Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cloud user
biblio
Cloud Insider Attack Detection Using Machine Learning
Submitted by grigby1 on Mon, 06/10/2019 - 1:56pm
security
machine learning
machine learning approaches
malicious node
misbehaving node
Monitoring
privacy
pubcrawl
resilience
Resiliency
Long short-term memory
security approaches
security of data
short-term behavioral data
trusted users
User behavior
valuable information
vulnerable information
vulnerable user node
compromised node
anomaly node
attackers
broken node
Cloud Computing
cloud insider attack detection
cloud network
cloud security issues
cloud user
composability
Anomaly Detection
Data models
data sources
deep learning
improvised long short-term memory model
internal attacker
internal attackers compromise
learning (artificial intelligence)
Logic gates
biblio
TIGER HASH KERBEROS BIOMETRIC BLOWFISH USER AUTHENTICATION FOR SECURED DATA ACCESS IN CLOUD
Submitted by aekwall on Mon, 05/20/2019 - 10:02am
security
Human behavior
Kerberos
Kerberos biometric blowfish user authentication
message authentication
Metrics
pubcrawl
Registration
Resiliency
secured data access
genuine user
Servers
Ticket Granting
tiger hash
Tiger Hash-based Kerberos biometric blowfish authentication
unauthorized users
user ID
user identity
users ID
cloud server
authenticated user
authentication
authentication accuracy
authentication server
authentications time
authenticity
authorisation
Blowfish encryption
Cloud Computing
Access Control
cloud services
cloud user
confidentiality rate
Cryptography
CS grants
CU
encrypted ticket
encryption
biblio
Hybrid Attribute Based Encryption and Customizable Authorization in Cloud Computing
Submitted by aekwall on Wed, 02/13/2019 - 11:57am
storage server
Data Security
Dual Encryption
encrypted data
encryption
encryption control access
hybrid attribute based encryption
hybrid encryption
multi-linear map
data owners
user authorization
user data
verifiable customizable authorization
attribute based encryption
Human behavior
pubcrawl
collaboration
policy-based governance
Cipher-text-policy attribute-based encryption (CP-ABE)
Scalability
Servers
attribute-based security
authorisation
authorization
authorized cloud server
centralized systems
cipher-text policy attribute-based encryption
Cloud Computing
circuits
cloud servers
cloud user
complex access control
counterfeit cipher-text
Cryptography
data access
data confidentiality
biblio
An SDN Based Framework for Guaranteeing Security and Performance in Information-Centric Cloud Networks
Submitted by grigby1 on Fri, 02/02/2018 - 1:27pm
Scalability
information-centric cloud network security
network virtualization
networking aspects
performance requirements
provision network resources
pubcrawl
resource management
Routing
information centric services
SDN-based framework
security
software assurance
software defined networking
software-defined networking
virtual networks
virtualisation
Virtualization
computer centres
Cloud Computing
cloud data centers
cloud infrastructure
cloud network resources
cloud provider
cloud services
cloud user
composability
cloud applications
computer network performance evaluation
computer network security
delays
fully distributed data plane
information centric cloud framework
Information Centric Cloud Networking
information centric networking