Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cloud Security
biblio
A Policy-based Interaction Protocol between Software Defined Security Controller and Virtual Security Functions
Submitted by grigby1 on Thu, 04/29/2021 - 2:15pm
Protocols
virtual security function
software defined security service
Software
security protocol
security policies
security
SDN
pubcrawl
Network Security Architecture
Predictive models
policy-based governance
NFV
Monitoring
control systems
Cloud Security
Cloud Computing
biblio
Tackling Insider Threat in Cloud Relational Databases
Submitted by grigby1 on Thu, 04/08/2021 - 4:56pm
resource allocation
peer-to-peer model
Peer to peer computing
multiple availability zones
mobile-knowledge bases model
insider threat tackling
Databases
cloud relational database systems
cloud RDMS
cloud computing structures
centralized model
Availability
cloud systems
launch attacks
Peer-to-peer computing
Cloud Security
insider threat
load balancing
Metrics
knowledge based systems
mobile computing
Load modeling
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
insider attacks
security
relational databases
Cloud Computing
security of data
biblio
A Mobile Edge Mitigation Model for Insider Threats: A Knowledgebase Approach
Submitted by grigby1 on Thu, 04/08/2021 - 4:55pm
Cloud Security
Organizations
mobile edge mitigation model
mobile edge computing mitigation model
Mobile Edge
knowledgebase approach
insider threat problem
dependency
database
cloud users
cloud internal users
insider threat
malicious insiders
malicious outsiders
cloud
security of data
Metrics
knowledge based systems
mobile computing
Cloud Computing
private data
data privacy
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
Insider Threats
Knowledgebase
file
MAZE: A Secure Cloud Storage Service Using Moving Target Defense and Secure Shell Protocol (SSH) Tunneling
Submitted by akarns on Fri, 03/12/2021 - 3:54pm. Contributors:
Vasco Xu
Sherif Khattab
ABSTRACT
Cloud Security
cloud storage
moving target defense
Presentations
biblio
Clustering Based Incident Handling For Anomaly Detection in Cloud Infrastructures
Submitted by aekwall on Mon, 03/01/2021 - 4:48pm
NSL-KDD
work factor metrics
run time metrics
nonclustering based algorithm
local outlier factor(LOF)
Kmeans
Isolation Forest algorithm
isolation forest
incident handling model
f-score
decision based approach
DBSCAN
clustering based algorithm
cloud infrastructures
anomaly detection mechanisms
Anomaly
security of data
cloud
Cloud Security
pattern clustering
Data mining
Anomaly Detection
Clustering algorithms
Prediction algorithms
pubcrawl
Resiliency
Protocols
Servers
Scalability
Cloud Computing
Monitoring
biblio
Group Key Management in Cloud for Shared Media Sanitization
Submitted by grigby1 on Tue, 02/16/2021 - 1:24pm
Data Sanitization
security
resilience
Remote Key Management Services
pubcrawl
privacy
Media
Key Management Services
Handheld computers
grid computing
encryption
key management
Crypto Shredding
Compositionality
Cloud Security
cloud computing security
Cloud Computing
Client-side Key Management Services
Human behavior
Metrics
Resiliency
Scalability
biblio
Detection of DDoS Attack and Classification Using a Hybrid Approach
Submitted by grigby1 on Tue, 02/16/2021 - 12:58pm
hybrid feature selection method
Classifiers.
cross-validation
DDoS category
DDoS detection
DDoS detection rate
decision table
discretize dataset
Feature Selection
Bayes Net classifiers
J48 classifier
KDD DDoS dataset
Naive Bayes Classifiers
naive Bayes methods
NSL DDoS dataset
NSL KDD dataset
selected DDoS packets
weka tool
computer network security
security of data
Cloud Computing
machine learning
pubcrawl
Human behavior
Metrics
resilience
Resiliency
learning (artificial intelligence)
random forests
composability
pattern classification
Random Forest
Cloud Security
machine learning classifiers
DDoS Attack
DDoS attack detection
biblio
Fuzzy Elliptic Curve Cryptography based Cipher Text Policy Attribute based Encryption for Cloud Security
Submitted by aekwall on Mon, 01/18/2021 - 11:24am
data confidentiality
Receivers
public key encryption
public key cryptography
fuzzy set theory
fuzzy fined-grained access control
fuzzy elliptic curve cryptography
Fuzzy Cryptography
Fuzzy
encryption
efficient encryption
Diffie Hellman
data transfer
Data Security
data privacy
Elliptic curve cryptography
data access control scheme
cyber physical systems
composability
Cloud Security
Cloud Computing
cipher text policy attribute based encryption
authorisation
Attribute authority
access control mechanisms
Access Control
Metrics
Resiliency
Scalability
pubcrawl
biblio
User Behavior Trust Modeling in Cloud Security
Submitted by aekwall on Mon, 11/23/2020 - 11:36am
User behavior
human trust
user trust value
user history patterns
user behavior trust modeling
user behavior trust model based on fuzzy logic
trust computation center
fuzzy login
could computing
cloud computing infrastructure
Human behavior
trust evaluation
cloud service providers
security of data
Human Factors
Cloud Security
Fuzzy logic
Mathematical model
Computational modeling
pubcrawl
Trusted Computing
History
security
Servers
Cloud Computing
biblio
Research on Cloud Computing Security Evaluation Model Based on Trust Management
Submitted by grigby1 on Mon, 10/05/2020 - 2:10pm
Probability distribution
uncertainty
Trusted Computing
trust management mechanism
Trust management
subsequent cloud computing service
sharing applications
security of data
security assessment model
security
Scalability
Resiliency
resilience
quantifiable analysis
pubcrawl
Big Data trust management
information security
Human Factors
DS evidence theory method
DS evidence theory
data unification
Data Security
data credible quantification mechanism
computer theory
Computational modeling
cloud services
Cloud Security
cloud computing security evaluation model
cloud computing security
Cloud Computing
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »