Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer architecture
biblio
Preliminary results from a model-driven architecture methodology for development of an event-driven space communications service concept
Submitted by grigby1 on Thu, 12/28/2017 - 12:40pm
Aerospace electronics
computer architecture
Data models
Object oriented modeling
pubcrawl
Scalability
security scalability
Space communications
space missions
biblio
Towards data assurance and resilience in IoT using blockchain
Submitted by grigby1 on Thu, 12/28/2017 - 12:40pm
drones
Servers
security scalability
secure communication
Scalability
resilience
Reliability
pubcrawl
integrity
auditing
Drone
Distributed databases
Date Assurance
control systems
computer architecture
blockchain security
blockchain
biblio
An Experimental Evaluation of a Cloud-Based Virtual Computer Laboratory Using Openstack
Submitted by grigby1 on Thu, 12/28/2017 - 12:36pm
Policy-Governed Secure Collaboration
Virtualization
Virtual machining
Virtual machine monitors
Virtual Computer Lab
Servers
Science of Security
Scalability
Resiliency
pubcrawl
Cloud Computing
openstack
Metrics
Human Factors
Human behavior
Experimental Evaluation
computer architecture
Computational modeling
composability
collaboration
biblio
Scalability of Cloud Based SCIT-MTD
Submitted by grigby1 on Thu, 12/28/2017 - 12:28pm
moving target defense
Web application
Virtual machining
share-nothing architecture pattern
Servers
self cleansing intrusion tolerance
security of data
security
SCIT
Scalability
Resiliency
quality attributes
pubcrawl
multiple instance system
multinode system
attack surface
malicious intrusions
load demand modeling
intrusion tolerance
internet
Data protection
cybersecurity protection
continuous rotation
computer architecture
composability
cloud infrastructure services
Cloud Computing
cloud based SCIT-MTD scalability
cloud
biblio
Simulating Human Detection of Phishing Websites: An Investigation into the Applicability of the ACT-R Cognitive Behaviour Architecture Model
Submitted by grigby1 on Wed, 12/20/2017 - 12:07pm
Human Factors
Web sites
user interface support
transport protocols
security
representative Webpage
pubcrawl
psychology
phishing Websites
phishing detection scenario
phishing attacks
Phishing
Knowledge engineering
ACT-R cognitive behaviour architecture model
human detection
human behaviour
Human behavior
HTTPS padlock security indicator
Decision Making
computer science
computer network security
computer model
Computer crime
computer architecture
Computational modeling
biblio
Hardware-Secured Configuration and Two-Layer Attestation Architecture for Smart Sensors
Submitted by grigby1 on Wed, 12/20/2017 - 12:02pm
secured storage
configuration interface
configuration updates
dedicated secured hardware
Hardware Security
hardware-secured configuration
Intelligent sensors
Secure storage
secured configuration protocol
configuration
security updates
Smart Sensor
smart sensors
two-layer attestation architecture
two-layer configuration attestation process
usability
sensor security
composability
Metrics
attestation
pubcrawl
Resiliency
Human behavior
Human Factors
Internet of Things
Software Architecture
security
Protocols
security of data
Hardware
computer architecture
telecommunication security
wireless sensor networks
confidential configuration data
biblio
An intelligent honeynet architecture based on software defined security
Submitted by grigby1 on Wed, 12/20/2017 - 11:59am
security
Metrics
pubcrawl
Resiliency
privacy
composability
Software
Hardware
computer architecture
energy consumption
honeynet
honeypot
network function virtualization
Packet loss
Software Defined Security
signal processing security
biblio
Revisiting Browser Security in the Modern Era: New Data-Only Attacks and Defenses
Submitted by K_Hooper on Wed, 12/20/2017 - 10:33am
memory mapping primitive
Web functionality
Web Browser Security
Semantics
security of data
security-critical data
security
script level
Resiliency
rendering (computer graphics)
Reliability
pubcrawl
process memory
process isolation
online front-ends
Metrics
arbitrary script code cross-origin execution
memory disclosure vulnerabilities
isolation policies
Internet Explorer
internet
Human behavior
HTTP cookie leakage
data-only attacks
cross-platform memory cartography framework
control flow hijacking
computer architecture
Chrome
Browser Security
Browsers
backward compatibility
biblio
Access Control Models for Virtual Object Communication in Cloud-Enabled IoT
Submitted by K_Hooper on Wed, 12/20/2017 - 10:31am
Information Reuse
VOs
Virtual Objects
virtual object communication
security preserving objectives
security
role-based access control
Resiliency
RBAC
radiofrequency identification
pubcrawl
privacy preserving objectives
operational models
IoT
Internet of Things
internet
ABAC
Devices
data privacy
computer architecture
cloud services
cloud-enabled IoT
Cloud Computing
Cameras
automobiles
authorisation
administrative access control models
ACL
access control lists
access-control
Access Control
biblio
Security and privacy on internet of things
Submitted by grigby1 on Tue, 12/12/2017 - 12:30pm
IoT protocol
wireless sensor networks
telecommunication security
sensors
security of data
security
Resiliency
pubcrawl
Protocols
privacy
Metrics
IoT security
attacks
IoT privacy
IoT devices
Internet of Things (IoT)
Internet of Things
internet
Human Factors
Human behavior
data privacy
computer architecture
composability
« first
‹ previous
…
48
49
50
51
52
53
54
55
56
…
next ›
last »