Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data Security
biblio
An Efficient Secure Coded Edge Computing Scheme Using Orthogonal Vector
Submitted by grigby1 on Tue, 06/02/2020 - 11:54am
resilience
irrelevant random blocks
last mile problem
linear codes
linear coding
Metrics
original data blocks
orthogonal vector
policy-based governance
pubcrawl
information theoretical security
Resiliency
Scalability
secure edge
security of data
unreliable edge nodes
user device
Vectors
widespread solution
Decoding
security
actual EC deployments
Cloud Computing
communication overhead
computational complexity
compute-intensive applications
data confidentiality
data matrix
Data Security
coding theory
edge computing
edge devices
efficient edge
efficient secure coded edge computing scheme
high decoding complexities
Human behavior
Human Factors
information theoretic security
biblio
A Multi-factor Biometric Authentication Scheme Using Attack Recognition and Key Generator Technique for Security Vulnerabilities to Withstand Attacks
Submitted by aekwall on Mon, 06/01/2020 - 11:04am
key generator technique
World Wide Web
withstand external attacks
security vulnerabilities
security
Resiliency
resilience
pubcrawl
password
multifactor biometric authentication scheme
multifactor authentication
Multi-factor authentication
Metrics
attack recognition
internet
information sharing
Human Factors
Human behavior
Fingerprint recognition
Databases
Data Security
data privacy
Communication networks
biometrics (access control)
biometric
authorisation
biblio
A PSO clustering based RFID middleware
Submitted by aekwall on Mon, 06/01/2020 - 10:48am
policy-based governance
security of data
security
RFID middleware
Resiliency
resilience
radiofrequency identification
radio frequency identification
pubcrawl
PSO clustering scheme
PSO clustering
Acceleration
particle swarm optimization
particle swarm optimisation
middleware security
middleware
Data Security
data availability
convergence
composability
Clustering algorithms
Birds
biblio
SQMAA: Security, QoS and Mobility Aware ACO Based Opportunistic Routing Protocol for MANET
Submitted by aekwall on Tue, 05/26/2020 - 10:58am
mobility conditions
ACO
ad hoc network
ant colony optimisation
Ant colony optimization
guaranteed QoS performance
Malicious Attacker
malicious attackers
MANET open nature network
MANET routing protocols
mobile nodes
opportunistic routing protocol
QoS aware protocol
QoS improvement algorithm
RSSI measurements
Secure-QMAA
security Algorithm
security-QoS mobility aware ACO routing protocol
SQMAA
RSSI
authorisation
Data Security
telecommunication security
security
network security
Resiliency
pubcrawl
Routing protocols
Routing
Scalability
Swarm Intelligence
quality of service
secure communication
mobile ad hoc networks
Blackhole attack
mobility management (mobile radio)
DoS attacks
user authentication
biblio
Test methodology for detecting short-channel faults in network on- chip networks using IOT
Submitted by grigby1 on Fri, 05/15/2020 - 12:44pm
integrated circuit reliability
short-channel fault detection
Routing
routers networks
Power demand
NoC
network-on-chip analysis machine
network-on-chip
network routing
network on- chip networks
network on chip
Monitoring
IoT
Internet of Things
interconnection networks
integrated circuit testing
network on chip security
Integrated circuit interconnections
fault diagnosis
Encoders/decoders
Data Security
Data protection
data encryption
Cryptography
Conferences
computing-intensive data processing
computer architecture
Aerospace electronics
Metrics
Resiliency
resilience
Scalability
biblio
An Innovative Model (HS) to Enhance the Security in Windows Operating System - A Case Study
Submitted by grigby1 on Fri, 04/17/2020 - 11:27am
NT LAN manager
Windows Registry
Windows Operating System Security
Windows operating system
Windows
SAM security account manager
SAM file protection
Resiliency
resilience
pubcrawl
privacy
password
NTLM
attacks
Microsoft Windows (operating systems)
Metrics
message authentication
login credentials
HS model
force attacks
dictionary attacks
Data Security
Data protection
data integrity
composability
authorisation
biblio
HP-SDDAN: High-Performance Software-Defined Data Access Network
Submitted by grigby1 on Fri, 04/17/2020 - 10:29am
Software
Human Factors
IP networks
Metrics
privacy
programable network rules
pubcrawl
resilience
Resiliency
resource allocation
Human behavior
Software Defined Network
software defined networking
software-defined data access network architecture
software-defined network
storage management
storage resource allocation information
Virtualization
virtualization privacy
data privacy
attribute-based data access control
authorisation
Cloud Computing
cloud environments
cloud platform
composability
data access network
data attributes
Access Control
Data protection
Data Security
differential privacy
Firewalls (computing)
global network management capabilities
global user information
high-performance software-defined data access network
HP-SDDAN implementation
biblio
Towards Improved Trust in Threat Intelligence Sharing using Blockchain and Trusted Computing
Submitted by aekwall on Mon, 04/06/2020 - 10:15am
Human Factors
peer to peer security
trust enhancement framework -TITAN
Threat intelligence sharing
sharing effectiveness
sharing architectures
P2P reputation systems
open trust issues
decentralized sharing
decentralized blockchain
cybersecurity attacks
TEE
reputation
Cryptography
Scalability
cyber security
Distributed databases
blockchain
Metrics
Peer-to-peer computing
pubcrawl
Resiliency
Trusted Computing
data integrity
data privacy
Data Security
biblio
Securing Big Data in the Age of AI
Submitted by grigby1 on Fri, 04/03/2020 - 12:03pm
data privacy
security
relational database security
pubcrawl
privacy
Policy Based Governance
NoSQL databases
Metrics
machine learning
Human behavior
Data Security
Intelligent Data and Security
Data models
composability
collaboration
Big Data
Artificial Intelligence
Scalability
Resiliency
Compositionality
Intelligent Data Security
biblio
Statistical Analysis of Enhanced SDEx Encryption Method Based on SHA-256 Hash Function
Submitted by grigby1 on Wed, 03/18/2020 - 12:27pm
data encryption
Data Security
end-to-end data security
NIST statistical test suite
SDEx method
secure communication
secure data exchange method
secure transmission
pubcrawl
Resiliency
resilience
Secure File Sharing
« first
‹ previous
…
13
14
15
16
17
18
19
20
21
…
next ›
last »