Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hard disks
biblio
CPSD: A data security deletion algorithm based on copyback command
Submitted by grigby1 on Fri, 06/16/2023 - 3:55pm
Classification algorithms
Computer applications
Conferences
Copyback
data deletion
Data Security
Hard disks
Media
NAND flash
pubcrawl
Registers
Scalability
Secure Erase
storage system
biblio
Data Security Structure of a Students’ Attendance Register Based on Security Cameras and Blockchain Technology
Submitted by grigby1 on Fri, 04/28/2023 - 3:53pm
Compositionality
security camera
blockchains
mechatronics
Data Security
computational intelligence
Hard disks
blockchain technology
Cameras
Cryptography
Registers
composability
Computer crime
Artificial Intelligence
pubcrawl
Servers
security
biblio
Exploring Social Dynamics of Hard-Disk Drives Circularity with an Agent-Based Approach
Submitted by aekwall on Wed, 03/23/2022 - 9:33am
Measurement
Organizations
Scalability
Human behavior
Industries
renewable energy sources
pubcrawl
Memory
Agent-based modeling
Circular economy
Hard disks
hard-disk drives
socio-technical systems
System Dynamics
theory of planned behavior
Social Agents
biblio
A Deep Exploration of BitLocker Encryption and Security Analysis
Submitted by grigby1 on Mon, 11/29/2021 - 2:11pm
pubcrawl
VMK
unlock password
Universal Serial Bus
System recovery
Security analysis
Resiliency
resilience
recovery key
BitLocker encryption
password
Partitioning algorithms
Hard disks
Force
external key
encryption
Dictionaries
biblio
Challenges and Designs for Secure Deletion in Storage Systems
Submitted by aekwall on Mon, 01/11/2021 - 1:30pm
data scrubbing
data deletion
user data protection
storage systems
secure deletion
programming strategy
magnetic recording
legal compliance requirements
hard disk drives
flash-based solid-state drives
disc drives
deletion design security
security of data
Hard disks
flash memories
Data Sanitization
Law
storage management
privacy
pubcrawl
encryption
Data Security
Scalability
biblio
A New Approach to Double I/O Performance for Ceph Distributed File System in Cloud Computing
Submitted by grigby1 on Fri, 09/04/2020 - 3:15pm
local file system
distribute storage systems
Engines
faster IO performance
fault tolerant computing
hard disk
Hard disks
infrastructure-as-a-service
IO operations
cloud computing system
network operating systems
persistent storage service
storage engine
storing virtual machines
virtual machine
virtual machines
Virtual machining
BIOS Security
performance evaluation
Scalability
storage management
pubcrawl
Metrics
Resiliency
resilience
optimization
Human Factors
Cloud Computing
Throughput
Distributed databases
backend block storage service
block devices
block storage resources
block storage services
Ceph distributed file system
biblio
If Air-Gap Attacks Encounter the Mimic Defense
Submitted by grigby1 on Fri, 08/07/2020 - 3:37pm
resilience
mimic defense
Hard disks
Electromagnetic radiation
dynamic heterogeneous redundancy structure
dynamic heterogeneous redundancy
DHR structure
air-gap attacks
air-gap attackers
Air gaps
game theory
Transmitters
Atmospheric modeling
security
Metrics
malicious software
malware
composability
network attack
Intrusion Detection
computer network security
Resiliency
Human Factors
Human behavior
pubcrawl
biblio
Design and Realization of a Computer Security Control Circuit for Local Area Network
Submitted by aekwall on Mon, 05/04/2020 - 11:22am
control unit
Networked Control Systems Security
security threat
secure hard disk
ordinary hard disk
new technology challenge
network attack
management defect
local area network computer security control circuit
LAN security
LAN computers
LAN computer security control circuit
Hard disks
cyberattack
Circuit synthesis
circuit design
Predictive Metrics
security management
Local area networks
Information systems
composability
pubcrawl
Resiliency
information security
computer network security
biblio
"Discarded hard disks ??? A treasure trove for cybercriminals: A case study of recovered sensitive data from a discarded hard disk"
Submitted by abfox on Tue, 02/14/2017 - 12:25pm
security threats
malware
Media
Organizations
pubcrawl170101
reconnaissance activities
recovered sensitive data
Security and Privacy Awareness
security controls
malicious link
sensitive-personal organizational data
social network analysis
Software
Spear-phishing
stolen storage devices
Trust management
unsolicited e-mail
e-mail credibility
background information
Cybercrime
cybercriminals
Data protection
data recovery
Digital Forensics
discarded hard disks
discarded storage devices
advanced persistent threat
Electronic mail
hard discs
Hard disks
invasive software
malicious activities
malicious actors
malicious attachment