Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information protection
biblio
Unauthorized Access Point Detection Using Machine Learning Algorithms for Information Protection
Submitted by grigby1 on Fri, 03/15/2019 - 10:53am
pubcrawl
wireless LAN
wireless Internet environment
wireless integrated environment
Wireless fidelity
Wireless communication
wireless AP security
Wi-Fi
unauthorized AP
unauthorized Access Point detection
threat vectors
Support vector machines
support vector machine
security
RTT value data
Classification algorithms
protection
privacy
Prediction algorithms
multilayer perceptrons
military facilities
Metrics
machine learning algorithms
machine learning
learning (artificial intelligence)
information protection
hacking attacks
detection
computer network security
biblio
A Multi-Layered Approach to Securing Enterprise Applications by Using TLS, Two-Factor Authentication and Single Sign-On
Submitted by grigby1 on Fri, 02/08/2019 - 3:34pm
Mobile Internet applications
two-factor authentication
two factor authentication
single sign-on capability
single sign-on authentication
Security Token
security requirements
security of data
security
pubcrawl
password
OTP mechanism
one-time passwords
One-Time Password (OTP)
MultiLayered Framework
multilayered approach
application data
mobile computing
IP networks
Internet attackers
internet
Information Security concept
information protection
information and communication technology
Human Factors
Human behavior
enterprise applications
Dogs
Computer crime
authentication application
authentication
biblio
An Empirical Study on the Effect of Information Security Activities: Focusing on Technology, Institution, and Awareness
Submitted by grigby1 on Thu, 05/24/2018 - 11:32am
collaboration
Information culture
information protection
information security
Information security breach
Policy
Policy Based Governance
policy-based governance
pubcrawl
biblio
Towards Automation in Information Security Management Systems
Submitted by grigby1 on Tue, 02/06/2018 - 12:54pm
small and medium-sized enterprises
Process Automation
pubcrawl
Resiliency
risk management
Scalability
security controls automation
security of data
security requirements
Metrics
small-to-medium enterprises
Stakeholders
standards
tools
ubiquitous computing
Ubiquitous Computing Security
workflow enactment
information protection
automated process execution
automation
context-aware ISMS
continuous risk-driven ISMS
Data protection
highly interconnected information security management
Human behavior
Human Factors
ADAMANT
information security
Information Security Management System
information security management systems
Information Security Risk Management
Information systems
ISMS related activities
ISO 27001 compliant ISMS
biblio
"Securing the Clustered Database Using Data Modification Technique"
Submitted by grigby1 on Thu, 02/23/2017 - 11:02am
Distributed databases
weka tool
standards
security of data
security
pubcrawl
Privacy preserving protocols
pattern clustering
online media
Iris
information protection
clustering
Distributed Database
distributed clustered database environments
database clustering
Data protection
pubcrawl170105
data privacy
data modification
Data mining
computer science
biblio
Information Security in Big Data: Privacy and Data Mining
Submitted by BrandonB on Tue, 05/05/2015 - 8:34am
decision maker
tracking
sensitive information
security of data
Provenance
privacypreserving data mining
privacy-preserving data mining
privacy preserving data mining
privacy auction
privacy
PPDM
information security
information protection
game theory
Algorithm design and analysis
data publishing
data provider
Data protection
data privacy
Data mining
data miner
data collector
data acquisition
computer security
Big Data
anti-tracking
anonymization
« first
‹ previous
1
2