Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
sensitive data
biblio
CloudDLP: Transparent and Automatic Data Sanitization for Browser-Based Cloud Storage
Submitted by grigby1 on Thu, 07/09/2020 - 1:57pm
Human Factors
user data privacy
transparent data sanitization
textual documents
sensitive information
sensitive image documents
sensitive data
Scalability
Resiliency
resilience
pubcrawl
Protocols
privacy
learning (artificial intelligence)
automatic data sanitization
Human behavior
encryption
document image processing
deep learning
Data Sanitization
data privacy
data deletion
Compositionality
CloudDLP
cloud services
Cloud Computing
Browsers
browser-based cloud storage
biblio
Encryption Algorithm Based on Neural Network
Submitted by grigby1 on Fri, 05/08/2020 - 2:43pm
decryption
Neural Network Security
unsecure network
unauthenticated users
Soft Computing
public key cryptography
network communication
Encryption technique
encryption algorithm
decryption techniques
confidential data
Communication Network
auto associative neural network
Biological neural networks
Ciphers
Receivers
Metrics
neural nets
network security
sensitive data
security
computer network security
collaboration
policy-based governance
pubcrawl
encryption
Cryptography
biblio
Measuring data privacy preserving and machine learning
Submitted by aekwall on Mon, 04/20/2020 - 10:23am
Organizations
Software
sensitive data
pubcrawl
Privacy-preserving
privacy violations
privacy preservation metric
Privacy Preferences
privacy models and measurement
privacy measurement
privacy levels
privacy
Computational modeling
Metrics
Measurement
machine learning techniques
machine learning models
machine learning
learning (artificial intelligence)
data publishing
data publisher
data privacy-preserving
data privacy
data owners
biblio
Undertow: An Intra-Kernel Isolation Mechanism for Hardware-Assisted Virtual Machines
Submitted by grigby1 on Fri, 04/17/2020 - 10:24am
isolation
bug-prone
commodity operating system
critical data
EPT violations
flexible cloud servers
guest kernel
guest virtual machine
Hardware virtualization
hardware-assisted isolation mechanism
hardware-assisted virtual machines
Intel processors
intra-kernel isolation mechanism
isolated environment
boot time
Kernel Protection
multiple restricted Extended Page Table
nested kernel
popular paths
pre-defined EPT
read-only protection
system calls
unpopular paths
untrusted code
untrusted outter kernel
virtualization exception
VMFUNC
virtualization privacy
composability
Cloud Computing
security
Trusted Computing
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
data privacy
sensitive data
privacy
storage management
security threats
authorisation
invasive software
Linux
Switches
virtualisation
Virtual machining
Kernel
operating system kernels
Virtual machine monitors
virtual machines
Virtualization
Metrics
security policies
bare-metal machines
biblio
FalconEye: A High-Performance Distributed Security Scanning System
Submitted by grigby1 on Fri, 04/10/2020 - 12:53pm
secure practices
great precision
high-performance distributed security scanning system
human society
important transactions
input module
input source module
malicious users
open source framework
public domain software
scanner module
generic vulnerabilities scanning
sensitive data
Spider
support platform module
Vulnerability Scanning System
web applications
Web developers
web vulnerabilities
Pervasive Computing Security
Human Factors
Human behavior
Servers
Monitoring
Scalability
computer architecture
internet
Task Analysis
pubcrawl
Metrics
Resiliency
resilience
security of data
Uniform resource locators
web security
application security
common vulnerabilities test environment
conventional platform
detection systems
distributed scanning system
existing security vulnerabilities
FalconEye system
biblio
Context-Aware Enforcement of Privacy Policies in Edge Computing
Submitted by grigby1 on Fri, 04/03/2020 - 12:33pm
Human behavior
sensitive data
Scalability
pubcrawl
Privacy Policies
privacy model
privacy measures
privacy enhanced applications
privacy
mobile electronic health record
mobile computing
Cloud Computing
electronic health records
ehealth domain
edge computing
e-health
data privacy
context-aware enforcement
context-aware edge computing
context awareness
complex domain-specific privacy policies
biblio
Learning Automata Based Secure Multi Agent RFID Authentication System
Submitted by aekwall on Mon, 03/23/2020 - 1:33pm
RFID tags
RFIDs
utility function
technological developments
Scyther
RFID technologies
RFID scenario
multiagent intelligent system
Multi Agent
long term benefit
learning automata
expertly transfer utility
automata based secure multiagent RFID authentication system
RFID system
security
radiofrequency identification
sensitive data
RFID
authentication
privacy
multi-agent systems
radio frequency identification
pubcrawl
Human behavior
Resiliency
Cryptographic Protocols
telecommunication security
data privacy
biblio
Password Guessing Using Machine Learning on Wearables
Submitted by aekwall on Mon, 02/17/2020 - 2:56pm
pubcrawl
wearables security
wearables
Wearable Device
wearable computers
ubiquitous items
sensitive data
security purposes
security of data
security
Scalability
Resiliency
raw data
accelerometer
privacy
password guessing
machine learning algorithms
machine learning
learning (artificial intelligence)
IoT
Human behavior
health context
GPS
Bluetooth
Accelerometers
biblio
Tracking Sensitive Information and Operations in Integrated Clinical Environment
Submitted by aekwall on Mon, 01/27/2020 - 10:28am
integrated Clinical Environment
sensitive information
complex ICE systems
data flow
data flow analysis framework
device interoperability
dynamic analysis
high-level supervisory apps
Ice
sensitive data
low-level communication middleware
medical cyber physical system
medical cyber-physical systems
medical devices
Publishing
sensitive operations
standardized framework
security
open systems
static analysis
medical information systems
middleware
interoperability
taint analysis
privacy
data flow analysis
standards
Metrics
composability
pubcrawl
performance evaluation
data privacy
security of data
biblio
On Integrating Lightweight Encryption in Reconfigurable Scan Networks
Submitted by aekwall on Mon, 01/20/2020 - 12:01pm
RSN
intellectual property
Lightweight Ciphers
lightweight stream cipher
logic testing
maintenance
malicious users
novel hardware
on-chip instrumentation
pubcrawl
PUF
reconfigurable scan networks
Resiliency
integrating lightweight encryption
Scalability
seamless integration
secret keys
Secure Wrapper
self-test
sensitive data
Software
software combined approach
system-on-chip
testing workflow
versatile software toolchain
flexible access
appropriate counter-measures
Ciphers
Cryptographic Protocols
Cryptography
data integrity
data privacy
debug modules
embedded instrumentation
embedded systems
encryption
field programmable gate arrays
-play instrument wrapper
FPGA-based implementation
Hardware
Hardware Security
IEEE standards
IEEE Std 1687
IEEE Std 1687 RSNs
IJTAG
industrial property
instrument wrapper
Instruments
integrated circuit testing
« first
‹ previous
1
2
3
4
5
next ›
last »