Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information security
biblio
Design and Development of Digital Image Security Using AES Algorithm with Discrete Wavelet Transformation Method
Submitted by grigby1 on Fri, 04/22/2022 - 1:16pm
information security
security
pubcrawl
AES
composability
Computer languages
Metrics
Task Analysis
Compositionality
Transforms
interoperability
digital images
discrete wavelet transforms
decomposition
discrete Wavelet transformation
biblio
Evaluating Connection Resilience for Self-Organizing Cyber-Physical Systems
Submitted by grigby1 on Wed, 04/20/2022 - 11:28am
Conferences
CPS
CPS resilience
cps resiliency
cyber-physical systems
Industries
information security
network connectivity
overlay networks
Peer-to-peer computing
pubcrawl
resilience
Smart cameras
biblio
Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT
Submitted by grigby1 on Tue, 04/19/2022 - 4:42pm
Ciphertext Policy ABE
Communication channels
Computational modeling
Costs
CP-ABE
encryption
information security
Internet of Things
outsourced decryption
outsourcing
Pairing-Free
policy-based governance
pubcrawl
revocation
Scalability
standards
biblio
Traffic Normalization for Covert Channel Protecting
Submitted by grigby1 on Tue, 04/19/2022 - 3:13pm
information security
tools
timing
telecommunication traffic
security
Scalability
Resiliency
resilience
residual covert channel capacity
pubcrawl
normalization
channel capacity
Information Leakage
estimation
Data protection
covert channels
covert channel
countermeasure
Compositionality
composability
Channel estimation
biblio
Research on Computer Network Information Security Problems and Prevention Based on Wireless Sensor Network
Submitted by grigby1 on Tue, 04/19/2022 - 10:38am
computer network
computer networks
encryption
information security
Market research
pubcrawl
real-time systems
resilience
Scalability
sensor security
Stability analysis
wireless sensor
wireless sensor networks
biblio
Development of the Algorithm to Ensure the Protection of Confidential Data in Cloud Medical Information System
Submitted by grigby1 on Mon, 04/18/2022 - 11:38am
Cloud Computing
computer architecture
Homomorphic encryption
information security
machine learning algorithms
medical cloud information system
personal data
pubcrawl
Scalability
security scalability
standardization
telemedicine
biblio
A Functional Approach to Cyber Risk Assessment
Submitted by grigby1 on Mon, 04/18/2022 - 10:57am
Complexity theory
cyber risk assessment
estimation
Human Factors
information security
logistic function
Logistics
Metrics
Organizations
pubcrawl
quantitative methods
resilience
risk management
Scalability
Security Risk Estimation
tools
biblio
Using the Theory of Interpersonal Behavior to Predict Information Security Policy Compliance
Submitted by grigby1 on Mon, 04/18/2022 - 10:52am
information theoretic security
Bibliographies
Compliance
Data protection
Government
government effectiveness
information security
information security policy (ISP)
policy-based governance
Predictive models
pubcrawl
Regulation
security policies
theory of interpersonal behavior (TIB)
biblio
Information Security Assessment On Court Tracking Information System: A Case Study from Mataram District Court
Submitted by aekwall on Wed, 04/13/2022 - 10:14am
security management
information security
pubcrawl
Resiliency
Government
ISO standards
Regulation
passwords
Assessment
CMMI
ISO/IEC 27001:2013
Mobile communication
SIPP
Damage Assessment
biblio
Information System Security Protection Based on SDN Technology in Cloud Computing Environment
Submitted by aekwall on Fri, 04/01/2022 - 2:10pm
security
information security
Cloud Computing
Servers
Scalability
SDN
pubcrawl
Resiliency
network security
cloud computing security
Data Security
SDN security
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
…
next ›
last »