Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Software Architecture
biblio
Privacy-preserving fog computing paradigm
Submitted by grigby1 on Fri, 10/26/2018 - 3:46pm
Privacy in Fog
Software Architecture
security of data
security assessment
security
Scalability
Resiliency
pubcrawl
privacy-preserving fog computing paradigm
Privacy Threats
Cloud Computing
privacy
IoT
Intelligent sensors
fog nodes
fog computing architecture
Fog computing
edge computing
data privacy
computer architecture
biblio
Towards Collaborative Trust Management
Submitted by grigby1 on Thu, 08/23/2018 - 10:46am
Peer-to-peer computing
Trusted Computing
trust profiles
trust management operations
Trust management
trust
taxonomy
Software Architecture
reference architecture
reconfigurable trust management operations
quality of service
pubcrawl
Personalized Trust
Cloud Computing
Human Factors
Human behavior
hardcoded trust computations
groupware
customizable trust management operations
contemporary trust management solutions
computer theory
computer architecture
Complexity theory
Collaborative Trust Computing
collaborative personalized trust management system
collaboration
biblio
Toward the SIEM architecture for cloud-based security services
Submitted by grigby1 on Thu, 08/23/2018 - 10:43am
intelligent cyber-threat
virtualization technologies
virtualisation
Software Architecture
SIEM architecture
SIEM
security-as-a-service
security of data
security information and event management
SECaaS platform
SECaaS
pubcrawl
Cloud Computing
information security
Engines
Data models
Data mining
Cryptography
Correlation
computational intelligence
Compositionality
composability
cloud-based security service
biblio
An object-oriented open software architecture for security applications
Submitted by grigby1 on Thu, 06/07/2018 - 2:01pm
public key cryptography
Universal Serial Bus
Software Architecture
Software
smart cards
security of data
security device
security applications
security APIs
security
secure messaging
secure communication
SEcube™ platform
Resiliency
resilience
application program interfaces
pubcrawl
Pins
Open Hardware security platform
object-oriented open software architecture
object oriented security
multiplatform Open Source security framework
Metrics
Libraries
Hardware
field programmable gate arrays
dedicated Open Hardware devices
Data protection
CPU
composability
biblio
Next Generation Automotive Architecture Modeling and Exploration for Autonomous Driving
Submitted by el_wehby on Fri, 05/25/2018 - 3:23pm
next generation automotive architecture modeling
timing
system integration
Software Architecture
Software
sensors
security
road vehicles
optimization
optimisation
Automotive engineering
mobile robots
mechanical engineering computing
heterogeneous components
hardware architecture
design metrics validation
control engineering computing
computer architecture
Autonomous Driving
Autonomous automobiles
1553757
biblio
End-To-End Security Architecture for Federated Cloud and IoT Networks
Submitted by grigby1 on Mon, 03/19/2018 - 12:49pm
network federation mechanisms
virtualisation
Software Architecture
smart Internet of Things
SFC
service function chaining
sensors
security policy enforcement
security of data
security
Resiliency
resilience
pubcrawl
NFV
network slices protection
network function virtualisation
actuator security
Metrics
IoT networks
Internet of Things
Human behavior
heterogeneous platforms
end-to-end security architecture
Data protection
Data Analytics
data analysis
computer architecture
composability
Communication networks
clouds
cloud networks
Cloud Computing
biblio
Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location
Submitted by grigby1 on Mon, 03/19/2018 - 12:37pm
Intrusion Detection
wireless LAN
Wi-Fi
Web sites
web browsing behavior
Web browsing
stylometry
Software Architecture
pubcrawl
parallel binary decision fusion architecture
online front-ends
multimodal biometric systems
Mobile handsets
Metrics
message authentication
Keyboards
Active Authentication
insider threat
Humanoid robots
Human behavior
GPS location
Global Positioning System
geographical colocation
decision fusion
biometrics (access control)
Behavioral biometrics
authentication
application usage patterns
Androids
Android mobile device
Android (operating system)
biblio
Software Metrics as Indicators of Security Vulnerabilities
Submitted by grigby1 on Mon, 03/05/2018 - 12:08pm
resilience
vulnerable software units
Software systems
software security vulnerabilities
software quality
software operational phase
software metrics
Software Architecture
software architectural characteristics
security vulnerabilities
security of data
security
search problems
Resiliency
coding theory
pubcrawl
nonvulnerable code
Metrics
heuristic search technique
function levels
file levels
Feature Selection
Cryptography
correlation coefficients
Correlation
Compositionality
Complexity theory
biblio
Exogenous Connectors for Hierarchical Service Composition
Submitted by K_Hooper on Wed, 02/28/2018 - 10:31am
orchestration
web services
visualization
total compositionality
Software Architecture
service-oriented systems
service-oriented architecture
Sequential analysis
Scalability
pubcrawl
Proposals
choreography
MusicCorp
microservices
message passing
hierarchical service composition
explicit control flow
exogenous connectors
Distributed databases
Connectors
Compositionality
biblio
Securing digital identities in the cloud by selecting an apposite Federated Identity Management from SAML, OAuth and OpenID Connect
Submitted by K_Hooper on Wed, 02/14/2018 - 11:05am
Scalability
OIDC
open authentication
openid connect
open systems
Protocols
pubcrawl
Resiliency
risk management
SAML
OAuth
security assertion markup language
security strength
security vulnerability
Servers
Software Architecture
SSO
standards
technical security measure
XSS
federated identity management
authentication
authorisation
authorization
Cloud Computing
cloud environment
computer systems access
Data protection
digital identities security
DoS
architectural design
FIdM
FIdM standard
Human behavior
Identity management
IT infrastructure
legal security measure
Markup languages
message authentication
MITM
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »