Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer architecture
biblio
Trusted Platform Module for Smart Cards
Submitted by BrandonB on Fri, 05/01/2015 - 9:09am
near-field communication
User Centric Tamper-Resistant Device
user centric smart card ownership model
UCTD
UCOM
trusted service manager
Trusted Platform Module
Trusted Execution Environment
TEE
smart cards
security
Runtime
privacy preservation platforms
off-card trusted relationship
application provider
near field communication-based mobile phone services
multiapplication smart card initiative
Mobile handsets
Mobile communication
Hardware
global platform consumer centric model
embedded devices
deployment model
data privacy
cross-device security
computer architecture
Computational modeling
biblio
Towards robust, scalable and secure network storage in Cloud Computing
Submitted by BrandonB on Thu, 04/30/2015 - 2:38pm
security of data
networking
on-demand access
operating system
pay per use model
privacy
proactive security
RAID
remote application access
remote service access
robust scalable secure network storage
network storage architecture
server
Servers
service availability
service outsourcing
storage management
ubiquitous computing
ubiquitous next generation information technology architecture
virtualisation
Virtualization
data integrity
authentication
Availability
built in security
client overhead
Cloud Computing
cloud computing environment
cloud service provider
Compliance
computer architecture
confidentiality
adaptive security
data privacy
Data Security
data sharing
data storage
Distributed databases
information centric security
integrity
internet
middleware
biblio
A novel architecture for identity management system using virtual appliance technology
Submitted by BrandonB on Thu, 04/30/2015 - 2:25pm
identity management systems
Virtualization
Virtual machining
virtual machines
virtual machine monitor platform
virtual appliance technology
virtual appliance
third party cloud
Servers
security of data
information security
computer architecture
Identity management system architecture
identity management system
Identity management
Home appliances
Hardware
green computing practices
green computing
enterprise based application
cost benefit
biblio
Data security protocol for cloudlet based architecture
Submitted by BrandonB on Thu, 04/30/2015 - 2:20pm
encryption
unauthorized user
security
resource-rich computer
mobile devices
mobile computing
Mobile communication
mobile cloud computing technology
mobile cloud computing
internet
Cloud Computing
distributed cloud architecture
data security protocol
Cryptographic Protocols
Computers
computer architecture
cloudlet based architecture
cloudlet
cloud storage
biblio
Proposal of a secure, deployable and transparent middleware for Internet of Things
Submitted by BrandonB on Thu, 04/30/2015 - 2:16pm
Internet of Things
Zigbee
Transparent Middleware
TLS
smart objects
security of data
security architecture
security
secure middleware
protection measures
OAuth
middleware
IoT transparent middleware
AES
electronic data interchange
deployable middleware
data privacy
data integrity
data exchange service privacy
data exchange service integrity
data exchange service confidentiality
data exchange service authenticity
computer architecture
authorization
authentication
biblio
Analysis of Monolithic and Microkernel Architectures: Towards Secure Hypervisor Design
Submitted by BrandonB on Thu, 04/30/2015 - 2:09pm
microkernel architectures
XEN
virtualization platform
virtualisation
Virtual machining
Virtual machine monitors
security tradeoffs
security of data
security
secure hyper visor design
networking
monolithic hyper visor architectures
monolithic architectures
monolithic architecture
monitoring interface
Monitoring
application program interfaces
microkernel architecture
micro kernel hyper visor architectures
micro architecture
management API
Kernel
hypervisor security
Hyper-V
hyper visor security
hyper calls
Hardware
ESXi
computer architecture
Cloud Computing
attack surface
biblio
On MILS I/O Sharing Targeting Avionic Systems
Submitted by BrandonB on Thu, 04/30/2015 - 2:01pm
hardware platform
aerospace computing
Aerospace electronics
Autosar
aviation industry
avionic systems
avionics
communication hardware controller
computer architecture
DPAA
embedded systems
free scale proprietary data path acceleration architecture
Hardware
system architectures
high-criticality embedded systems
IMA
integrated modular avionics
MILS I/O sharing
MILS system designs
multiple independent levels of security system
Portals
Runtime
security
security of data
Software
biblio
Data-centric phishing detection based on transparent virtualization technologies
Submitted by BrandonB on Thu, 04/30/2015 - 1:47pm
human perceptual similarity
antiphishing solution
Browsers
cloud
Cloud Computing
color-based fingerprint extraction
color-based fingerprint filtering
color-based fingerprint scaling
component isolation
computer architecture
Computer crime
Data mining
data-centric phishing detection
Detectors
Web sites
Image color analysis
malware
man-in-the-browser attack
MitB attack
online front-ends
phishing attacks
spoofed Web pages
transparent virtualization technologies
virtual machines
virtualisation
VM introspection
VMI
Web pages
biblio
In Sensors We Trust – A Realistic Possibility?
Submitted by BrandonB on Thu, 04/30/2015 - 1:39pm
sensors
sensor information flow
sensing infrastructure
security
secure systems
processing architecture
information sharing
information management
information dissemination
Data mining
computer architecture
Buildings
architecture
biblio
A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns
Submitted by BrandonB on Thu, 04/30/2015 - 1:23pm
high-level programming languages
UNM data sets
system calls
semantic structure
security of data
Registers
program anomaly behaviour
operating systems (computers)
modern operating system
Logic gates
KDD98 data sets
Intrusion Detection
host-based IDS
host-based anomaly intrusion detection system design
ADFA-LD
high level languages
Gaussian processes
false alarm rates
discontiguous system call patterns
Cryptography
contiguous system call patterns
contemporary hacking methods
computer security
computer architecture
Complexity theory
Clocks
Anomaly Detection
« first
‹ previous
…
52
53
54
55
56
57
58
59
60
next ›
last »