Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
file servers
biblio
A secure three-factor authentication and biometrics-based key agreement scheme for TMIS with user anonymity
Submitted by grigby1 on Thu, 01/28/2021 - 1:03pm
Servers
medical servers
Medical services
message authentication
Metrics
password
pubcrawl
remote monitoring
resilience
Resiliency
medical information systems
Smart card
smart cards
telecare medical information systems
telemedicine
three factor user authentication
Three-factor authentication
TMIS
user anonymity
user/server communication security
e-health systems
authentication
authorisation
AVISPA
biometrics
biometrics (access control)
biometrics based key agreement
composability
diseases
e-health
anonymity
ECG
file servers
formal security verification tool AVISPA
formal verification
health care
health systems
healthcare services
Human behavior
biblio
Detecting Malicious Web Requests Using an Enhanced TextCNN
Submitted by aekwall on Mon, 12/14/2020 - 11:31am
Convolutional Neural Network for Text Classification (TextCNN)
Web servers
deep learning
Semantics
Uniform resource locators
Predictive Metrics
web security
deep learning models
convolutional neural network for text classification
file servers
HTTP Dataset CSIC 2010
malicious Web request detection
Malicious Web requests detection
support vector machine (SVM)
TextCNN
Transferable statistical features
Web attack detection
composability
Data models
Support vector machines
support vector machine
feature extraction
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
security of data
pattern classification
internet
text analysis
convolutional neural nets
convolutional neural networks
text classification
statistical analysis
biblio
Utilizing Netflow Data to Detect Slow Read Attacks
Submitted by aekwall on Mon, 11/09/2020 - 12:14pm
machine learners
application layer DDoS attacks
application servers
classifiers
IP Flow Information Export standard
IPFIX
IPFIX standard
legitimate network requests
low volume attack methods
open systems
NetFlow
Netflow data
network security solutions
SiLK
Slow Read
slow read attack detection models
slow read DDoS attacks
Information Reuse and Security
pubcrawl
Computer crime
computer network security
false alarm rate
IP networks
Protocols
invasive software
learning (artificial intelligence)
Resiliency
distributed denial of service
internet
tools
computer networks
file servers
Web servers
Compositionality
malware
memory resources
biblio
Design and Implementation of Azalea unikernel file IO offload
Submitted by grigby1 on Fri, 10/30/2020 - 11:18am
Libraries
unikernel transfers
unikernel
Telecommunications
storage management
software libraries
security
Scalability
pubcrawl
operating systems (computers)
operating systems
operating system kernels
Offloading
Linux
azalea unikernel file IO offload
Kernel
Io offload
input-output programs
i-o systems security
I-O Systems
File systems
file system
file servers
file server
file organisation
file IO result
file IO command
biblio
A Review on Self Destructing Data:Solution for Privacy Risks in OSNs
Submitted by grigby1 on Fri, 07/10/2020 - 10:41am
privacy
social networking (online)
Servers
self destructing data
security risks
security of data
security
Scalability
risk management
pubcrawl
privacy violations
privacy settings
privacy risks
Cryptography
OSN user
OSN server
OSN providers
online social networks
online social network users
internet
file servers
Facebook
delays
data privacy
data deletion
biblio
Defending Web Servers with Feints, Distraction and Obfuscation
Submitted by grigby1 on Fri, 05/15/2020 - 11:00am
internet
Web servers
security strategies
Scalability
robots
Resiliency
resilience
reconnaissance process
Reconnaissance
pubcrawl
Network reconnaissance
IP networks
Computer crime
honeytokens
file servers
delays
delay strategies
deceptive defense strategies
deceptive counter measure abilities
deception based information security
Databases
cyber threat landscape
computer network security
biblio
Raising the Bar Really High: An MTD Approach to Protect Data in Embedded Browsers
Submitted by grigby1 on Fri, 04/17/2020 - 9:45am
MTD
browser-based vulnerabilities
computing systems security
file servers
HTML
Internet users privacy
JavaScript injection attacks
mobile
Mobile Application
mobile operating systems
mobile WebViews
moving target defense
apps
MTD approach
server-side moving target defense technique
UI component
user interfaces
Web
Web browsers safety
Web pages
WebView-Embedded app
WebViews
Web Browser Security
smart phones
security
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
privacy
internet
composability
mobile computing
security of data
online front-ends
Data protection
Cyber Attacks
Java
Metrics
Browsers
Compositionality
operating systems (computers)
operating systems
android
biblio
NeXUS: Practical and Secure Access Control on Untrusted Storage Platforms using Client-Side SGX
Submitted by grigby1 on Wed, 03/18/2020 - 11:26am
protected volumes
file-sharing services
fine-grained access control policies
google drive
Hardware
key revocation
management burdens
NEXUS prototype
NEXUS volumes
nontrivial key management
openafs
outsourcing
performance overheads
performant platform-agnostic
file servers
pubcrawl
re-encryption overheads
resilience
rising popularity
rootkey
secure access control
Secure File Sharing
security concern
selective sharing
server-side support
Servers
severe re-encryption penalties
Cloud Computing
Metrics
composability
Resiliency
Access Control
access revocations
access rights
application program interfaces
authorisation
client side
client-outsourced data
client-side Intel SGX enclave
client-side SGX
Outsourced Database Integrity
common file
cryptographic approaches
cryptographic keys
cryptographic solutions
Cryptography
data privacy
database operations
dropbox
dynamic sharing
encryption
file access API
file organisation
biblio
Amazon Echo Enabled IoT Home Security System for Smart Home Environment
Submitted by aekwall on Mon, 08/05/2019 - 9:34am
internet
wireless sensor networks
Web server
user voice commands
ultralow-power wireless sensor network
Speech recognition
smart home environment
Smart Home
sensors
Resiliency
pubcrawl
IoT
Internet-connected system
Internet of Things
Internet accessible configuration page
Amazon Echo
Home Security System
home computing
home automation
Flowcharts
file servers
expandability
computer network security
composability
Cameras
bluetooth low energy
Bluetooth 4
Bluetooth
BLE
Amazon Echo enabled IoT home security system
biblio
A Proposal for a New Way of Classifying Network Security Metrics: Study of the Information Collected through a Honeypot
Submitted by aekwall on Mon, 07/01/2019 - 9:11am
network security
vulnerable server
time 19.0 month
statistical analysis
SSH honeypot-based system
software reliability
software quality
Security Metrics
security
pubcrawl
network security metric classification
attacker behaviour evaluation
Metrics
metric
Kippo
information collection
IDS
honeypot
file servers
Data collection
Conferences
computer network security
1
2
3
next ›
last »