Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
component
biblio
Communication Design for Underwater Acoustic Positioning Networks
Submitted by aekwall on Mon, 03/02/2020 - 12:36pm
multiple users UAPN
Underwater Networks
Underwater acoustics
underwater acoustic positioning networks
spread spectrum communication
sonar equation
Sonar
signal design
reliable communication
positioning service
offshore exploration
Oceans
ocean monitoring
networking protocols
narrow acoustic bandwidth
Scalability
marine research
marine engineering
communication design
underwater acoustic communication
telecommunication network reliability
Gold
sensors
Correlation
Metrics
component
Protocols
pubcrawl
Resiliency
Receivers
biblio
An Intrusion Detection System Based Secured Electronic Service Delivery Model
Submitted by aekwall on Mon, 02/24/2020 - 10:57am
multifaceted electronic services
government data processing
Banking
Cloud Banking
cloud banking transaction
cloud service model
ICT
identification number
information-and-communication technology
message communication
digital communication
open channel
PINA
privacy-integrity-nonrepudiation-and-authentication information
secured electronic service delivery model
security lapses
single window based cloud service delivery model
Smart card
Repudiation
composability
Cloud Computing
Servers
authorisation
data privacy
Conferences
Resiliency
Human behavior
pubcrawl
intrusion detection system
component
Computational modeling
Metrics
internet
Intrusion Detection
smart cards
unauthorized access
bank data processing
biblio
Improve the security over the wireless sensor networks in medical sector
Submitted by aekwall on Mon, 02/17/2020 - 2:34pm
Ciphers
WSN
RC4 algorithms
RC4
medical sector
hospital
data transfer integrity
data transfer confidentiality
data transfer availability
body sensor networks
AES algorithms
AES
Biomedical monitoring
hospitals
Monitoring
sensor security
secure protocol
internet
Metrics
component
wireless sensor networks
composability
pubcrawl
Human behavior
Resiliency
Protocols
Cryptographic Protocols
telecommunication security
biblio
Research on SQL Injection Attack and Prevention Technology Based on Web
Submitted by grigby1 on Mon, 02/10/2020 - 11:25am
Prevention Technology
Web
user input data legitimacy
Structured Query Language
SQL injection attack
SQL injection
SQL detection
SQL
Servers
security of data
Resiliency
resilience
query processing
pubcrawl
privacy
application security risks
policy-based governance
Metrics
injection attack
Information filters
Human behavior
Databases
database security protection technology
database security attack
database query code
database management systems
Data protection
component
collaboration
B/S mode application development
biblio
Secure Sign: Signing Document Online
Submitted by grigby1 on Tue, 10/15/2019 - 2:45pm
secure sign
legal offices
main security goals
Metrics
online
pubcrawl
Repudiation
resilience
Resiliency
Secure
Law
SecureSign system
sign
signatories
signatory
signature
signing documents
signing parties
user fingerprint
digital signatures
authenticity
authorisation
biometric
component
composability
contracts
Cryptography
data integrity
authentication
document
document online
electronic signature tablet
face-to-face
fingerprint reader
Fingerprint recognition
fraud
Human behavior
biblio
A Data Provenance Visualization Approach
Submitted by aekwall on Mon, 09/23/2019 - 10:41am
Data visualization
W3C-PROV-O specification compatible provenance data
social networking (online)
provenance visualization
PROV-O
Prototypes
open source visualization tool
data provenance visualization approach
data lineage
data provenance
Provenance
data visualisation
Big Data
public domain software
data analysis
metadata
tools
Metrics
component
composability
pubcrawl
Human behavior
Resiliency
Classification algorithms
biblio
Research of Industrial Control System Device Firmware Vulnerability Mining Technology Based on Taint Analysis
Submitted by grigby1 on Thu, 05/09/2019 - 10:46am
program testing
vulnerability mining
test efficiency
taint analysis technology
taint analysis
Software
security of data
security
scalable
Scalability
Resiliency
resilience
pubcrawl
component
Microprogramming
integrated circuits
Industrial Control Systems
industrial control system device firmware vulnerability mining technology
industrial control system
industrial control
Hardware
fuzzing test
firmware
device firmware
Data mining
biblio
A Privacy-Aware PKI System Based on Permissioned Blockchains
Submitted by aekwall on Mon, 04/01/2019 - 10:04am
Permissioned Blockchains
security
Scalability
Resiliency
public-key infrastructure
Public key
pubcrawl
privacy-awareness
PKI Trust Models
authentication
Organizations
Metrics
Human behavior
Digital certificate
contracts
component
blockchain security
blockchain
biblio
The Information Processing in the Cybernetic Environment of Signals Intelligence
Submitted by aekwall on Mon, 03/25/2019 - 9:58am
information and communication technology
signal processing security
Signals Intelligence
Signal Intelligence
military operations
military computing
intelligence information
Information systems
information processing system
information processing
information processes
Resiliency
electronic warfare
Cyberspace
cybernetics
cybernetic environment
Decision Making
Metrics
component
composability
pubcrawl
biblio
Novel Sybil Defense Scheme for Peer–to–peer Applications
Submitted by aekwall on Mon, 02/18/2019 - 12:58pm
peer–
trusted nodes
to–
sybil nodes
sybil defense scheme
sybil attacks
Sybil attack
Social network services
simulation
Servers
resource management
radio frequency allocation incensing
pubcrawl
proactive
peer to peer security
peer-to-peer network overlays
Peer-to-peer computing
peer
p2p
overlay networks
Metrics
malicious data
logically connected hosts
Licenses
data availability
computer network security
composability
component
« first
‹ previous
1
2
3
4
5
6
next ›
last »