Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
relational databases
biblio
Digital Watermarking for Relational Database Security Using mRMR Based Binary Bat Algorithm
Submitted by aekwall on Mon, 11/04/2019 - 10:22am
mRMR based binary bat algorithm
data protection issues
data tempering attacks
Database-security
deletion attacks
evolutionary computation
evolutionary technique
feature-subset-selection
insertion attacks
data accuracy
mRMR based feature subset selection technique
numerical relational database
relational data
relational database security
reversible watermarking
security protection
watermark creation
security of data
constraints optimization technique
Constraint optimization
binary-bat-algorithm
alteration attacks
relational databases
digital watermarking
Watermarking
Clustering algorithms
Robustness
Metrics
composability
pubcrawl
Human behavior
Resiliency
data integrity
biblio
Research on Storage Mechanism of Cloud Security Policy
Submitted by aekwall on Tue, 10/22/2019 - 8:53am
cloud security policy
Security Policies Analysis
XML
storage mechanism
security policy
Secure storage
popular policy repositories
policy storage technology
policy repository
policy information
Key Words: Cloud Computing
Formal concept analysis
security of data
cloud computing security
storage management
Cloud Security
relational databases
Lattices
testing
policy-based governance
pubcrawl
cloud storage
Cloud Computing
biblio
A Framework for Insider Collusion Threat Prediction and Mitigation in Relational Databases
Submitted by aekwall on Wed, 05/08/2019 - 8:47am
insider threat
robust technique
Resiliency
resilience
remuneration
relational databases
relational database systems
relational database security
Relational Database
real time monitoring technique
pubcrawl
Predictive models
mitigating technique
Metrics
Knowledgebase
insiders accesses
threat mitigation
insider collusion threat prediction
information security
Human behavior
discovered collusion insider threat
database schema
database management systems
database architect
Data dependencies
Computer hacking
composability
Collusion Threat
collusion insider attacks
collaboration
Cloud Computing
authorisation
biblio
Scalable Static Analysis to Detect Security Vulnerabilities: Challenges and Solutions
Submitted by grigby1 on Fri, 02/22/2019 - 3:11pm
relational database security
Trademarks
tools
static code analysis
Static Analysis Tool
static analysis
SQL
security vulnerabilities
security of data
security
scalable static analysis
Resiliency
relational databases
applications code
pubcrawl
program diagnostics
PL/SQL server stack
Metrics
low false positives
Java EE
Java
Human behavior
Databases
Conferences
composability
C/C++ systems code
biblio
Adaptive Cache Replacement in Efficiently Querying Semantic Big Data
Submitted by grigby1 on Wed, 01/16/2019 - 1:37pm
knowledge bases querying
web services
triplestore
semantic Big Data querying
relational databases
RDF Caching
RDBMS
query response
query processing
query log
LRU
Linked Data
LFU
least recently used
least frequently used
Big Data
knowledge based systems
forecast method
exponential smoothing
Cache replacement
adaptive cache replacement policy
ACR policy
Web Caching
cache storage
Conferences
Scalability
Resiliency
Metrics
pubcrawl
biblio
Testing Techniques and Analysis of SQL Injection Attacks
Submitted by grigby1 on Thu, 05/24/2018 - 11:08am
SQL Injection vulnerability
resilience
Resiliency
security of data
security systems
security testing
sensitive data
sensitive information
SQL
SQL injection
SQL Injection attacks
SQL injection problems
relational databases
SQL query
testing techniques
three-tier-architecture
traditional security policies
user interfaces
users
Web application vulnerabilities
web applications
Web sites
website
handy interface
attackers
Cogeneration
commonly used Web application attacks
composability
Data protection
database-driven Web applications
DH-HEMTs
different security systems
effective data protection systems
good target
governmental organizations
attack
Human behavior
integrated circuits
internet
Knowledge engineering
Metrics
penetration testing technique
program testing
proper data protection
pubcrawl
relational database security
biblio
Detection of Temporal Insider Threats to Relational Databases
Submitted by grigby1 on Thu, 05/24/2018 - 11:08am
pubcrawl
Training
time series
temporal insider threat detection
Temporal Attacks
security of data
security
Resiliency
resilience
relational databases
relational database security
real-time systems
real-time anomaly detection
query processing
query features
access anomalies
Periodicity
Metrics
legitimate data access
Insider Threats
Human behavior
feature extraction
Data Security
data misuse
Data Analytics for Security
Data Analytics
data analysis
composability
Anomaly Detection
biblio
A Scalable Real-Time Framework for DDoS Traffic Monitoring and Characterization
Submitted by grigby1 on Thu, 05/24/2018 - 11:08am
apache kafka
apache spark
composability
Data mining
DDoS detection
ddos monitoring
distributed denial-of-service attacks
Human behavior
Metrics
network security
pubcrawl
relational database security
relational databases
resilience
Resiliency
streaming analytics
biblio
A Novel Framework for Zero-Day Attacks Detection and Response with Cyberspace Mimic Defense Architecture
Submitted by grigby1 on Mon, 03/26/2018 - 12:13pm
Metrics
Zero-day attacks
zero-day attack related database
Zero Day Attacks and Defense
unknown zero-day attacks
traditional defense methods
signature based defense
security of data
Resiliency
relational databases
recurrent attack
pubcrawl
Predictive Metrics
online redundant heterogeneous functionally equivalent modules
Zero day attacks
Knowledge Discovery
Intrusion detection and response
honeypot
feedback
executive module pool
distributed computing
cyberspace mimic defense architecture
Cyberspace Mimic Defense
composability
CMD architecture
Anomaly statistics and analysis
defense
biblio
Fingerprinting non-numeric datasets using row association and pattern generation
Submitted by grigby1 on Tue, 01/16/2018 - 5:22pm
Pattern generation and row association schemes
internet
Metrics
Non-numeric datasets
nonnumeric digital data
original pattern
Outsourced Database Integrity
Ownership protection
ownership rights
pattern generation
Fingers
primary key
pubcrawl
relational data
relational databases
Resiliency
row association schemes
RSA encryption
Secret key
Watermarking
fake rows
business purposes
composability
Cryptography
data analysis
Decoding
digital rights protection
encryption
fake attributes
fake pattern
application environment
fast internet
Fibonacci series
fingerprint detection algorithm
fingerprint identification
Fingerprint recognition
fingerprint sequence
Fingerprinting
fingerprinting nonnumeric datasets
« first
‹ previous
1
2
3
4
5
6
next ›
last »