Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
Critical Aspects Pertaining Security of IoT Application Level Software Systems
Submitted by aekwall on Mon, 06/01/2020 - 10:47am
middleware security
Vulnerability
standards
Software systems
software security
security of data
security
Resiliency
resilience
pubcrawl
Protocols
privacy issues
policy-based governance
application level software systems
middleware
IoT devices
IoT
Internet of Things security
Internet of Things
Insecure Software/Firmware
insecure software
Insecure Interfaces
data privacy
Constrained Application Protocol
composability
CoAP
biblio
Interest Flooding Attack Mitigation in Named Data Networking Based VANETs
Submitted by grigby1 on Fri, 05/29/2020 - 3:53pm
Scalability
named data networking
NDN
network applications
poisoning cache attack
privacy violation
pubcrawl
resilience
Resiliency
Named Data Network Security
security susceptibilities
storage management
telecommunication network routing
VANETs
vehicular
vehicular ad hoc networks
Vehicular Named Data Network
VNDN
ICN
CCN
computer network security
content distribution
conventional IP based system
data fetching
data privacy
Flooding
Human behavior
Ad Hoc
IFAMS scheme
Information Centric Network
Interest
interest flooding attack mitigation scheme
internet
IP based Internet
IP networks
mobility management
biblio
An Identity Privacy Protection Strategy in Vehicle Named Data Network
Submitted by grigby1 on Fri, 05/29/2020 - 3:53pm
malicious nodes
vehicular ad hoc networks
vehicle opportunity network
vehicle named data network
Security analysis
Scalability
ring signature scheme
Resiliency
resilience
pubcrawl
privacy protection
privacy problems
ONE-based VNDN platform
Named Data Network Security
anonymity
internet
interest packages
Identity Security
identity privacy protection strategy
identity information
Human behavior
digital signatures
data requester
data provider
data privacy
data packets
data names
computer network security
biblio
Efficient and Secure k-Nearest Neighbor Search Over Encrypted Data in Public Cloud
Submitted by grigby1 on Fri, 05/22/2020 - 2:35pm
k-NN search schemes
data owners
data points
data sharing
Electric fields
Electron traps
encrypted data
Impact ionization
Junctions
authorized data users
matrix similarity
Photoconductivity
public cloud
query privacy
search services
secure query services
valuable outsourced data
Cryptography
nearest neighbor search
k-nearest neighbor search
search problems
data storage
security property
nearest neighbour methods
Measurement
Metrics
Security analysis
Cloud Computing
data privacy
Mathematical model
matrix algebra
pubcrawl
authorisation
biblio
Big Data Security Issues and Natural Language Processing
Submitted by aekwall on Mon, 05/18/2020 - 10:54am
Computer crime
natural language processing technology
DNS
cyber security issues
big data security issues
advanced persistent threat detection
Phishing
Information Assurance
data privacy
natural language processing
cyber-attacks
spam detection
Vulnerability Analysis
advanced persistent threat
pubcrawl
Human behavior
Resiliency
information security
cyber security
security
malware
Conferences
Organizations
Big Data
Scalability
biblio
Assisting the Development of Secure Mobile Apps with Natural Language Processing
Submitted by aekwall on Mon, 05/18/2020 - 10:53am
natural language processing
user privacy protection
tools
secure mobile apps development
Scalability
Resiliency
recommender systems
rapid growth
pubcrawl
Androids
Mobile Security
mobile devices
mobile computing
largest worldwide market share
Humanoid robots
Human behavior
data privacy
biblio
Hardware-Assisted Security in Electronic Control Units: Secure Automotive Communications by Utilizing One-Time-Programmable Network on Chip and Firewalls
Submitted by grigby1 on Fri, 05/15/2020 - 12:30pm
secure execution environments
Firewalls (computing)
Hardware
hardware firewalling
hardware-assisted security
network-on-chip
off-chip networking techniques
on-chip network physical isolation
one-time-programmable network
Secure Automotive Communications
firewalls
smart automotive technologies
software-dominated enhancements
system-level countermeasures
system-on-chip
system-wide cryptographic techniques
threat models
Trusted Electronic Control Units
vehicle-to-vehicle communications
automotive controller area network-bus communications
network on chip security
Scalability
Resiliency
resilience
Metrics
advanced driver assistance systems
authentication
automotive communications
pubcrawl
automotive electronics
Automotive engineering
controller area networks
cyber-enabled automotive system
data privacy
driver information systems
electronic control units
enjoyable driving
biblio
SEAF: A Secure, Efficient and Accountable Access Control Framework for Information Centric Networking
Submitted by aekwall on Mon, 05/11/2020 - 11:28am
privacy protection
service accountability
Secure
SEAF
next-generation network
network resources
network edge
in-network cache
efficient and accountable access control framework
effective access control mechanism
delivery service
content providers
content delivery
cache-enabled routers
network accountability
cache storage
computer network security
ICN
information centric networking
delays
authentication
internet
Metrics
privacy
composability
pubcrawl
Resiliency
data privacy
Access Control
encryption
Cryptography
authorisation
biblio
A Flow-Level Architecture for Balancing Accountability and Privacy
Submitted by aekwall on Mon, 05/11/2020 - 11:28am
privacy
self-certifying identifier
Performance analysis
network flows
multidelegate mechanism
Internet service provider
flow-level architecture
delegate-registry cooperation scheme
accountability
network accountability
internet
Metrics
computer network security
composability
pubcrawl
Resiliency
computer architecture
Trusted Computing
Protocols
security
Receivers
data privacy
IP networks
biblio
Network Intrusion Detection Using Improved Genetic k-means Algorithm
Submitted by aekwall on Mon, 05/11/2020 - 11:12am
k-means++ algorithm
Training
Time complexity
Resiliency
pubcrawl
Prediction algorithms
personal privacy theft
pattern clustering
Partitioning algorithms
network intrusion detection
network intrusion
Metrics
KDD-99 dataset
KDD-99
Clustering algorithms
intrusion detection system
Intrusion Detection
internet
IGKM algorithm
IGKM
Genetics
genetic k-means algorithm
genetic algorithms
data privacy
computer network security
computer network
composability
« first
‹ previous
…
54
55
56
57
58
59
60
61
62
…
next ›
last »