Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
sensitive information
biblio
Forensic Attribution in NoSQL Databases
Submitted by grigby1 on Mon, 03/05/2018 - 12:03pm
message authentication
survey
Structured Query Language
sensitive information
security of data
Security by Default
Scalability
pubcrawl
policy-based governance
Peer-to-peer computing
NoSQL databases
NoSQL
Access Control
Human Factors
Human behavior
Forensics
forensic attribution
database forensics
collaboration
cloud implementations
Cloud Computing
authorisation
authentication
attribute-based encryption
biblio
Performance Evaluation of VM-based Intrusion Tolerant Systems with Poisson Arrivals
Submitted by grigby1 on Thu, 12/28/2017 - 12:21pm
mean-time-to-security failure
VM-based intrusion tolerant systems
virtual machines
virtual machine
Transforms
sensitive information
Resiliency
pubcrawl
poisson arrivals
Poisson arrival process
ntrusion tolerance
Nickel
MTTSF
composability
mean time to security failure
M/G/1 queueing system
Laplace-Stieltjes transforms
Laplace-Stieltjes transform
intrusion tolerance
fault-tolerant scheme
Fault tolerant systems
fault tolerance
Computers
computer security
computer network security
biblio
SDN data path confidence analysis
Submitted by grigby1 on Tue, 12/12/2017 - 12:31pm
Software-Defined Networks
Routing
SDN data path confidence analysis
SDN hybrid networks
secure network
Security Metrics
Security Policies Analysis
sensitive data
sensitive information
single metric indicator
software defined networking
Software-defined networking (SDN)
remediation costs
specific network path
Springs
stolen information
systemic network problems
time series
Time series analysis
time series data repository
tools
Traceroute
unauthorized access
latent network problems
autonomous systems
collaboration
competitors costs industry
Confidence Assessment
confidence score
configuration metrics
dependable network
domestic policy
foreign policy
internet
automated system protection services
Measurement
multifactor indicator analysis
network behavior
network configuration
network operation
network path confidence analysis service
OpenFlow
policy-based governance
proprietary information
pubcrawl
biblio
Open Source Based Privacy-Proxy to Restrain Connectivity of Mobile Apps
Submitted by K_Hooper on Wed, 10/25/2017 - 10:55am
Human behavior
Mobile Apps
privacy
Privacy Policies
proxy
pubcrawl
Scalability
security
sensitive information
biblio
Enhanced browser defense for reflected Cross-Site Scripting
Submitted by BrandonB on Tue, 05/05/2015 - 9:42am
security
XSS-Me
XSS attack
XSS
Web sites
Web page
Web browser
vulnerable Web application
Vectors
unfiltered reflection
testing
special characters
sophisticated attack
sensitive information
security of data
Attack vectors
search engines
reflected XSS vulnerability
reflected cross-site scripting
open source Mozilla Firefox security extension
online front-ends
malicious script
malicious input
Information filters
HTML
filter
enhanced browser defense
defense
client-side solution
Browsers
biblio
A context-sensitive approach for precise detection of cross-site scripting vulnerabilities
Submitted by BrandonB on Tue, 05/05/2015 - 9:41am
precise detection
XSS vulnerability
XSS attacks
Web application
vulnerability detection
taint analysis
standards
source code (software)
source code
software development life cycle
Software
social communication
Servers
sensitive information
security
Browsers
malware
malicious user
malicious operation
invasive software
internet
hypermedia markup languages
HTML
health services
financial transaction
defensive programming based HTML context-sensitive approach
cross-site scripting vulnerability
cross-site scripting
Context
biblio
Information Security in Big Data: Privacy and Data Mining
Submitted by BrandonB on Tue, 05/05/2015 - 8:34am
decision maker
tracking
sensitive information
security of data
Provenance
privacypreserving data mining
privacy-preserving data mining
privacy preserving data mining
privacy auction
privacy
PPDM
information security
information protection
game theory
Algorithm design and analysis
data publishing
data provider
Data protection
data privacy
Data mining
data miner
data collector
data acquisition
computer security
Big Data
anti-tracking
anonymization
biblio
Comparative mobile platforms security solutions
Submitted by BrandonB on Mon, 05/04/2015 - 12:28pm
mobile computing paradigm
Windows Phone
smart phones
smart phone
sensitive information
security of data
QNX
private information
mobile platform security solution
android
mobile computing
Mobile communication
Kernel
ios
encryption
comparative mobile platforms
BlackBerry
Androids
« first
‹ previous
1
2
3
4
5