Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Scalable Security
biblio
Deriving cyber use cases from graph projections of cyber data represented as bipartite graphs
Submitted by grigby1 on Tue, 01/23/2018 - 3:45pm
Anomaly Detection
Bipartite graph
cyber security
graph analytics
IP networks
Measurement
Peer-to-peer computing
pubcrawl
Scalability
scalable
Scalable Security
security
Servers
situational awareness
biblio
Boot-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of IoT Nodes
Submitted by grigby1 on Tue, 01/23/2018 - 3:45pm
message authentication
threat
smart devices
Service Access
security-critical operations
security
secure bootstrapping
Scalable Security
scalable
Scalability
pubcrawl
privacy-aware authentication scheme
privacy
network access
adversary
IoT systems
Internet of Things
integrated circuits
Electronics packaging
Device-to-device communication
data privacy
Cyber Attacks
computer bootstrapping
Cameras
Boot-IoT
authorisation
authentication
attack
biblio
Scalable cyber-security analytics with a new summary-based approximate query engine
Submitted by grigby1 on Tue, 01/23/2018 - 3:45pm
Network Event Log Analytics
tools
Summary Data Processing
security
Scalable Security
scalable
Scalability
relational database security
pubcrawl
Approximate Query Engines
Monitoring
Information Granulation
Fuzzy Similarity of Complex Objects
Engines
Electronic mail
Databases
computer security
biblio
Fast and Scalable Security Support for Directory-Based Distributed Shared Memory
Submitted by grigby1 on Fri, 11/03/2017 - 11:31am
pubcrawl
Scalability
Scalable Security
biblio
Build Trust in the Cloud Computing - Isolation in Container Based Virtualisation
Submitted by grigby1 on Fri, 11/03/2017 - 11:31am
pubcrawl
virtualisation
Virtual machining
virtual machines
Trusted Computing
trust relationship
trust layer
stress test
security system
Scalable Security
scalable computing resources
Scalability
role-based access control model
RBAC model
RBAC
Access Control
Kernel
IT ecosystems
isolation benchmarking tools
isolation benchmarking
Data Security
Data protection
Containers
container protection
Container isolation
container based virtualisation
cloud users
cloud service providers
Cloud Computing
authorisation
biblio
Scalable and privacy-preserving authentication protocol for secure vehicular communications
Submitted by grigby1 on Fri, 11/03/2017 - 11:31am
Safety
vehicular communications security
vehicular ad hoc networks
vehicle to vehicle communications
vehicle to infrastructure communications
VANETs
VANET
V2V
V2I
symmetric hash message authentication code
symmetric cryptography
security
Scalable Security
scalable and privacy-preserving authentication protocol
Scalability
asymmetric cryptography
public-key infrastructure
public key cryptography
pubcrawl
Protocols
privacy-preserving authentication protocol
privacy
PKI-based authentication protocols
PKI
message authentication
ESPA protocol
efficient
Cryptography
Cryptographic Protocols
authentication
biblio
A Scalable Meta-Model for Big Data Security Analyses
Submitted by grigby1 on Fri, 11/03/2017 - 11:31am
network anomaly detection
Training data
sufficient statistics
statistical data models
security of data
security analyses
security
Scalable Security
scalable meta-model
Scalability
regression analysis
pubcrawl
Predictive models
Big Data
meta-model sufficient statistics
meta-model matrix
Meta-Model
matrix algebra
machine learning algorithms
linear regressions
linear regression models
linear regression
learning (artificial intelligence)
Data models
Conferences
Big Data security analysis
biblio
Security and privacy for smart grid using scalable key management
Submitted by grigby1 on Fri, 11/03/2017 - 11:31am
Public key
symmetric key technique
symmetric key scheme works
smart power grids
Smart Grids
Smart Grid
sensors
secure key management
Scalable Security
scalable key management
Scalability
replay attack
public key cryptography
authentication
pubcrawl
Protocols
power system security
power system management
Needham-Schroeder authentication protocol
Needham Schroder Authentication
man-in-the-middle attack
key management
Fault-Tolerance
fault tolerance
elliptic curve public key technique
Cryptographic Protocols
biblio
Providing advanced security mechanism for scalable data sharing in cloud storage
Submitted by grigby1 on Fri, 11/03/2017 - 11:30am
public key cryptography
trees (mathematics)
tree structure
standards
smart cards
Smart card
single key file encryption
Servers
security of data
secret key aggregation
Scalable Security
scalable data sharing
Scalability
public-key cryptosystems
advanced security mechanism
public key crypto system
pubcrawl
KAC
encryption
decryption right allocation
data handling
cloud storage
Cloud Computing
Ciphers
cipher texts
cipher text
Aggregates
biblio
SDSM: Fast and scalable security support for directory-based distributed shared memory
Submitted by grigby1 on Fri, 11/03/2017 - 11:30am
public clouds
single-threaded applications
shared memory
security of data
security layer
security
secure parallel applications
secure CPU architectures
SDSM
Scalable Security
Scalability
Radiation detectors
Coherence
pubcrawl
parallel computation
hardware approach
Hardware
encryption
Electrical Engineering
DSM
distributed shared memory systems
distributed computation
directory-based distributed shared memory systems
directory
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »