Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
confidential information leakage
biblio
A Hybrid Solution for Confidential Data Transfer Using PKI, Modified AES Algorithm and Image as a Secret Key
Submitted by aekwall on Mon, 01/25/2021 - 12:58pm
PKI
symmetric encryption technologies
secure transfer
modified AES algorithm
key generation server
insecure network
confidential information trading
confidential information leakage
confidential data transfer
asymmetric encryption technologies
Asymmetric Encryption
online services
modified AES
sensitive information
digital signatures
Servers
cyber threats
public key cryptography
Public key
internet
Metrics
composability
pubcrawl
Human behavior
Resiliency
data encryption
data integrity
Receivers
hybrid encryption
encryption
biblio
Improvement of Privacy Preserved Rule-Based Risk Analysis via Secure Multi-Party Computation
Submitted by grigby1 on Wed, 11/14/2018 - 1:19pm
privacy protection
Servers
secure risk analysis method
secure multiparty computation
secret sharing
Scalability
risk analysis
Random access memory
pubcrawl
Prototypes
Protocols
Attack Tree Analysis
privacy preserved rule-based risk analysis
privacy
Ports (Computers)
Human Factors
expert systems
Engines
data privacy
Cryptography
confidential information leakage
confidential information abuse
biblio
"Ontology Based APT Attack Behavior Analysis in Cloud Computing"
Submitted by abfox on Tue, 02/14/2017 - 12:48pm
malicious attack behavior
zero-day vulnerability
security of data
pubcrawl170101
personal information
Organizations
ontology based APT attack behavior analysis
Ontology
ontologies (artificial intelligence)
Ontologies
malware
malicious code
advanced persistent threat
Intrusion Detection
Inference Rules
hacking techniques
economic damage
confidential information leakage
Computers
Communication system security
Cloud Computing
APT attack detection techniques
APT attack