Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cloud provider
biblio
Edge Computing for User-Centric Secure Search on Cloud-Based Encrypted Big Data
Submitted by aekwall on Mon, 07/13/2020 - 10:06am
sensitive data
multisource Big Data search space
pattern clustering
Privacy-Preserving Big Data
pruning system
pubcrawl
Resiliency
Scalability
semantic search
Metrics
user privacy in the cloud
User-based Sampling
user-centric cloud services
user-centric search ability
user-centric search system
user-centric secure search
user-side encryption
big data security
markov chain
encryption
Encrypted Clustering
edge computing
data structures
data privacy
data control
Cryptography
cloud-based solutions
cloud service providers
cloud provider
Cloud Computing
big dataset clustering
big data encryption
Big Data
biblio
Secured Outsourcing towards a Cloud Computing Environment Based on DNA Cryptography
Submitted by grigby1 on Tue, 01/07/2020 - 9:51am
intensive data computing
trust
storage
security solution
security schema
security
secured outsourcing
Resiliency
resilience
pubcrawl
protection
private data
privacy
outsourcing
Metrics
Internet service
Cloud Computing
integrity
Human behavior
encryption
encoding
DNA cryptography
DNA
data center
Cryptography
confidentiality
completely secure migration
cloud service providers
cloud provider
cloud computing technology
cloud computing paradigm
biblio
Security in a Distributed Key Management Approach
Submitted by grigby1 on Wed, 02/21/2018 - 12:39pm
key management
user-specific keys
single-tenant scenario
Servers
sensitive data
Scalability
Runtime
Resiliency
resilience
pubcrawl
privacy breach data
outsourcing
Metrics
application providers
Key Distribution
Human behavior
encryption
distributed key management approach
Databases
data privacy
data owners
Cryptography
Cloud Security
cloud provider
Cloud Computing
classified records
biblio
An SDN Based Framework for Guaranteeing Security and Performance in Information-Centric Cloud Networks
Submitted by grigby1 on Fri, 02/02/2018 - 12:27pm
Scalability
information-centric cloud network security
network virtualization
networking aspects
performance requirements
provision network resources
pubcrawl
resource management
Routing
information centric services
SDN-based framework
security
software assurance
software defined networking
software-defined networking
virtual networks
virtualisation
Virtualization
computer centres
Cloud Computing
cloud data centers
cloud infrastructure
cloud network resources
cloud provider
cloud services
cloud user
composability
cloud applications
computer network performance evaluation
computer network security
delays
fully distributed data plane
information centric cloud framework
Information Centric Cloud Networking
information centric networking
biblio
Machine Learning Based DDoS Attack Detection from Source Side in Cloud
Submitted by grigby1 on Tue, 01/16/2018 - 5:24pm
machine learning based DDoS attack detection
Virtual machining
virtual machines
Virtual machine monitors
virtual machine monitor
telecommunication computing
statistical information
statistical analysis
Servers
Resiliency
pubcrawl
network traffic
network security
network packages
Metrics
Cloud Computing
machine learning algorithms
machine learning
learning (artificial intelligence)
Human behavior
feature extraction
Denial of Service attacks
DDoS attack detection
DDoS Attack
computer network security
Computer crime
composability
cloud server hypervisor
cloud provider
biblio
A more secure scheme for CAPTCHA-based authentication in cloud environment
Submitted by grigby1 on Wed, 12/20/2017 - 12:03pm
Phishing
human beings
Human Factors
information technology
message authentication
modified characters
on-demand network access
passkey
password guessing
password-based authentication
Human behavior
pubcrawl
salted hashes
secure scheme
security-related issues
short-password attack
single password
social engineering
user authentication
composability
authentication mechanism
authorisation
CAPTCHA
CAPTCHA-based authentication
captchas
Cloud Computing
cloud environment
cloud provider
cloud providers
authentication
Computer crime
configurable adaptive resources
critical security function
Cryptography
Dictionaries
dictionary attack
elastic collection
Handheld computers