Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security risks
biblio
Redesigning QR Code Ecosystem with Improved Mobile Security
Submitted by grigby1 on Wed, 03/08/2017 - 1:24pm
mobile marketing
Software
security threat
security risks
risk analysis
redesigned QR code ecosystem
QR codes
QR code
public key infrastructure
Public key
pubcrawl170112
Mobile Security
advertising
mobile computing
life cycle
information system
Ecosystems
Ecosystem
digital signatures
digital signature mechanism
digital signature
Decoding
authentication
advertising campaigns
biblio
Cloud computing security risks with authorization access for secure Multi-Tenancy based on AAAS protocol
Submitted by grigby1 on Mon, 02/27/2017 - 11:54am
Cryptographic Protocols
web services
security risks
risk management
resource management
public cloud service providers
public cloud security complexities
pubcrawl170108
pubcrawl170107
Protocols
open systems
open system architecture
multitenancy security issue
multi-tenancy
AAAS protocol
computer architecture
Complexity theory
cloud services
cloud security complexity
cloud infrastructure
cloud computing security risks
Cloud Computing
authorization system
authorization access
authorization
authorisation
authentication-authorization and accounting with secure transport protocol
Access Control
biblio
Evaluating the complexity and impacts of attacks on cyber-physical systems
Submitted by grigby1 on Mon, 02/27/2017 - 11:54am
estimation theory
time-to-shutdown
Sensor phenomena and characterization
security risks
security of data
security attributes
quantitative security evaluation
pubcrawl170108
pubcrawl170107
process control
probability
modeling
graph theory
actuators
cyber-to-physical attack
cyber-to-cyber attack
cyber-physical systems
cyber-physical system security
cross-domain attack
CPS
consequence estimation process
Computer crime
attack probability
attack graph
attack consequences
biblio
Vulnerability Assessment in Autonomic Networks and Services: A Survey
Submitted by BrandonB on Wed, 05/06/2015 - 8:51am
Computers
vulnerability management process
Vulnerability Management
vulnerability assessment
security risks
security attacks
security
Monitoring
fault tolerant computing
Autonomic computing
computer security
computer network security
Complexity theory
Business
Autonomic systems
autonomic services
autonomic networks
autonomic management plane
« first
‹ previous
1
2
3
4