Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data Security
biblio
Detection of Temporal Insider Threats to Relational Databases
Submitted by grigby1 on Thu, 05/24/2018 - 12:08pm
pubcrawl
Training
time series
temporal insider threat detection
Temporal Attacks
security of data
security
Resiliency
resilience
relational databases
relational database security
real-time systems
real-time anomaly detection
query processing
query features
access anomalies
Periodicity
Metrics
legitimate data access
Insider Threats
Human behavior
feature extraction
Data Security
data misuse
Data Analytics for Security
Data Analytics
data analysis
composability
Anomaly Detection
biblio
Implementation of SERPENT cryptographic algorithm for secured data transmission
Submitted by grigby1 on Wed, 05/16/2018 - 1:48pm
key management
Technological innovation
symmetric key
substitution permutation network
SERPENT cryptographic algorithm
SERPENT
secured data transmission
s-box stage
round function
Resiliency
resilience
Repudiation
pubcrawl
Metrics
linear mixing stage
key scheduling
Algorithm design and analysis
IP networks
human factor
Human behavior
graphical programming tool
encryption
enciphering process
decryption
deciphering process
Data Security
data integrity
Cryptography
composability
Ciphers
Blockcipher
biblio
Secure-EPCIS: Addressing Security Issues in EPCIS for IoT Applications
Submitted by grigby1 on Tue, 05/01/2018 - 11:35am
production engineering computing
Time factors
supply chain security
supply chain management
Servers
security of data
security issues
Secure-EPCIS
SCM
Scalability
RFID
Resiliency
resilience
radiofrequency identification
pubcrawl
Access Control
Product codes
Permission
Mobile communication
IoT
Internet of Things
Human behavior
EPCIS
EPCglobal standards
EPCglobal Network
electronic products
Electronic Product Code Information System
Data Security
access-control
biblio
Database Encryption Using Asymmetric Keys: A Case Study
Submitted by grigby1 on Mon, 04/02/2018 - 12:48pm
encryption
web applications
test database
RSA
Resiliency
resilience
pubcrawl
padding
Metrics
Java API
Java
internet
Human behavior
encryption-decryption keys
encryption keys
encryption algorithms
application performance decrease
Encrypted database
ElGamal
ECIES
Distributed databases
Databases
database encryption
Data Security
Cryptography
cryptographic algorithms
Compositionality
Benchmark testing
asymmetric keys
Asymmetric Encryption
application program interfaces
biblio
Enhancing data security of iOS client by encryption algorithm
Submitted by K_Hooper on Wed, 02/28/2018 - 11:34am
Human Factors
sensitive data
Resiliency
pubcrawl
mobile devices
Metrics
iOS Security
iOS devices
iOS client
iOS (operating system)
information security
Compositionality
encryption algorithms
EDS
ECC encryption algorithms
ECC
desktop computer
DES encryption algorithm
Data Transmission
Data Security
Cryptography
biblio
An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor Analytics
Submitted by grigby1 on Wed, 02/21/2018 - 1:38pm
secure autonomous aerial surveillance
Multicore Computing
multicore computing security
near-sensor data analytics pipeline
Neural networks
parallel architectures
pubcrawl
regular computing task
remote recognition
resilience
Resiliency
Scalability
Metrics
security of data
seizure detection
sensitive data protection
sensors
size 65 nm
SoC
software programmability
system-on-chip
tightly-coupled multicore cluster
voltage 0.8 V
energy 3.16 pJ
CNN
compute-intensive data processing
computer architecture
computerised instrumentation
Cryptography
data analysis
Data Security
deep convolutional neural network
electroencephalogram
encrypted data collection
encryption
approximate computing
energy conservation
Engines
equivalent reduced instruction set computer operation
Face detection
feature extraction
Fulmine tight power envelope
Internet of Things
Internet-of-Things endpoint
IoT endpoint system-on-chip
low-power electronics
biblio
Cloud security ecosystem for data security and privacy
Submitted by grigby1 on Thu, 02/15/2018 - 11:49am
Ecosystems
Resiliency
resilience
pubcrawl
multifactor authentication
Metrics
IT industry
hybrid cryptographic system
Human Factors
human factor
Human behavior
HCS
encryption
authentication
Data Security
data privacy
CSP
Cryptography
CloudSim simulator
CloudSim
cloud service providers
cloud security ecosystem
Cloud Security
Cloud Computing
cloud adoption
biblio
Cloud-Centric Framework for Isolating Big Data as Forensic Evidence from IoT Infrastructures
Submitted by grigby1 on Tue, 02/06/2018 - 1:47pm
Internet of Things
sensors
security
Scalability
Resiliency
pubcrawl
proliferation
parallel processing
nanotechnology
miniaturization
Metrics
IoT infrastructures
IoT
Big Data
forensic evidence
Digital Forensics
Data Security
data exchange
cybercrime activities
cloud-computing
cloud-centric framework
Cloud Computing
CFIBD-IoT framework
business processes
big data security in the cloud
Big data isolation
biblio
Secure Information Sharing among Autonomous Vehicles in NDN
Submitted by grigby1 on Fri, 02/02/2018 - 1:20pm
named data networking
wireless environment
vehicular data authentication
vehicular ad hoc networks
vehicle tracking
vehicle names
telecommunication security
security
secure information sharing
secure data sharing
robust decisions
Resiliency
Raspberry Pi
pubcrawl
pseudonym scheme
NDN
Accidents
Mobile communication
mobile ad-hoc environment
Metrics
IP networks
Internet of Vehicles
Internet architecture
internet
Human Factors
Human behavior
Data Security
Data models
data delivery
cyber physical systems
autonomous vehicular network
autonomous vehicles
biblio
Analytic model on data security in VANETs
Submitted by grigby1 on Fri, 02/02/2018 - 1:14pm
Ad Hoc Network Security
Analytical models
composability
Data Security
Human behavior
Human Factors
information and communication technology
Markov processes
Protocols
pubcrawl
Resiliency
Solid modeling
« first
‹ previous
…
18
19
20
21
22
23
24
25
26
next ›
last »