Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cloud Computing
biblio
Augmenting Security of Internet-of-Things Using Programmable Network-Centric Approaches: A Position Paper
Submitted by grigby1 on Tue, 02/06/2018 - 2:07pm
IoT systems
Software Defined Networks
situational awareness
service-centric architecture
security of data
security
Resiliency
pubcrawl
Protocols
programmable network-centric approaches
Metrics
Logic gates
Big Data
Internet-of-Things
Internet of Things
industrial IoT systems
Home appliances
data analytics techniques
data analysis
computer architecture
composability
communications infrastructure
Cloud Computing
Big Data Analytics
biblio
Semantically Rich, Oblivious Access Control Using ABAC for Secure Cloud Storage
Submitted by grigby1 on Tue, 02/06/2018 - 1:58pm
encryption
trustworthy access control
trusted platform modules
Trusted Computing
storage management
semantically rich access control system
robust access control
Resiliency
pubcrawl
OWL
Organizations
organization confidentiality policies
Ontologies
Oblivious Storage
end-to-end oblivious data transaction
Access Broker
document security
document handling
data threats
Confidentiality Policy
Computational modeling
composability
cloud storage security
cloud service platform
Cloud Computing
business data processing
authorisation
Access Control
access broker module
biblio
Autonomic Security for Zero Trust Networks
Submitted by grigby1 on Tue, 02/06/2018 - 1:54pm
authentication
Cloud Computing
Computer crime
Human behavior
Human Factors
Logic gates
Metrics
Organizations
pubcrawl
Resiliency
Scalability
Time factors
Ubiquitous Computing Security
biblio
Ransomware: The CryptoVirus Subverting Cloud Security
Submitted by grigby1 on Tue, 02/06/2018 - 1:54pm
security
malware
Metrics
pubcrawl
Ransomware
ransomware attack
ransomware vulnerabilities
Resiliency
Scalability
IT security specialists
security effectiveness
security threat
Servers
threats
ubiquitous computing
Ubiquitous Computing Security
ubiquitous environment
vulnerabilities
cloud threat mechanisms
business enterprises
cloud
Cloud architecture
Cloud Computing
cloud network
cloud platforms
Cloud Security
cloud technology
Business
computer architecture
computer viruses
Cryptography
CryptoVirus
disparate locations
Human behavior
Human Factors
information technology
biblio
Towards Mitigating Uncertainty of Data Security Breaches and Collusion in Cloud Computing
Submitted by grigby1 on Tue, 02/06/2018 - 1:47pm
Scalability
modified threshold Asmuth-Bloom
optimistic system behavior
pessimistic system behavior
private key cryptography
pubcrawl
Redundancy
Redundant Residue Number System
Resiliency
Metrics
Secret key
secret sharing schemes
speed per price ratio
system behavior optimization
uncertainty
uncertainty mitigation
weighted Mignotte secret sharing scheme
approximate method
localization improvement
error correction accuracy
encryption data redundancy minimization
detection improvement
data security breaches
data collusion
data access speed
Cryptography
Collusion
cloud parameter uncertainty
Cloud Computing
cloud collusion
big data security in the cloud
Big Data
balanced system behavior
biblio
Accelerated Encryption Algorithms for Secure Storage and Processing in the Cloud
Submitted by grigby1 on Tue, 02/06/2018 - 1:47pm
pubcrawl
graphics processing units
Homomorphic encryption
Metrics
parallel processing
partially homomorphic encryption schemes
PPSP-in-Cloud Platform
Privacy Preserving Speech Processing
privacy preserving speech processing framework architecture
gpu computing
Resiliency
Scalability
Secure computation
speech processing
storage management
Symmetric-Key Cryptography
symmetric-key encryptions
Ciphers
accelerated encryption framework
Acceleration
AES
AES implementation
Big Data
big data security in the cloud
Big Data storage/processing
Bilinear Pairing
accelerated encryption algorithms
Cloud Computing
cloud processing security
cloud storage security
Cryptography
data privacy
design specification
encryption
biblio
Cloud-Centric Framework for Isolating Big Data as Forensic Evidence from IoT Infrastructures
Submitted by grigby1 on Tue, 02/06/2018 - 1:47pm
Internet of Things
sensors
security
Scalability
Resiliency
pubcrawl
proliferation
parallel processing
nanotechnology
miniaturization
Metrics
IoT infrastructures
IoT
Big Data
forensic evidence
Digital Forensics
Data Security
data exchange
cybercrime activities
cloud-computing
cloud-centric framework
Cloud Computing
CFIBD-IoT framework
business processes
big data security in the cloud
Big data isolation
biblio
A Verifiable Single Keyword Top-k Search Scheme against Insider Attacks over Cloud Data
Submitted by grigby1 on Tue, 02/06/2018 - 1:47pm
outsourcing
verification codes
verifiable single keyword top-k search scheme
Top-k
Servers
security of data
security issues
Scalability
resource outsourcing
Resiliency
pubcrawl
Protocols
big data security in the cloud
Metrics
Keyword search
integrity verification
insider attacks
existing secure keyword search methods
Data models
data integrity
computer science
cloud servers
cloud data
Cloud Computing
biblio
Collaborative Anomaly Detection Framework for Handling Big Data of Cloud Computing
Submitted by grigby1 on Tue, 02/06/2018 - 1:47pm
Interquartile Range (IQR)
UNSW-NB15 dataset
ubiquitous computing
security of data
Scalability
Resiliency
pubcrawl
pay-per-use based services
network observations
Metrics
Large-scale systems
Big Data
Gaussian Mixture Model (GMM)
false positive rate
dynamic distributed architecture
detection rate
data privacy
Collaborative anomaly detection framework
cloud computing environments
Cloud Computing
CADF
big data security in the cloud
biblio
Hybrid Cloud Computing and Integrated Transport System
Submitted by grigby1 on Tue, 02/06/2018 - 1:47pm
IoT
urban transportation
Transportation
sensors
security
Scalability
Resiliency
pubcrawl
Organizations
mobility concepts
Metrics
automation system
Intelligent Transportation Systems
integration
integrated transport system
hybrid cloud computing system
hybrid cloud computing
Cloud Computing
big data security in the cloud
Big Data management techniques
Big Data
« first
‹ previous
…
92
93
94
95
96
97
98
99
100
…
next ›
last »