Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cloud Computing
biblio
Fitness Trackers: Fit for Health but Unfit for Security and Privacy
Submitted by grigby1 on Mon, 04/02/2018 - 12:55pm
security and privacy
malicious user setting
Monitoring
privacy
Protocols
pubcrawl
resilience
Resiliency
Scalability
Human behavior
Servers
smart devices market
smart phones
target tracking
vital security analysis
wearable computers
Wearable devices
wearables security
data integrity
Activity/Health data
authenticity
Cloud Computing
cloud-based services
condition monitoring
confidentiality
customers
Data integration
activity monitoring solutions
data privacy
encryption
erroneous data analytics
fitness trackers
fitness tracking products
health care
health monitoring
biblio
BigCrypt for Big Data Encryption
Submitted by grigby1 on Mon, 04/02/2018 - 12:49pm
Pretty Good Privacy technique
zero tolerance security
symmetric key encryption
storage management
Software
Servers
RSA
Rijndael
Resiliency
resilience
Receivers
Public key
pubcrawl
probability
probabilistic approach
private information
Asymmetric Encryption
Metrics
Human behavior
Hadoop
Hacking
encryption
Data protection
Cryptography
Compositionality
cloud storage
Cloud Computing
BigCrypt
big data encryption
Big Data
asymmetric encryption technique
biblio
Revisiting Security Risks of Asymmetric Scalar Product Preserving Encryption and Its Variants
Submitted by grigby1 on Mon, 04/02/2018 - 12:49pm
internet
Servers
security risks
scalar product preserving encryption
Resiliency
resilience
query answering
pubcrawl
product preservation property
outsourcing
Metrics
Mathematical model
ASPE
Indexes
Human behavior
encryption
Cryptography
confidential information
Compositionality
Cloud Computing
ciphertexts
asymmetric scalar-product-preserving encryption
Asymmetric Encryption
biblio
Comprehensive Study of Symmetric Key and Asymmetric Key Encryption Algorithms
Submitted by grigby1 on Mon, 04/02/2018 - 12:48pm
DSA
Three-dimensional displays
standards
Resiliency
resilience
Public key
pubcrawl
private and public key encryption
Metrics
Human behavior
encryption
elliptic curve
3DES
Diffie-Hellman and RSA
DES
decryption
Cryptography
Compositionality
Cloud Computing
Classification algorithms
Ciphers
Blowfish
Asymmetric Encryption
AES
biblio
A Robust and Secured Cloud Based Distributed Biometric System Using Symmetric Key Cryptography and Microsoft Cognitive API
Submitted by grigby1 on Mon, 04/02/2018 - 12:33pm
enterprise application base
Symmetric Key Cryptography
security aspects
Resiliency
resilience
registered user information
public key cryptography
pubcrawl
multiple biometric information
Microsoft Windows (operating systems)
Microsoft cognitive face-API
Microsoft cognitive face API
face recognition
face images
face biometric
Face
AES cryptography technique
encryption
distributed system
Compositionality
cloud services
cloud service provider
Cloud Security
Cloud Computing
biometrics (access control)
biometric system
biometric image
biometric authentication system
authorisation
authentication
application program interfaces
APIs
biblio
Securing the Internet of Things: A Worst-Case Analysis of Trade-Off between Query-Anonymity and Communication-Cost
Submitted by grigby1 on Mon, 04/02/2018 - 12:31pm
Metrics
worst-case communication cost
wireless sensor networks
untrusted cloud server query
sensors
Sensor-Cloud
security
Resiliency
resilience
Query-Anonymity
query receiver-anonymity
query processing
pubcrawl
privacy
network diameter
provable security
Internet of Things security
Internet of Things
Human behavior
Games
data privacy
cyber-physical systems
composability
communication-cost
cloud-based IoT system
cloud services
Cloud Computing
authorisation
anonymity
biblio
Cyber Anonymity Based on Software-Defined Networking and Onion Routing (SOR)
Submitted by grigby1 on Mon, 04/02/2018 - 12:30pm
software-defined networking
Protocols
pubcrawl
Relays
resilience
Resiliency
Routing
Servers
software defined networking
privacy
software-defined networking and onion routing
SOR architecture
telecommunication network routing
telecommunication traffic
Token
Tor
traffic surveillance
anonymity
OpenFlow
onion routing
network traffic censorship
multiple anonymity service providers
Metrics
internet
Human behavior
Government
E-cash
cyber anonymity technique
cyber anonymity service
computer network security
composability
cloud networks
Cloud Computing
biblio
Trust-Aware and Location-Based Collaborative Filtering for Web Service QoS Prediction
Submitted by grigby1 on Mon, 03/26/2018 - 12:55pm
QoS
web services
Web Service
web of trust
Trusted Computing
trust-aware collaborative filtering
trust-aware
Resiliency
resilience
recommender systems
quality of service
QoS prediction
Cloud Computing
pubcrawl
Prediction algorithms
Mathematical model
location-based collaborative filtering
location
internet
geographical location
composability
collaborative filtering
collaboration
biblio
Cumulative Prospect Theoretic Study of a Cloud Storage Defense Game against Advanced Persistent Threats
Submitted by grigby1 on Mon, 03/19/2018 - 1:55pm
Resiliency
framing effect
game theory
Games
Human behavior
Metrics
Nash equilibria
probability
probability weighting effect
pubcrawl
resilience
expected utility theory
Scalability
scan interval
security of data
storage devices
storage management
subjective attacker
targeted attacks
uncertain attack durations
utility theory
computer security
privacy
advanced persistent threat
advanced persistent threats
APT attacker
APT defense game
attack interval
Cloud Computing
cloud storage
cloud storage defense game
Computing Theory
Conferences
CPT
cumulative decision weights
cumulative prospect theoretic study
cumulative prospect theory
data privacy
Decision Making
discrete decision weights
distortion
biblio
End-To-End Security Architecture for Federated Cloud and IoT Networks
Submitted by grigby1 on Mon, 03/19/2018 - 1:49pm
network federation mechanisms
virtualisation
Software Architecture
smart Internet of Things
SFC
service function chaining
sensors
security policy enforcement
security of data
security
Resiliency
resilience
pubcrawl
NFV
network slices protection
network function virtualisation
actuator security
Metrics
IoT networks
Internet of Things
Human behavior
heterogeneous platforms
end-to-end security architecture
Data protection
Data Analytics
data analysis
computer architecture
composability
Communication networks
clouds
cloud networks
Cloud Computing
« first
‹ previous
…
88
89
90
91
92
93
94
95
96
…
next ›
last »