Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Security by Default
biblio
Privacy-Preserving Detection of Inter-Domain SDN Rules Overlaps
Submitted by K_Hooper on Wed, 05/09/2018 - 10:01am
Inter-domain routing
network verification
privacy
pubcrawl
Resiliency
Scalability
Security by Default
SMPC
biblio
Certified Verification of Algebraic Properties on Low-Level Mathematical Constructs in Cryptographic Programs
Submitted by K_Hooper on Wed, 05/09/2018 - 10:01am
Cryptography
low-level implementation
pubcrawl
Resiliency
Scalability
Security by Default
verification
biblio
Most Websites Don'T Need to Vibrate: A Cost-Benefit Approach to Improving Browser Security
Submitted by K_Hooper on Wed, 05/09/2018 - 10:00am
Security Risk Management
Browser Security
pubcrawl
Resiliency
Scalability
Security by Default
software security
web security and privacy
biblio
Hardening the Client-Side: A Guide to Enterprise-Level Hardening of Web Browsers
Submitted by K_Hooper on Wed, 05/09/2018 - 10:00am
security
least privilege tailored configurations
multiple web browsers
online front-ends
Organizations
Phishing
Plugin-based attacks
pubcrawl
Resiliency
Scalability
Secure Configuration
least privilege browser hardening
Security by Default
security of data
Servers
tools
un-trusted sites
Vegetation
web browser hardening
Web browsers
Web sites
Windows-based enterprise
enforced configuration
Browsers
business data processing
classic client desktop infrastructure
Computers
critical enterprise sites
critical trusted websites
cyber-compromise
Cybersecurity
data breaches
default configurations
attack avenues
enterprise-level hardening
enterprise-wide strategy
Google Chrome
Hardening
high-granularity tailored configurations
internet
Internet Explorer
JavaScript attacks
least privilege
biblio
Comparing the Usability of Cryptographic APIs
Submitted by K_Hooper on Wed, 05/09/2018 - 10:00am
GitHub
Usable Security
usability
symmetric cryptography
software libraries
Security by Default
Scalability
Resiliency
Python developers
pubcrawl
programming
Libraries
Guidelines
API usability
documentation accessibility
documentation
cryptography errors
Cryptography
cryptographic library
cryptographic application programming interfaces
cryptographic API usability
controlled experiment
code security
auxiliary features
application program interfaces
biblio
Attack scenarios and security analysis of MQTT communication protocol in IoT system
Submitted by K_Hooper on Wed, 05/09/2018 - 10:00am
MQTT implementation
Things devices
telecommunication security
Security by Default
Security analysis
scenario
Scalability
Resiliency
pubcrawl
Protocols
protocol
Ports (Computers)
Payloads
MQTT system
MQTT protocol
adequate security mechanism
MQTT communication protocol
MQTT
ISO
IoT system
IoT device
IoT developers
Internet of Things
data privacy
Cryptography
computer network security
communication protocols
authentication
attack
biblio
IoT network monitor
Submitted by K_Hooper on Wed, 05/09/2018 - 10:00am
router
Mirai Botnet
Monitoring
network data analysis
password
Ports (Computers)
privacy
pubcrawl
Raspberry Pi
Resiliency
IoT network monitor
Scalability
security
Security by Default
security vulnerability
sensitive personal information
telecommunication traffic
user-friendly interface
user interfaces
deep packet analysis
Anomaly Detection
Biomedical monitoring
botnet
botnet traffic detection
character strings
computer network security
connected devices
consumer home IoT networks
Android (operating system)
default device passwords
default passwords
Entropy
home networks
home network security
Internet of Things
invasive software
IoT device
biblio
Internet of things (IoT) design considerations for developers and manufacturers
Submitted by K_Hooper on Wed, 05/09/2018 - 9:59am
large-scale interconnectivity
smart devices
sensors
Security by Default
Security Assurance
Scalability
Resiliency
recommended design considerations
pubcrawl
Protocols
Monitoring
authentication
IoT ecosystem
IoT Design
IoT application
IoT
Internet of Things
information security
embedded systems
embedded security
computer network security
Business
biblio
Forensic Attribution in NoSQL Databases
Submitted by grigby1 on Mon, 03/05/2018 - 12:03pm
message authentication
survey
Structured Query Language
sensitive information
security of data
Security by Default
Scalability
pubcrawl
policy-based governance
Peer-to-peer computing
NoSQL databases
NoSQL
Access Control
Human Factors
Human behavior
Forensics
forensic attribution
database forensics
collaboration
cloud implementations
Cloud Computing
authorisation
authentication
attribute-based encryption
biblio
The Influence of Data Protection and Privacy Frameworks on the Design of Learning Analytics Systems
Submitted by grigby1 on Tue, 01/23/2018 - 2:28pm
Security by Default
collaboration
Data protection
data protection by default
data protection by design
learning analytics
learning analytics process requirements
learning analytics systems design
personal information
Policy
policy-based governance
privacy by design
privacy frameworks
pubcrawl
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »