Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
Privacy Principles for Sharing Cyber Security Data
Submitted by grigby1 on Thu, 02/23/2017 - 2:26pm
pubcrawl170106
organizational risk
Organizations
personal information exposure
poker queries
privacy
privacy balancing
privacy preservation
privacy principles
privacy risks
organizational boundaries
qualitative evaluation
queries
query processing
risk management
security information
security of data
trust requirements
Trusted Computing
engineering approaches
computer security
cyber security
cyber security data sharing
data confinement
data exposure
data privacy
data sharing
Distributed databases
distributed security system
business data processing
forward progress
internal information
Law
least disclosure
minimal requisite fidelity
moderated queries
network traffic
organisational aspects
biblio
"Honeypot based unauthorized data access detection in MapReduce systems"
Submitted by grigby1 on Thu, 02/23/2017 - 12:49pm
data processing capabilities
unauthorized data access detection
pubcrawl
privacy
parallel processing
on-demand scalability
MapReduce systems
honeypot
homomorphic encryption methods
general programming languages
Distributed databases
Big Data
data privacy
Data models
data encryption
data analytics tasks
data analysis
Cryptography
pubcrawl170105
Computational modeling
Cloud Computing
Big Data revolution
biblio
"Mapping Security Requirements to Identify Critical Security Areas of Focus in PaaS Cloud Models"
Submitted by grigby1 on Thu, 02/23/2017 - 12:47pm
Platform-as-a-Service
Software Architecture
service level objectives
security requirement mapping
security of data
Security Mappinng
security concern
security
Science of Security
pubcrawl
privacy concern
platform-as-a-service cloud models
Access Control
PaaS cloud models
PaaS cloud architectures
matrix algebra
encryption
data privacy
critical security area identification
computer architecture
Computational modeling
Cloud Computing
authentication
adaptive security mapping matrix
biblio
"P2V: Effective Website Fingerprinting Using Vector Space Representations"
Submitted by grigby1 on Thu, 02/23/2017 - 12:45pm
natural language processing
word vector representations
Web sites
Web site fingerprinting attack
Web pages
Web page destination
VSM
vector space representations
users navigation privacy
Servers
real-valued vector
pubcrawl
passive traffic analysis attack
packet to vector approach
P2V
online activists
anonymous communication
Mathematical model
machine learning
learning (artificial intelligence)
language vector space models
Internet users
Fingerprint recognition
features extraction
feature extraction
data privacy
cyber security
pubcrawl170105
Context
Computer crime
Computational modeling
biblio
"Semantic-Based Searchable Encryption in Cloud: Issues and Challenges"
Submitted by grigby1 on Thu, 02/23/2017 - 12:43pm
Cloud Computing
Cryptography
data privacy
encryption
Indexes
pubcrawl170105
information security
information security technique
privacy-preserving issue
pubcrawl
searchable encryption
semantic search
semantic-based searchable encryption
Semantics
Servers
biblio
"Auditing Protocols for Cloud Storage: A Survey"
Submitted by grigby1 on Thu, 02/23/2017 - 12:41pm
auditing protocol
Cloud Computing
cloud storage
Computational modeling
Data models
data privacy
information science
integrity
outsourcing
protocol auditing
Protocols
pubcrawl170105
Scalability
Secure
security
biblio
"Random number generation based on sensor with decimation method"
Submitted by grigby1 on Thu, 02/23/2017 - 12:39pm
pubcrawl
wash-rinse-spin approach
testing random number
sensor fusion
sensor data
security
Random sequences
random sequence
random number uniform distribution
random number independence
random number generation
adversarial control
privacy
NIST
minimizing correlation
internet
Generators
decimation method
data privacy
Cryptography
cryptographic mechanisms
Correlation
biblio
"Verification for Security-Relevant Properties and Hyperproperties"
Submitted by grigby1 on Thu, 02/23/2017 - 12:37pm
model checking
wireless sensor networks
verification
Time factors
security-relevant property verification
security-relevant properties
security policy
Safety
pubcrawl
program verification
privacy analysis
Access Control
liveness
hyperproperty verification
hyperproperty
fairness
embedded systems
pubcrawl170105
data privacy preservation
data privacy
Computational modeling
biblio
"Improved Detection of 1-2-4 LSB Steganography and RSA Cryptography in Color and Grayscale Images"
Submitted by grigby1 on Thu, 02/23/2017 - 12:36pm
image colour analysis
Steganography
security
RSA cryptography
RSA
public key cryptography
pubcrawl170105
pubcrawl
privacy
LSB
Image edge detection
1-2-4 LSB steganography
Image color analysis
hidden knowledge
grayscale images
Gray-scale
encryption
data privacy
Cryptography
color images
Color
biblio
"A Dynamic Supervisory Mechanism of Process Behaviors Based on Dalvik VM"
Submitted by grigby1 on Thu, 02/23/2017 - 12:34pm
malware
system security sensitive behavior
system resource monitoring
system resource auditing
supervisory proces
spy privacy
smartphone security threats
smart phones
security
pubcrawl170105
private information
mobile phones
android
malicious chargeback software
Java
Humanoid robots
framework
dynamic supervisory mechanism
data privacy
Dalvik VM
Cameras
Androids
Android operating system
Android (operating system)
« first
‹ previous
…
95
96
97
98
99
100
101
102
103
…
next ›
last »