Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
internet
biblio
DDoS attack detection using machine learning techniques in cloud computing environments
Submitted by K_Hooper on Wed, 04/04/2018 - 8:59am
Protocols
IT technology
learning (artificial intelligence)
legacy protocols
machine learning
machine learning algorithms
machine learning techniques
management organizations
Metrics
Neural networks
on-demand resources
Intrusion Detection
pubcrawl
reduced infrastructure cost
Resiliency
security
signature detection techniques
signatures attacks
victim cloud infrastructures
Vulnerability
vulnerability detection
DDoS detection system
attacker
Cloud Computing
cloud computing environments
cloud performance
Compositionality
Computer crime
computer network security
Computers
DDoS Attack
DDoS attack detection
Algorithm design and analysis
DDoS flooding attacks
DDoS threat
Decision Tree
Decision trees
distributed denial of service
end users
Human behavior
innocent compromised computers
internet
biblio
Are Wearables Ready for HTTPS? On the Potential of Direct Secure Communication on Wearables
Submitted by grigby1 on Mon, 04/02/2018 - 11:56am
privacy
wireless LAN
Web servers
wearables security
wearables
wearable computers
smart phones
security
secure Internet communication
secure communication protocols
Scalability
Resiliency
resilience
pubcrawl
Protocols
available wearable computing devices
network measurements
Internet servers
internet
Human behavior
energy consumption
direct secure communication
direct Internet connection
direct Internet communication
direct communication
Cryptography
computer network security
Ciphers
Bluetooth
biblio
Towards Lightweight Identity-Based Encryption for the Post-Quantum-Secure Internet of Things
Submitted by grigby1 on Mon, 04/02/2018 - 11:49am
key discovery procedure
word length 80 bit
time 36 ms
time 103 ms
RLWE problem
Resiliency
resilience
reconfigurable hardware component
quantum cryptography
pubcrawl
post-quantum-secure Internet of Things
multiuser scenarios
microcontrollers
Metrics
low-cost ARM Cortex-M0 microcontroller
lightweight identity-based encryption
ad-hoc network connection
Internet of Things
internet
Identity-based encryption
IBE scheme
Human behavior
encryption
embedded device
decryption
data exchange security
computer network security
Compositionality
asymmetric key distribution problem
Asymmetric Encryption
ASIACRYPT 2014
biblio
Revisiting Security Risks of Asymmetric Scalar Product Preserving Encryption and Its Variants
Submitted by grigby1 on Mon, 04/02/2018 - 11:49am
internet
Servers
security risks
scalar product preserving encryption
Resiliency
resilience
query answering
pubcrawl
product preservation property
outsourcing
Metrics
Mathematical model
ASPE
Indexes
Human behavior
encryption
Cryptography
confidential information
Compositionality
Cloud Computing
ciphertexts
asymmetric scalar-product-preserving encryption
Asymmetric Encryption
biblio
Database Encryption Using Asymmetric Keys: A Case Study
Submitted by grigby1 on Mon, 04/02/2018 - 11:48am
encryption
web applications
test database
RSA
Resiliency
resilience
pubcrawl
padding
Metrics
Java API
Java
internet
Human behavior
encryption-decryption keys
encryption keys
encryption algorithms
application performance decrease
Encrypted database
ElGamal
ECIES
Distributed databases
Databases
database encryption
Data Security
Cryptography
cryptographic algorithms
Compositionality
Benchmark testing
asymmetric keys
Asymmetric Encryption
application program interfaces
biblio
Cyber Anonymity Based on Software-Defined Networking and Onion Routing (SOR)
Submitted by grigby1 on Mon, 04/02/2018 - 11:30am
software-defined networking
Protocols
pubcrawl
Relays
resilience
Resiliency
Routing
Servers
software defined networking
privacy
software-defined networking and onion routing
SOR architecture
telecommunication network routing
telecommunication traffic
Token
Tor
traffic surveillance
anonymity
OpenFlow
onion routing
network traffic censorship
multiple anonymity service providers
Metrics
internet
Human behavior
Government
E-cash
cyber anonymity technique
cyber anonymity service
computer network security
composability
cloud networks
Cloud Computing
biblio
Deep Web Online Anonymity
Submitted by grigby1 on Mon, 04/02/2018 - 11:30am
resilience
Internet user
Logic gates
Metrics
online anonymity
personal information sharing
privacy
privacy protection
pubcrawl
internet
Resiliency
social hub
social media
social networking (online)
Terrorism
user data
Vulnerabilities of Social Media
cyber space
anonymity
Browsers
composability
Computer crime
Computer hacking
Computers
crime
Cryptography
Anarchy
Cyberspace Anonymity
Data protection
deep web
Government
hidden encrypted network
Human behavior
information privacy
biblio
Application of Congestion Notifications in a Cyber-Physical System
Submitted by el_wehby on Thu, 03/29/2018 - 12:52pm
intelligent cyber control
smart-grid
smart power grids
Smart Grids
smart grid operation
real-time systems
power system stability
power system control
power engineering computing
Nominations and elections
network congestion
internet
Communication networks
intelligent control
distributed systems
distributed system reconfiguration
distributed processing
cyber-physical systems
cyber-physical system
cyber controls
control systems
control engineering computing
congestion notifications
communications congestion
1505610
biblio
Mitigating Cyber Security Attacks by Being Aware of Vulnerabilities and Bugs
Submitted by grigby1 on Mon, 03/26/2018 - 11:58am
software programs
private data
program debugging
pubcrawl
resilience
Resiliency
security
security of data
software bugs
prevention techniques
tools
user bank accounts
valuable assets
virtualized system
Vulnerabilities and Bugs
vulnerability concepts
vulnerable applications
Windows operating system
Kali Linux
attack methodologies
composability
Computer bugs
cyber security
cyber security attacks
cyber-attack
defence strategies
internet
antivirus software
Linux
Metasploit Framework
Metrics
Nmap
operating system level
Penetration Test
Penetration Testing
biblio
Overview of Firewalls: Types and Policies: Managing Windows Embedded Firewall Programmatically
Submitted by grigby1 on Mon, 03/26/2018 - 11:58am
Protocols
network security
Open Port
operating systems (computers)
Packet
Packets filtering
Ports (Computers)
preconfigured rules
private networks
network attacks
pubcrawl
resilience
Resiliency
security
Windows
Windows embedded firewall
Windows operating system
firewalls
composability
computer network security
computer security
Filtering
firewall
Firewall Exception
firewall policies
firewall rules
Authorize Application
Firewalls (computing)
firewalls types
internet
IP networks
Metrics
microsoft windows
Network
« first
‹ previous
…
65
66
67
68
69
70
71
72
73
…
next ›
last »