Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data loss
biblio
A Web Application for Prevention of Inference Attacks using Crowd Sourcing in Social Networks
Submitted by grigby1 on Tue, 04/12/2022 - 12:19pm
Compositionality
inference attacks
data loss
Adaptive based algorithms
Limiting
social networks
Data Sanitization
education
social networking (online)
Clustering algorithms
Peer-to-peer computing
Crowd Sourcing
Classification algorithms
composability
privacy
Resiliency
resilience
Human behavior
pubcrawl
biblio
Establishing Trust in Binary Analysis in Software Development and Applications
Submitted by aekwall on Mon, 02/01/2021 - 11:41am
Binary codes
vulnerability reports
source security
software programmer trust
security vulnerability minimization
knowledge elicitations
knowledge acquisition
implementation risk assessment
binary release metadata
binary component
binary code components
binary code behavior
binary analysis tools
binary analysis techniques
human trust
security of data
binary code
data loss
trust
Binary Analysis
software development
software engineering
computer security
Libraries
tools
standards
pubcrawl
Human behavior
Trusted Computing
Software
biblio
Fuzzy Logic for Reducing Data Loss during Cyber Intrusion in Smart Grid Wireless Network
Submitted by aekwall on Mon, 02/10/2020 - 12:05pm
data loss
Smart Grid Sensors
Wireless Communication Network (WCN)
WCN
Smart Sensor
smart grid wireless network
smart grid communication network
nearby nodes
Internet Protocol address
Internet Protocol (IP)
higher degree nodes
grid power flow
graph theory approach wireless communication network
fuzzy rules
fuzzy logic approach
extreme IP
security of data
cyber intrusion
cyber-attack
Compositionality
Human Factors
radio networks
power system security
power engineering computing
Smart Grid
Fuzzy logic
smart power grids
graph theory
pubcrawl
Resiliency
smart devices
IP networks
biblio
Designing a database encryption technique for database security solution with cache
Submitted by grigby1 on Wed, 03/08/2017 - 2:24pm
Elliptic curves
database management software
database management systems
database security solution
Databases
DBMS
Decision Making
Elliptic curve cryptography
Elliptic Curve Cryptography(ECC)
database encryption technique
elliptical curve cryptography module
encryption
financial information
personal files
pubcrawl170112
public key cryptography
RSA
supply chain management
Data collection
cache storage
client details
company secrets
computer architecture
corporate data
corrupted data
customer service management
data availability
Advanced Encryption Standard(AES)
data consistency
data integrity
data loss
data management
data organization
data quality
data retrieval
database cache
biblio
MLDED: Multi-layer Data Exfiltration Detection System
Submitted by grigby1 on Tue, 03/07/2017 - 1:32pm
forensic readiness data exfiltration system
tuning
standards
sensitive data exfiltration detection
security
pubcrawl170109
plain ASCII text
PDF files
Organizations
organization information system
multilayer data exfiltration detection system
MLDED system
keyword labeling
keyword extraction
information protection strategy
Algorithm design and analysis
Digital Forensics
data theft
data loss
data leakage threats
data leakage
data hiding
Data Exfiltration
Data Breach
Cryptography
crime ware services
computer network security
Computer crime
Complexity theory
Communication networks
biblio
Efficient search on encrypted data using bloom filter
Submitted by BrandonB on Tue, 05/05/2015 - 11:44am
data theft
storage cost reduction
Servers
sentence search
search operations
information retrieval
Information filters
Indexes
filtering algorithms
Encrypted Search
efficient encrypted data search
document handling
document decryption
approximate search
data structures
data misuse
data loss
Cryptography
cryptographic techniques
cost reduction
computer science
cloud services
Cloud Computing
case sensitive search
Bloom filter
Approximate Search and Bloom Filter