intrusion Detection
Internet of Things
internet
flow monitoring
defense mechanisms
computer network security
attack signature
pubcrawl
biblio
LAOCOÖN: A Run-Time Monitoring and Verification Approach for Hardware Trojan Detection
Submitted by grigby1 on Wed, 02/26/2020 - 3:38pm
LAOCOON
verification rules
Trojan horses
trojan horse detection
temporal properties
supply chain security
sensitive information
security
Safety
run-time verification
run-time monitoring
Resiliency
resilience
pubcrawl
Monitoring
malicious inclusions
active fault attacks
invasive software
Integrated circuit modeling
hardware Trojan horses
hardware Trojan detection
Hardware Security
Hardware
generic attackers
formal verification techniques
formal verification
Fault Attacks
electronic systems
dedicated monitoring circuits
cyber physical systems
Circuit faults
automata
« first
‹ previous
1
2
3
4
5
next ›
last »