Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
sensitive data
biblio
Differential Privacy of Online Distributed Optimization under Adversarial Nodes
Submitted by grigby1 on Mon, 12/16/2019 - 2:53pm
graph theory
sensitive data
Scalability
Resiliency
resilience
regular node
pubcrawl
privacy
preliminary attempt
optimization
online learning
online distributed optimization
network topology
learning (artificial intelligence)
important data information
Human behavior
adversarial
distributed optimization
distributed online learning algorithm
Distributed databases
differential privacy
different adversary models
data privacy
data analysis
cyber-physical systems
cyber physical systems
Cyber Physical System
Control Theory and Privacy
Control Theory
big data analysis methods
Big Data
adversarial nodes
biblio
Authentication Protocol for Wearable Devices Using Mobile Authentication Proxy
Submitted by grigby1 on Wed, 01/16/2019 - 1:31pm
transport protocols
wearables security
unauthorized wearable devices
transport layer security handshake protocol
TLS handshake protocol
session key
sensitive data
secure data transmission
Prototypes
mobile authentication proxy
handshake protocol
Data collection
authentication protocol
application server
Wearable Device
proxy
authorisation
Servers
Cryptography
Cryptographic Protocols
performance evaluation
message authentication
telecommunication security
Protocols
Scalability
Resiliency
Human behavior
pubcrawl
authentication
biblio
M-sanit: Computing misusability score and effective sanitization of big data using Amazon elastic MapReduce
Submitted by grigby1 on Wed, 09/12/2018 - 10:21am
Data Sanitization
voluminous data
privacy preserving data publishing
privacy preserving data mining
misusability score
misusability measure
MapReduce programming paradigm
EMR
EC2
big data processing
Amazon Elastic MapReduce
Amazon Elastic Cloud Compute
outsourced data
sensitive data
Resiliency
programming
resilience
sanitization
Publishing
parallel programming
MapReduce
Distributed databases
Data mining
Cloud Computing
data privacy
Big Data
composability
Human Factors
Human behavior
pubcrawl
privacy
biblio
Pushing Data Privacy Control to the Edge in IoT Using Policy Enforcement Fog Module
Submitted by grigby1 on Thu, 05/24/2018 - 11:25am
active data bundles
Cloud Computing
Fog computing
Human behavior
Internet of Things
Policy
privacy
Privacy Policies
pubcrawl
real-time processing
Scalability
sensitive data
Smart Home
biblio
Testing Techniques and Analysis of SQL Injection Attacks
Submitted by grigby1 on Thu, 05/24/2018 - 11:08am
SQL Injection vulnerability
resilience
Resiliency
security of data
security systems
security testing
sensitive data
sensitive information
SQL
SQL injection
SQL Injection attacks
SQL injection problems
relational databases
SQL query
testing techniques
three-tier-architecture
traditional security policies
user interfaces
users
Web application vulnerabilities
web applications
Web sites
website
handy interface
attackers
Cogeneration
commonly used Web application attacks
composability
Data protection
database-driven Web applications
DH-HEMTs
different security systems
effective data protection systems
good target
governmental organizations
attack
Human behavior
integrated circuits
internet
Knowledge engineering
Metrics
penetration testing technique
program testing
proper data protection
pubcrawl
relational database security
biblio
De Duplication Scalable Secure File Sharing on Untrusted Storage in Big Data
Submitted by grigby1 on Mon, 03/19/2018 - 12:35pm
Resiliency
knowledge copy
knowledge deduplication
Metrics
Peer-to-peer computing
privacy issues
pubcrawl
Public key
resilience
knowledge confidentiality
Secure File Sharing
security
security issues
sensitive data
storage
Token
untrusted storage
Writing
data privacy
Big Data
ciphertexts
Cloud Computing
composability
confluent key
convergent secret writing
cryptographical hash price
Cryptography
ancient secret writing
decryption
deduplication scalable secure file sharing
embedded systems
encoding
encryption
hashkey
Human behavior
information copy
biblio
A Dynamic Searchable Encryption Scheme for Secure Cloud Server Operation Reserving Multi-Keyword Ranked Search
Submitted by grigby1 on Mon, 03/19/2018 - 12:35pm
Secure
outsourcing
pubcrawl
query processing
ranked search
resilience
Resiliency
resource pooling
search problems
multikeyword
secure cloud server operation
Secure File Sharing
secure technique
sensitive data
Servers
TF × IDF model
update
update operation
dynamic
cloud
Cloud Computing
composability
computational overhead
Cryptography
data owners
data privacy
data users
Amazon EC2 cloud server
dynamic operation
dynamic searchable encryption scheme
encryption
Human behavior
Indexes
Metrics
multi-keyword
biblio
Enhancing data security of iOS client by encryption algorithm
Submitted by K_Hooper on Wed, 02/28/2018 - 10:34am
Human Factors
sensitive data
Resiliency
pubcrawl
mobile devices
Metrics
iOS Security
iOS devices
iOS client
iOS (operating system)
information security
Compositionality
encryption algorithms
EDS
ECC encryption algorithms
ECC
desktop computer
DES encryption algorithm
Data Transmission
Data Security
Cryptography
biblio
Hail to the Thief: Protecting data from mobile ransomware with ransomsafedroid
Submitted by grigby1 on Wed, 02/21/2018 - 12:47pm
Ransomware
Metrics
Mobile communication
mobile computing
mobile devices
Mobile handsets
mobile ransomware
performance evaluation
pubcrawl
RANSOMSAFEDROID prototype
malware
resilience
Resiliency
Scalability
secure local persistent partition
sensitive data
software performance evaluation
storage management
Trusted Computing
TrustZone based backup service
data recovery
android encryption
Android ransomware dissemination
Androids
ARM TrustZone extension
back-up procedures
backup tools
Cryptography
data encryption
Data protection
Android (operating system)
device filesystem
Hardware
Human behavior
Human Factors
Humanoid robots
i.MX53 development board
incremental backups
invasive software
biblio
Security in a Distributed Key Management Approach
Submitted by grigby1 on Wed, 02/21/2018 - 12:39pm
key management
user-specific keys
single-tenant scenario
Servers
sensitive data
Scalability
Runtime
Resiliency
resilience
pubcrawl
privacy breach data
outsourcing
Metrics
application providers
Key Distribution
Human behavior
encryption
distributed key management approach
Databases
data privacy
data owners
Cryptography
Cloud Security
cloud provider
Cloud Computing
classified records
« first
‹ previous
1
2
3
4
5
next ›
last »