Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pubcrawl170109
biblio
Analysis and Prevention of Account Hijacking Based INCIDENTS in Cloud Environment
Submitted by grigby1 on Tue, 03/07/2017 - 12:33pm
information technology
The New York Times
Service Hijacking
Servers
security of data
Security Incident Management
pubcrawl170109
Organizations
malicious cyber activity
Account Hijacking
cyber-attack
Computer crime
Cloud Security
cloud environment
Cloud Computing
account hijacking prevention
account hijacking analysis
biblio
Internet of Vulnerable Things (IoVT): Detecting Vulnerable SOHO Routers
Submitted by grigby1 on Tue, 03/07/2017 - 12:33pm
internet
vulnerable SOHO router detection
vulnerabilities
telecommunication network routing
SOHO routers
Servers
pubcrawl170109
Object recognition
man-in-the-middle attacks
IP networks
Internet of Vulnerable Things
Internet of Things
ASN space
information security
Indian autonomous system number space
domain name space settings
DNS settings
DNS information extraction
DNS Changer
Data mining
consumer grade small scale routers
computer network security
Computer crime
attack patterns
biblio
On resilience of Wireless Mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications
Submitted by grigby1 on Tue, 03/07/2017 - 12:33pm
network layer attacks
wireless sensor networks
wireless mesh routing protocol
wireless mesh networks
wireless mesh network
Wireless communication
security
Routing protocols
Routing Protocol
Routing
pubcrawl170109
Ambient Assisted Living
IoT-based ambient assisted living applications
Internet of Things
eHealthcare
DoS attacks
Denial of Service attacks
denial of service
data packet delivery ratio
computer network security
Computer crime
biblio
Neighborhood area network security in smart grid using security enhanced key updating
Submitted by grigby1 on Tue, 03/07/2017 - 12:33pm
simple one-way hash function based scheme
PCL
power system security
process analysis toolkit
protocol composition logic
Protocols
pubcrawl170109
SAE protocols
security attacks
security enhanced key updating
PAT
simultaneous authentication of equals protocols
Smart Grid
smart grid infrastructure
Smart Grids
smart power grids
telecommunication security
wireless mesh networks
WMNs
EMSA protocol
Communication networks
Computer crime
Cryptographic Protocols
cyber-attacks
denial of service attack
DoS attack
efficient mesh security association protocols
EMSA
authentication
EMSA protocols
IEEE 802.11s
key refreshment strategy
Logic gates
mesh key holder security handshake
MKHSH
NAN
neighborhood area network security
biblio
MLDED: Multi-layer Data Exfiltration Detection System
Submitted by grigby1 on Tue, 03/07/2017 - 12:32pm
forensic readiness data exfiltration system
tuning
standards
sensitive data exfiltration detection
security
pubcrawl170109
plain ASCII text
PDF files
Organizations
organization information system
multilayer data exfiltration detection system
MLDED system
keyword labeling
keyword extraction
information protection strategy
Algorithm design and analysis
Digital Forensics
data theft
data loss
data leakage threats
data leakage
data hiding
Data Exfiltration
Data Breach
Cryptography
crime ware services
computer network security
Computer crime
Complexity theory
Communication networks
biblio
Security modeling and analysis of a self-cleansing intrusion tolerance technique
Submitted by grigby1 on Tue, 03/07/2017 - 12:32pm
computer architecture
Computer crime
intrusion tolerance
Markov processes
Numerical models
Preventive maintenance
pubcrawl170109
Servers
System Availability
biblio
Digital forensic framework using feedback and case history keeper
Submitted by grigby1 on Tue, 03/07/2017 - 12:32pm
Digital Forensics
system monitoring
pubcrawl170109
Mathematical model
history lookup facility
History
forensic models
feedback
Evidence
Adaptation models
digital forensic framework
digital crime investigation
digital crime
cyber crime investigation
Computers
Computer crime
Computational modeling
case history keeper
biblio
Literature review of different contention of E-commerce security and the purview of cyber law factors
Submitted by grigby1 on Tue, 03/07/2017 - 12:32pm
Information systems
security privacy policy
security
pubcrawl170109
privacy
legislation
jurisdiction
IT
internet
information technology
Business
electronic commerce
e-consumer protection
E-Commerce Security
e-commerce law
data privacy
cyberspace security
cyber-crime activity
cyber law factor
Computer crime
biblio
Visual structures for seeing cyber policy strategies
Submitted by grigby1 on Tue, 03/07/2017 - 12:32pm
information synthesis
visualization
visual structures
Verizon 2014 Data Breach Report
terrorist attack
Terrorism
Situation Awareness
security of data
pubcrawl170109
Organizations
information visibility
Complexity theory
Human-computer interaction
Data visualization
data visualisation
cyber security policy
cyber security
cyber policy strategies
cyber incident detection
Cyber Attacks
computer security
biblio
Physically Unclonable Digital ID
Submitted by grigby1 on Tue, 03/07/2017 - 12:31pm
physically unclonable function
Hash functions
identification of persons
identity management systems
Immune system
mobile hardware security
Optical imaging
Optical sensors
physically unclonable digital ID
encryption keys
pubcrawl170109
PUF
Q-PUDID
quasi-PUDID
random number generation
Servers
two-factor authentication
Access Control
dynamic human identity
digital signatures
digital identity thefts
device authentication
descrambler-hardware authentication
cyber security
Cryptography
cryptanalysis
computer security
Cloning
clonable static information
center for strategic and international studies
biometrics
authorisation
authentication
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »