Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cloud Computing
biblio
Internet of Things (IoT): Security challenges, business opportunities reference architecture for E-commerce
Submitted by grigby1 on Wed, 03/08/2017 - 2:23pm
IoT
WiFi
supply chains
sensors
security of data
security industry
security challenges
security
RFID
reference architecture
pubcrawl170112
physical devices
Bluetooth
Internet of Things (IoT)
Internet of Things
internet
intelligent devices
electronic commerce
e-commerce
Databases
Connected Devices & Wearables
Cloud Computing
business opportunities
Business
biblio
Virtual machine placement strategy based on discrete firefly algorithm in cloud environments
Submitted by grigby1 on Wed, 03/08/2017 - 1:53pm
optimisation
Virtual machining
virtual machines
virtual machine placement strategy
virtual machine placement
search problems
search mechanism
resource wastage
resource allocation
pubcrawl170110
power aware computing
Brightness
OpenStack cloud platform
multiobjective constraint optimization model
Heuristic algorithms
firefly algorithm
evolutionary computation
energy consumption
discrete firefly algorithm
Constraint optimization
Cloud Computing
biblio
Teaching and Training Cybersecurity as a Cloud Service
Submitted by grigby1 on Tue, 03/07/2017 - 1:41pm
GenCyber camps
virtualization technologies
Virtualization
virtualisation
virtual cybersecurity experiments
virtual cloud services
Servers
security of data
pubcrawl170109
Protocols
Network interfaces
IT infrastructures
IoT
Internet of Things
Internet connectivity
graduate students
and cloud computing
educational courses
education
cybersecurity training
cybersecurity teaching
cybersecurity lab as a service
cybersecurity experiments
cyber resources
computer science education
Computer crime
computer aided instruction
cloud service
cloud computing systems
Cloud Computing
CLaaS
biblio
Using Dynamic Taint Approach for Malware Threat
Submitted by grigby1 on Tue, 03/07/2017 - 1:40pm
pubcrawl170109
Information Flow
intersuspicious modules
invasive software
malware
Malware behavioural analysis
malware infection
malware threat analysis
network threats
FSM
Servers
suspicious apps
taint checking tools
taint marking
threat analysis
trees (mathematics)
weighted spanning tree analysis scheme
Computer hacking
Android programs
attack sequence
behavioural analysis
cloud applications
Cloud Computing
cloud computing server
Computational modeling
Computer crime
Analytical models
cyber security attack
data tracking
defence capability
Dynamic taint propagation
dynamic taint propagation analysis model
finite state machine
finite state machines
biblio
Security QoS profiling against cyber terrorism in airport network systems
Submitted by grigby1 on Tue, 03/07/2017 - 1:40pm
cloud based network
distributed DoS
denial of service
DDoS
cyber terrorists
cyber terrorism
critical network assets
Computer crime
cloud infrastructure
Cloud Datacenters
Cloud Computing
cloud based platform
DoS
Cisco 9000 router firewall
aviation industry
attacks
Atmospheric modeling
Airports
airport network systems
airport information resource management systems
airport information network services
AIRMS
air traffic control
pubcrawl170109
VBDDA
telecommunication network routing
system response metrics
stateful packet inspection
SPI-OACI
security QoS profiling
robust counter security network model
riverbed modeler software
quality of service profiling
quality of service
virtual DDoS protection
OpenFlow application centric infrastructure
Nigerian aviation industry
mitigation techniques
mission critical services
MCS
information management
Floods
firewalls
embedded systems
embedded network device
biblio
Efficient spear-phishing threat detection using hypervisor monitor
Submitted by grigby1 on Tue, 03/07/2017 - 1:39pm
spear-phishing attack
malicious activities
malicious attachments
malware
Monitoring
PDF format structures
Portable document format
pubcrawl170109
Spear-phishing
invasive software
spear-phishing threat detection
transparent hypervisor monitor
unsolicited e-mail
URL links
user accounts
Virtual machine monitors
virtualisation
Virtualization
document handling
CIA
Cloud Computing
cloud-threat inspection appliance
commercial antivirus software
Computer crime
cyber security
cyber security threats
detection engine
antievasion sandbox
document prefiltering algorithm
Electronic mail
fake emails
hackers
hardware-assisted virtualization
hardware-assisted virtualization technology
hypervisor kernel
hypervisor monitor
biblio
Cloud-based Android botnet malware detection system
Submitted by grigby1 on Tue, 03/07/2017 - 1:37pm
feature extraction
Vyatta
smart phones
Servers
runtime Android malware analysis
pubcrawl170109
open source development framework
multilayered algorithm
malware
Java
invasive software
Humanoid robots
Android (operating system)
digital crime groups
Cloud-based malware detection
cloud-based Android botnet malware detection system
Cloud Computing
Classification algorithms
botnet detection learning dataset
Androids
Android Sandbox
Android on VirtualBox
Android botnet family detection
Android botnet
biblio
CLaaS: Cybersecurity Lab as a Service – Design, Analysis, and Evaluation
Submitted by grigby1 on Tue, 03/07/2017 - 1:36pm
CLaaS
Cloud Computing
cloud computing system
Computer crime
Cybersecurity
cybersecurity lab as a service
education
IP networks
pubcrawl170109
security of data
Servers
virtual cybersecurity
virtual lab
virtualisation
Virtualization
virtualization technology
biblio
Challenges to network forensics in cloud computing
Submitted by grigby1 on Tue, 03/07/2017 - 1:36pm
challenges to network forensics in cloud
Cloud architecture
Cloud Computing
Computational modeling
computer architecture
data outsourcing
data privacy
digital control
Digital Forensics
network forensics
network forensics in cloud
outsourcing
pubcrawl170109
security
Software Architecture
telecommunication traffic
biblio
Security in Cloud-Based Cyber-Physical Systems
Submitted by grigby1 on Tue, 03/07/2017 - 1:33pm
Cloud Computing
cloud-based cyber-physical systems
Computer crime
cyber-physical systems
Data processing
information security
modern production devices
physical interaction
Production
pubcrawl170109
security
security of data
sensors
smart mobility services
« first
‹ previous
…
105
106
107
108
109
110
111
112
113
…
next ›
last »