Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
sensitive personal information
biblio
IoT network monitor
Submitted by K_Hooper on Wed, 05/09/2018 - 11:00am
router
Mirai Botnet
Monitoring
network data analysis
password
Ports (Computers)
privacy
pubcrawl
Raspberry Pi
Resiliency
IoT network monitor
Scalability
security
Security by Default
security vulnerability
sensitive personal information
telecommunication traffic
user-friendly interface
user interfaces
deep packet analysis
Anomaly Detection
Biomedical monitoring
botnet
botnet traffic detection
character strings
computer network security
connected devices
consumer home IoT networks
Android (operating system)
default device passwords
default passwords
Entropy
home networks
home network security
Internet of Things
invasive software
IoT device
biblio
Explaining the Role of Trust in Cloud Service Acquisition
Submitted by BrandonB on Wed, 05/06/2015 - 1:26pm
cloud transactions
Law
mediating
Organizations
personal identity information
privacy
sensitive personal information
service provider ability
service provider integrity
transacting parties
trust
Banking
Cloud Computing
cloud services acquisition
internet
Context
Data protection
digital identity management system
financial institutions
trusted cloud identity ecosystem
Trusted Computing
user assurances
user confidence
Ghana
identity abuses
information privacy
interest protection
biblio
Explaining the Role of Trust in Cloud Service Acquisition
Submitted by BrandonB on Wed, 05/06/2015 - 1:26pm
cloud transactions
identity abuses
information privacy
interest protection
internet
Law
mediating
Organizations
personal identity information
privacy
sensitive personal information
Banking
Cloud Computing
cloud services acquisition
Ghana
Context
service provider ability
service provider integrity
transacting parties
trust
trusted cloud identity ecosystem
Trusted Computing
user assurances
user confidence
Data protection
digital identity management system
financial institutions