Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cloud Security
biblio
A Survey on Security of Cloud Environment: Threats, Solutions, and Innovation
Submitted by grigby1 on Wed, 11/14/2018 - 1:15pm
malicious behavior detection
VMI
Virtual machining
virtual machines
Virtual machine monitors
virtual machine monitor
virtual machine introspection techniques
tenant network
security of data
security
Resiliency
resilience
pubcrawl
Monitoring
misuse detection techniques
malware
attack taxonomy
machine learning
intrusion detection techniques
expandability
data mining techniques
Data mining
Compositionality
CloudVMI
CloudI
Cloud Security
cloud introspection
cloud computing environment
Cloud Computing
block chain technology
behavior analysis
biblio
A Cooperative Game for Online Cloud Federation Formation Based on Security Risk Assessment
Submitted by grigby1 on Fri, 10/26/2018 - 5:05pm
Games
undesirable CSPs
security risk levels
security risk avoidance
security risk assessment
security of data
security
Scalability
risk management
quality of service
pubcrawl
online Cloud federation formation
Metrics
insecure CSPs
Human Factors
hedonic coalitional game
Cloud Computing
game theory
game theoretic security
federation formation algorithm
federated Cloud service
cooperative game
Computational modeling
coalitional game
cloud service providers
Cloud Security
Cloud federations
Cloud federation formation process
Cloud federation formation model
cloud federation
cloud environments
biblio
Arav: Monitoring a Cloud's Virtual Routers
Submitted by grigby1 on Wed, 05/09/2018 - 3:01pm
Cloud Security
Metrics
pubcrawl
resilience
Resiliency
Router Systems
Router Systems Security
security
virtual machine introspection
virtual routers
biblio
Integration of Network Intrusion Detection Systems and Honeypot Networks for Cloud Security
Submitted by grigby1 on Wed, 05/09/2018 - 2:53pm
Malware Analysis
Snort
Signature-based detection
Servers
sandboxing environment
sandboxing
pubcrawl
Ports (Computers)
Policy-Governed systems
Policy-Governed Secure Collaboration
Policy
openstack
NIDS module
network intrusion detection systems
network intrusion detection system
Cloud Computing
malware
malicious attacks
invasive software
Intrusion Detection
honeypot networks
Honeypot Network
Dynamic Malware Analysis
cost services
computer architecture
composability
collaboration
cloud-computing technology
Cloud Security
cloud environment
biblio
Application of Generalized Regression Neural Network in Cloud Security Intrusion Detection
Submitted by grigby1 on Mon, 04/02/2018 - 12:39pm
Metrics
security of data
robots
Resiliency
resilience
regression analysis
pubcrawl
policy-based governance
pattern clustering
pattern classification
neural nets
network intrusion behavior modes
network intrusion
Artificial Neural Networks
learning (artificial intelligence)
Intrusion Detection
intrusion data
Intelligent systems
individual owned invasion category
Hafnium compounds
generalized regression neural network clustering analysis
generalized regression neural network
data training
clustering training samples
cloud security intrusion detection
Cloud Security
biblio
A Robust and Secured Cloud Based Distributed Biometric System Using Symmetric Key Cryptography and Microsoft Cognitive API
Submitted by grigby1 on Mon, 04/02/2018 - 12:33pm
enterprise application base
Symmetric Key Cryptography
security aspects
Resiliency
resilience
registered user information
public key cryptography
pubcrawl
multiple biometric information
Microsoft Windows (operating systems)
Microsoft cognitive face-API
Microsoft cognitive face API
face recognition
face images
face biometric
Face
AES cryptography technique
encryption
distributed system
Compositionality
cloud services
cloud service provider
Cloud Security
Cloud Computing
biometrics (access control)
biometric system
biometric image
biometric authentication system
authorisation
authentication
application program interfaces
APIs
biblio
Security in a Distributed Key Management Approach
Submitted by grigby1 on Wed, 02/21/2018 - 1:39pm
key management
user-specific keys
single-tenant scenario
Servers
sensitive data
Scalability
Runtime
Resiliency
resilience
pubcrawl
privacy breach data
outsourcing
Metrics
application providers
Key Distribution
Human behavior
encryption
distributed key management approach
Databases
data privacy
data owners
Cryptography
Cloud Security
cloud provider
Cloud Computing
classified records
biblio
Cloud security ecosystem for data security and privacy
Submitted by grigby1 on Thu, 02/15/2018 - 11:49am
Ecosystems
Resiliency
resilience
pubcrawl
multifactor authentication
Metrics
IT industry
hybrid cryptographic system
Human Factors
human factor
Human behavior
HCS
encryption
authentication
Data Security
data privacy
CSP
Cryptography
CloudSim simulator
CloudSim
cloud service providers
cloud security ecosystem
Cloud Security
Cloud Computing
cloud adoption
biblio
Searchable Symmetric Encryption: Designs and Challenges
Submitted by K_Hooper on Wed, 02/14/2018 - 12:08pm
Cloud Security
composability
computing in the encrypted domain
privacy-preserving search
pubcrawl
Resiliency
searchable encryption
biblio
Ransomware: The CryptoVirus Subverting Cloud Security
Submitted by grigby1 on Tue, 02/06/2018 - 1:54pm
security
malware
Metrics
pubcrawl
Ransomware
ransomware attack
ransomware vulnerabilities
Resiliency
Scalability
IT security specialists
security effectiveness
security threat
Servers
threats
ubiquitous computing
Ubiquitous Computing Security
ubiquitous environment
vulnerabilities
cloud threat mechanisms
business enterprises
cloud
Cloud architecture
Cloud Computing
cloud network
cloud platforms
Cloud Security
cloud technology
Business
computer architecture
computer viruses
Cryptography
CryptoVirus
disparate locations
Human behavior
Human Factors
information technology
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »