Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information security
biblio
Enhancing data security of iOS client by encryption algorithm
Submitted by K_Hooper on Wed, 02/28/2018 - 11:34am
Human Factors
sensitive data
Resiliency
pubcrawl
mobile devices
Metrics
iOS Security
iOS devices
iOS client
iOS (operating system)
information security
Compositionality
encryption algorithms
EDS
ECC encryption algorithms
ECC
desktop computer
DES encryption algorithm
Data Transmission
Data Security
Cryptography
biblio
Towards Automation in Information Security Management Systems
Submitted by grigby1 on Tue, 02/06/2018 - 1:54pm
small and medium-sized enterprises
Process Automation
pubcrawl
Resiliency
risk management
Scalability
security controls automation
security of data
security requirements
Metrics
small-to-medium enterprises
Stakeholders
standards
tools
ubiquitous computing
Ubiquitous Computing Security
workflow enactment
information protection
automated process execution
automation
context-aware ISMS
continuous risk-driven ISMS
Data protection
highly interconnected information security management
Human behavior
Human Factors
ADAMANT
information security
Information Security Management System
information security management systems
Information Security Risk Management
Information systems
ISMS related activities
ISO 27001 compliant ISMS
biblio
Security Issues with Certificate Authorities
Submitted by grigby1 on Tue, 02/06/2018 - 1:54pm
Browsers
Browsers Security
digital signatures
Google
Human behavior
Human Factors
information security
Metrics
pubcrawl
Public key
Resiliency
Scalability
Servers
Standards organizations
Ubiquitous Computing Security
World Wide Web
biblio
QoS and security in VOIP networks through admission control mechanism
Submitted by K_Hooper on Fri, 02/02/2018 - 11:04am
telecommunication congestion control
Resource reservation
computer network security
Probes
Resilient Security Architectures
Loss measurement
IntServ/RSVP
Probe flows
VoIP network security
security
Resiliency
real-time systems
real-time multimedia
quality of service
Internet telephony
information security
Packet loss rate
QoS
Flow priority
digital assets
Multimedia communication
intradomain rerouting
multimedia traffic
Admission control
admission control mechanism
Admission threshold
advance resource reservation technique
Protocols
ecurity
Edge router
NAC
network admission control
pubcrawl
biblio
Towards a conceptual framework for information security digital divide
Submitted by grigby1 on Tue, 01/23/2018 - 3:28pm
Information systems
theoretical levels
system end-users
Standards organizations
security governance
pubcrawl
project management
policy-based governance
Policy
organization security maturity
Organizations
organizational level
organisational aspects
Maturity Capability
access control management approach
information system
Information Security Maturity Level
information security fundamentals
information security digital divide maturity framework
Information Security Digital Divide
information security
Frameworks
Digital divide
critical success factors
conceptual framework
collaboration
Benchmarking
authorisation
biblio
Analysis of wavelet, ridgelet, curvelet and bandelet transforms for QR code based image steganography
Submitted by grigby1 on Tue, 01/23/2018 - 2:59pm
pubcrawl
wavelet transforms
wavelet transform
transform coefficients
transform based image steganography
Steganography
security applications
security
secret message
ridgelet transform
Resiliency
QR codes
QR code based image steganography
bandelet transform
information security
Image Processing
Image coding
frequency-domain analysis
discrete wavelet transforms
discrete cosine transforms
cyber physical systems
curvelet transforms
curvelet transform and bandelet transform
curvelet transform
Cryptography
bit-plane based steganography method
biblio
A Homomorphic Signature Scheme for Quadratic Polynomials
Submitted by grigby1 on Tue, 01/16/2018 - 6:36pm
polynomials
Vectors
tensors
tensor products
Tensile stress
Silicon
signature vectors
Servers
Scalability
Resiliency
quadratic polynomials
pubcrawl
Approximation algorithms
polynomial functions
normal SIS problems
normal short integer solution problems
Metrics
Lattices
information security
Human Factors
homomorphic signature scheme
Homomorphic encryption
digital signatures
cloud server
biblio
SDN testbed for validation of cross-layer data-centric security policies
Submitted by grigby1 on Wed, 01/10/2018 - 12:24pm
operational military systems
Software-Defined Networks
software-defined networking
software defined networking
Software
Servers
security policies
security
SDN security mechanisms
Resiliency
pubcrawl
principal component analysis
Ports (Computers)
Access Control
OpenFlow-based testbed
military computing
information security
Data Security
cross-layer data-centric security policies
Cross Layer Security
control systems
Containers
computer network security
computer centres
composability
Communication system security
biblio
Privacy and Security: How to Differentiate Them Using Privacy-Security Tree (PST) Classification
Submitted by grigby1 on Thu, 12/28/2017 - 1:34pm
Metrics
security of data
Science of Security
Scalability
Resiliency
pubcrawl
PST classification
privacy-security tree classification
privacy
Policy-Governed Secure Collaboration
pattern classification
authentication
Law
information system domain
information security
information privacy
Human Factors
Human behavior
Data protection
data privacy
composability
collaboration
biblio
Information security analysis of deterministic encryption and chaotic encryption in spatial domain and frequency domain
Submitted by grigby1 on Wed, 12/27/2017 - 1:08pm
Entropy
Resiliency
pubcrawl
Mutual information
Metrics
Logistics
information security
Image color analysis
frequency-domain analysis
chaotic cryptography
encryption
Discrete Fourier transforms
digital images
Deterministic Encryption
Correlation
composability
chaotic encryption
« first
‹ previous
…
37
38
39
40
41
42
43
44
45
…
next ›
last »