Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber-physical systems
biblio
A Access Control Model of Associated Data Sets Based on Game Theory
Submitted by aekwall on Mon, 09/21/2020 - 3:48pm
cyber-physical systems
Control Theory and Privacy
sensitive information owner
sensitive information divulgence
privacy protection issue
privace protection
Nash equilbrium
Internet applications
associated data sets protection model
associated data sets
access control model
cyber physical systems
Games
Scalability
Analytical models
internet
privacy
pubcrawl
Human behavior
Resiliency
Data models
game theory
data privacy
Access Control
authorisation
biblio
A Game Theoretical Analysis of Risk Adaptive Access Control for Privacy Preserving
Submitted by aekwall on Mon, 09/21/2020 - 3:48pm
Resiliency
Human behavior
information theory
multistage two player game
privacy
privacy breaches
privacy preserving
Privacy Risk
privacy violation access requests
pubcrawl
Games
risk adaptive access control
risk analysis
Risk based access control
risk based access model
risk value
Scalability
Shannon information
sub-game perfect Nash equilibrium
cross-domain environment
Access Control
access control system
access request
Adaptation models
authorisation
Big Data
Cloud Computing
Control Theory and Privacy
Computing Theory and Privacy
cyber physical systems
cyber-physical systems
data privacy
estimation
game model
game theoretical analysis
game theoretical risk based access control
game theory
biblio
Optical Resonances in a 3D Superlattice of Photonic Band Gap Cavities
Submitted by aekwall on Mon, 09/21/2020 - 3:47pm
Cavity resonators
confinement
ultimate control
tailored defect
photonic crystals
photonic band gap
Optical waveguides
Optical superlattices
optical resonances
optical analog
intricate waveguiding system
CROW
coupled resonator optical waveguide
coupled cavities
Resiliency
Anderson model
3D superlattice
3D band gap
nanophotonics
Photonics
light propagation
Optical resonators
Three-dimensional displays
cyber-physical systems
privacy
composability
pubcrawl
biblio
Comparative Analysis of Encryption and Decryption Techniques Using Mersenne Prime Numbers and Phony Modulus to Avoid Factorization Attack of RSA
Submitted by aekwall on Mon, 09/21/2020 - 3:47pm
Dual RSA
confinement
Wiener'
Trial Division
s Factorization
s attack
Rivest Shamir and Adleman algorithm
Public Key cryptographic algorithm
phony modulus
online Security
Mersenne prime numbers
Mersenne Prime
Fermat'
factorization attack
encryption
decryption techniques
public-key cryptography
RSA algorithm
Ciphers
public key cryptography
cyber-physical systems
encryption techniques
privacy
Mathematical model
composability
pubcrawl
Resiliency
biblio
Optically Interrogated Unique Object with Simulation Attack Prevention
Submitted by aekwall on Mon, 09/21/2020 - 3:47pm
analogue measurement
confinement
UNO
unique photo-luminescence properties
unique object
simulation attacks
simulation attack protection
simulation attack prevention
simulation attack
semiconductor quantum dots
Quantum dots
Quantum Confinement UNO responds
physical object
photoluminescence
photoconductive cells
Nonlinear optics
security of data
absorption
light sources
Computer simulation
Adaptive optics
Cameras
resilience
quantum computing
cyber-physical systems
Entropy
privacy
Data protection
composability
pubcrawl
Resiliency
biblio
Adding Custom Sandbox Profiles to iOS Apps
Submitted by aekwall on Mon, 09/21/2020 - 3:47pm
Containers
confinement
third party application
custom sandbox profiles
containment principle
confinement architecture
attack prevention mechanisms
ios
mobile devices
Mobile communication
smart phones
security of data
cyber-physical systems
privacy
composability
pubcrawl
Resiliency
system monitoring
mobile computing
Kernel
Access Control
biblio
Performance Analysis of Cluster based Secured Key Management Schemes in WSN
Submitted by aekwall on Mon, 09/21/2020 - 3:46pm
large scale networks
wireless sensor networks
transmitted information
telecommunication network management
symmetric sets
security of data
security holes
secure transmission
secure information transmission
secure clusters
Routing
Resiliency
pubcrawl
privacy
mystery keys
asymmetric key sets
key management schemes
key management framework
Key Management and Secure Transmission
information security
information records
encoded data
cyber-physical systems
Cryptography
confinement
composability
clustering
cluster-based wireless sensor networks
CBWSN
biblio
Sandnet: Towards High Quality of Deception in Container-Based Microservice Architectures
Submitted by aekwall on Mon, 09/21/2020 - 3:46pm
Attack Strategies
confinement
vulnerable production network
suspicious microservices
security incidents
sandnet
sandbox network
quarantined services
QoD
Production systems
open production network
network deception mechanisms
live confinement
evaluation scenario
container-based microservice architectures
Cloning
computer network security
Degradation
Switches
computer viruses
Containers
cyber-physical systems
sandboxing
Measurement
threat intelligence
privacy
Production
composability
pubcrawl
Resiliency
system monitoring
security
biblio
Towards Protection Mechanisms for Secure and Efficient CAN Operation
Submitted by aekwall on Mon, 09/21/2020 - 3:46pm
efficient CAN operation
security solutions
controller area networks
CAN bus
access controller
automotive security
broadband services
CAN data-link layer
CAN Security
Clocks
fault confinement mechanism
iterative research
message priority
numerous proposed solutions
protection mechanisms
real-time message deliverability
secure CAN operation
confinement
Protocols
Automotive engineering
computer network security
telecommunication traffic
authorisation
real-time systems
Resiliency
pubcrawl
composability
automobiles
Industry 4.0
privacy
authentication
Cyber Attacks
cyber-physical systems
error detection
timing
biblio
Lightweight Node-level Malware Detection and Network-level Malware Confinement in IoT Networks
Submitted by aekwall on Mon, 09/21/2020 - 3:46pm
Correlation
confinement
runtime malware detection
real-time malware control strategies
network-level malware confinement
network functionality
Malware propogation
Malware propagation
Malware confinement
lightweight node-level malware detection
average network throughput
predictive control
IoT networks
cyber-physical systems
privacy
computer network security
malware detection
composability
pubcrawl
Resiliency
feature extraction
invasive software
performance evaluation
security
Runtime
malware
Internet of Things
network security
Detectors
« first
‹ previous
…
28
29
30
31
32
33
34
35
36
…
next ›
last »