Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
In Encryption We Don’t Trust: The Effect of End-to-End Encryption to the Masses on User Perception
Submitted by aekwall on Mon, 04/13/2020 - 10:06am
End user Studies
Security by Default
User Perception
usable security and privacy
skilled attackers
signal protocol
secure messaging
pre-MME
pre-mass messenger encryption
post-MME
post-mass messenger encryption
Mental model
HCI
end-to-end encryption
Scalability
communication model
cognitive science
end-to-end security
whatsapp
authentication
Interviews
electronic messaging
pubcrawl
Resiliency
Protocols
data privacy
encryption
Cryptography
biblio
Towards Privacy in Geographic Message Dissemination for Connected Vehicles
Submitted by aekwall on Mon, 04/13/2020 - 10:06am
legal regulations
Security by Default
vehicle routing
traffic information systems
traffic information
space-filling curves
server infrastructure
Routing
road traffic
privacy-by-design principle
privacy-by-design
privacy-by-default principle
location updates
location based services
road safety
geographic relevance area
geographic message dissemination
consistent hashing
connected vehicles
Traffic Management
user privacy
client-server systems
pubcrawl
Resiliency
mobile computing
data privacy
Scalability
biblio
An RSA Based Authentication System for Smart IoT Environment
Submitted by aekwall on Mon, 04/06/2020 - 10:16am
security services
X.509 Certificate
smart IoT environment
smart city apps
RSA based authentication system
remote applications
proxy induced security service provider
protocol design
Intelligent Proxies
Challenge/response Protocol
cyber physical systems
Smart City
Authentication schemes
PKI Trust Models
public key infrastructure
RSA
Scalability
IoT security
public key cryptography
authentication
NIST
Metrics
Cryptography
pubcrawl
Human behavior
Resiliency
Protocols
Cryptographic Protocols
Internet of Things
data privacy
authorisation
Servers
biblio
Towards Improved Trust in Threat Intelligence Sharing using Blockchain and Trusted Computing
Submitted by aekwall on Mon, 04/06/2020 - 10:15am
Human Factors
peer to peer security
trust enhancement framework -TITAN
Threat intelligence sharing
sharing effectiveness
sharing architectures
P2P reputation systems
open trust issues
decentralized sharing
decentralized blockchain
cybersecurity attacks
TEE
reputation
Cryptography
Scalability
cyber security
Distributed databases
blockchain
Metrics
Peer-to-peer computing
pubcrawl
Resiliency
Trusted Computing
data integrity
data privacy
Data Security
biblio
Membership Inference Attacks Against Adversarially Robust Deep Learning Models
Submitted by grigby1 on Fri, 04/03/2020 - 12:56pm
provable security
resilience
Training data
target model
security and privacy
provable defense
privacy challenges
membership inference attack
evasion attacks
empirical membership inference attacks
adversarially robust deep learning models
adversarial training method
adversarial defenses
adversarial defense methods
adversarial defense
deep learning
Compositionality
Metrics
neural nets
security challenges
privacy
Data models
data privacy
Resiliency
pubcrawl
security
Predictive models
Training
security of data
learning (artificial intelligence)
biblio
Invited Paper: The Applications of Machine Learning in Privacy Notice and Choice
Submitted by grigby1 on Fri, 04/03/2020 - 12:34pm
Privacy Policies
World Wide Web
user interactions
taxonomy
privacy stakeholders
privacy notice
privacy landscape
privacy awareness
online privacy practices
General Data Protection Regulation
privacy
Companies
Scalability
data privacy
Human behavior
pubcrawl
machine learning
Data collection
learning (artificial intelligence)
biblio
A System Architecture of Cybersecurity Information Exchange with Privacy (CYBEX-P)
Submitted by grigby1 on Fri, 04/03/2020 - 12:33pm
cybersecurity information exchange
versatile information exchange platform
STIX
shared threat data
shared data
privacy-preserving mechanisms
privacy preservation
information sharing
information management
information exchange platform
information exchange
CYBEX-P
cybersecurity techniques
cybersecurity information sharing platform
cybersecurity information exchange with privacy
privacy
Cybersecurity
cyber-information exchange
cyber threats
cyber defense
Privacy Policies
computer security
Databases
Scalability
data privacy
Human behavior
pubcrawl
Servers
Organizations
security of data
biblio
Context-Aware Enforcement of Privacy Policies in Edge Computing
Submitted by grigby1 on Fri, 04/03/2020 - 12:33pm
Human behavior
sensitive data
Scalability
pubcrawl
Privacy Policies
privacy model
privacy measures
privacy enhanced applications
privacy
mobile electronic health record
mobile computing
Cloud Computing
electronic health records
ehealth domain
edge computing
e-health
data privacy
context-aware enforcement
context-aware edge computing
context awareness
complex domain-specific privacy policies
biblio
A Policy Based Framework for Privacy-Respecting Deep Packet Inspection of High Velocity Network Traffic
Submitted by grigby1 on Fri, 04/03/2020 - 12:33pm
privacy-respecting Deep Packet Inspection
network payloads
organizational policies
passive proxying
Perfect Forward Secrecy
policy based framework
privacy
Privacy Policies
Privacy Requirements
privacy-aware techniques
Network connections
pubcrawl
Scalability
security solutions
semantic technologies
telecommunication traffic
TLS 1.3
unencrypted payloads
user access privileges
decryption
access decision
active proxying
attribute based access control
Attribute-based Access Control (ABAC)
big-data problem
computer network security
critical requirement
Cryptography
data privacy
Access Control
deep packet inspection
DPI analysis
DPI tools
fully encrypted data-transfer
high velocity network traffic
Human behavior
internet
malicious activity
biblio
A Study on Data Security and Query privacy in Cloud
Submitted by grigby1 on Fri, 04/03/2020 - 12:33pm
multifactor authentication
wide set
security policies
security of data
scalable resources
Scalability
Safety
pubcrawl
privacy problems
Privacy Policies
privacy contemplations
privacy
power system security
Oblivious RAM
noteworthy economic assistances
multioccupancy
authentication
Human behavior
high-tech tasks
encryption
effective resolutions
Economics
decreased operational expenditures
data privacy
data defence failures
confidentiality
Cloud Security
cloud platforms
cloud computing situations
Cloud Computing
Big Data
« first
‹ previous
…
59
60
61
62
63
64
65
66
67
…
next ›
last »