Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security principles
biblio
From Data-Driven to Intelligent-Driven: Technology Evolution of Network Security in Big Data Era
Submitted by aekwall on Mon, 01/20/2020 - 10:44am
security assurance strategy
Identification
Information systems
information technology
intrusion prevention
network security technology
Organizations
Predictive Metrics
pubcrawl
security
Human behavior
security audit
Security Audits
security category
security principles
security technology evolution
Standards organizations
System recovery
system virtualization
big data security technologies
Intelligent Data Security
Compositionality
Resiliency
Scalability
Access Control
authentication
authorisation
Big Data
big data era
Intelligent Data and Security
Communication networks
computer network security
Cryptography
data encryption
data privacy
disaster recovery
DT security principles
encryption audits
biblio
Designing Secure and Resilient Embedded Avionics Systems
Submitted by aekwall on Wed, 05/01/2019 - 11:41am
Program processors
unmanned aerial systems
UAS
security principles
security of data
security
safety oriented principles
Safety
resilient embedded avionics systems
Resiliency
real-time systems
pubcrawl
aerospace computing
Metrics
Laboratories
embedded systems
cyber security principles
cyber resources
computer architecture
composability
avionics domains
avionics community
avionics
Aerospace electronics
biblio
A classification methodology for security patterns to help fix software weaknesses
Submitted by grigby1 on Mon, 11/20/2017 - 11:22am
Policy
web applications
software weakness fixing
software weakness
software life
Software
security weaknesses
Security weakness
security principles hierarchical organization
security principles
security patterns
security of data
Resiliency
pubcrawl
policy-based governance
authentication
pattern classification
pattern choice
Metrics
internet
Human behavior
Government
Governance
Fault tolerant systems
fault tolerance
Databases
collaboration
classification semiautomatic methodology
classification
authorization
biblio
Wifi authentication through social networks #x2014; A decentralized and context-aware approach
Submitted by BrandonB on Mon, 05/04/2015 - 1:48pm
telecommunication security
search time reduction
security principles
Servers
smartphone
Social Devices
Social network services
social networking (online)
social networks
search problems
Trusted Computing
ubiquitous computing
WebID
WiFi authentication
WiFi Authentication and Authorization
WiFi router
WiFi-enabled devices
wireless LAN
heuristic
authentication mechanism
authorisation
authorization
context-aware approach
decentralized approach
EAP-SocTLS
EAP-TLS
embedded trust relations
authentication
IEEE 802.11 Standards
message authentication
password
physical proximity
Probes
Protocols
quadratic search complexity