Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
Establishing a Zero Trust Strategy in Cloud Computing Environment
Submitted by grigby1 on Thu, 03/04/2021 - 3:04pm
cloud computing environment
zero trust
Zero Trust Strategy
Trust Management System
trust management mechanisms
Subjective Trust
static trust relationship
Objective Trust
Incipient Technology
conceptual zero trust strategy
Data Breach
cloud service providers
Trusted Computing
Cloud Computing
Scalability
data integrity
data privacy
data confidentiality
Resiliency
resilience
policy-based governance
Human Factors
pubcrawl
biblio
Federated TONİoT Windows Datasets for Evaluating AI-Based Security Applications
Submitted by grigby1 on Thu, 03/04/2021 - 2:43pm
privacy
Windows operating systems
Windows Operating System Security
Windows operating system
virtualization privacy
Virtual machining
virtual machine security
virtual machine
testbed
security
Resiliency
resilience
pubcrawl
Linux Operating System Security
operating systems
Metrics
Intrusion Detection
Internet of Things
Human behavior
Federated datasets
data privacy
Computer crime
composability
Cloud Computing
AI-based security applications
biblio
Encrypted-Input Program Obfuscation: Simultaneous Security Against White-Box and Black-Box Attacks
Submitted by grigby1 on Thu, 03/04/2021 - 2:33pm
pubcrawl
Logic gates
machine learning
machine learning as a service
machine learning programs
Metrics
program confidentiality
program obfuscation
provable program obfuscation solution
learning (artificial intelligence)
range membership programs
resilience
security
traditional cryptographic program obfuscation model
white box
white box cryptography
White Box Security
white-box attacks
cloud services
Resiliency
Predictive Metrics
Compositionality
Black Box Attacks
black box encryption
black-box attacks
Cloud Computing
cloud programs
provable security
composability
Computational modeling
Cryptography
data privacy
Decision trees
encrypted-input program obfuscation
encryption
equivalent unobfuscated program
biblio
Flow Table Security in SDN: Adversarial Reconnaissance and Intelligent Attacks
Submitted by grigby1 on Tue, 02/23/2021 - 2:55pm
security of data
performance-driven design
power consumption
Probes
pubcrawl
Reconnaissance
resilience
Resiliency
Scalability
SDN architectures
Network reconnaissance
security vulnerabilities
simplistic attack models
software defined networking
specific cache-like behaviors
Switches
target flow table
telecommunication security
underlying storage medium
data privacy
attack parameters
cache inference
cache storage
caching flow rules
communication bottleneck
computer network security
computer networks
control systems
adversarial reconnaissance
denial of service attack
distributed processing
easy target
flow table security
Government
intelligent attacks
Interference
IP networks
biblio
Data Provenance Assurance for Cloud Storage Using Blockchain
Submitted by grigby1 on Tue, 02/23/2021 - 2:26pm
Metrics
data record operations
Digital Forensics
Distributed databases
ethereum
Ethereum blockchain
Forensics
IPFS
metadata
Data Provenances
network accountability
privacy
pubcrawl
resilience
Resiliency
SLA-violations
storage management
storage privacy
cloud-based data provenance
AWS S3 storage
blockchain network
Cloud Computing
cloud data object
cloud forensics
cloud infrastructures
cloud storage
cloud storage forensics
AWS S3
composability
confidential files
contracts
Cryptography
data accountability
data integrity
data privacy
data provenance assurance
biblio
Smart e-Health Security and Safety Monitoring with Machine Learning Services
Submitted by grigby1 on Tue, 02/23/2021 - 2:25pm
resilience
Metrics
Monitoring
network accountability
patient monitoring
patient treatment
patient treatment medication safety issues
Privacy Requirements
Protocols
pubcrawl
regional regulations
medical treatment process
Resiliency
Safety
safety monitoring
security monitoring
service providers
smart e-health security
transaction flows
trust health information environment
Trusted Computing
HIPAA
composability
Cryptography
data privacy
Distributed databases
e-health blockchains
EU-GDPR
health and safety
health care
Healthcare
Accountability Solution
HITECH
Intelligent Analytics
intelligent monitoring
Keywords- e-Health Blockchain
learning (artificial intelligence)
machine learning
machine learning services
medical information systems
Medical services
biblio
An Analysis of Pre-installed Android Software
Submitted by grigby1 on Tue, 02/23/2021 - 2:24pm
resilience
potentially harmful behavior
potentially invasive private data collection practices
pre-installed Android software
pre-installed software
preinstalled apps
preinstalled software
privacy implications
product differentiation
pubcrawl
real-world Android firmware
open-source nature
Resiliency
security
sensitive data
smart phones
social network platforms
social networking (online)
Software
Supply Chain
tracking services
unwanted behavior
device manufacturers
Android devices
Android ecosystem
Android OS
Android's open source model
Androids
composability
Computer crime
crowd-sourcing methods
data privacy
data-driven services
Android (operating system)
device vendors
Ecosystems
Humanoid robots
internet
Libraries
Metrics
Microprogramming
mobile computing
mobile network operators
network accountability
biblio
Self-organization of Network Communities via Blockchain Technology: Reputation Systems and Limits of Digital Democracy
Submitted by grigby1 on Tue, 02/23/2021 - 2:23pm
reputation systems
network members reputation
Oracle
organisational aspects
political institutionalization
politics
pubcrawl
public accountability
reputation assessment system
reputation system
network communities reputation
resilience
Resiliency
security of data
self-organization
social networking (online)
tools
traditional reputation systems
virtual network communities
Economics
blockchain technology
blockchain-based reputation system
blockchain-oracles
civil society
composability
data privacy
digital democracy
digital technologies
blockchain
Games
Government
government control
government data processing
internet
Metrics
multi-agent systems
network accountability
biblio
I/O Efficient Approximate Nearest Neighbour Search based on Learned Functions
Submitted by aekwall on Mon, 02/22/2021 - 1:46pm
data-sensitive hashing-based methods
multimedia database
learned index structure
learned hashing
learned functions
input-output programs
indexing
I/O efficiency
high dimensional space
function approximation
external storage scenarios
external memory
data-sensitive indexing
data privacy
approximate nearest neighbour search
ANNS
nearest neighbor search
search problems
file organisation
Predictive Metrics
Measurement
query processing
neural nets
pubcrawl
learning (artificial intelligence)
nearest neighbour methods
biblio
Sparser: Secure Nearest Neighbor Search with Space-filling Curves
Submitted by aekwall on Mon, 02/22/2021 - 1:45pm
nearest neighbor search
strengthening privacy
Sparser pre-processes plaintext data
space-filling perturbation
Space-filling curve
secure nearest neighbor search
perturbation
nearest neighbor queries
logarithmic time
approximate nearest neighbors
approximate nearest neighbor search solution
order-preserving encryption
Cryptography
space-filling curves
approximation theory
Predictive Metrics
Curve fitting
Measurement
query processing
pubcrawl
nearest neighbour methods
data privacy
encrypted data
« first
‹ previous
…
24
25
26
27
28
29
30
31
32
…
next ›
last »