Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
internet
biblio
Fast Mining of Large-Scale Logs for Botnet Detection: A Field Study
Submitted by grigby1 on Wed, 03/08/2017 - 1:32pm
information quality
Workstations
Servers
pubcrawl170112
proxy
normal data streams
network-based attack
mining
malwares
malware
logs
large-scale proxy log mining
invasive software
internet
information quantity
abnormal data streams
Heuristics
feature pattern
feature extraction
digital signatures
Data mining
computer network security
computer network behavioral analysis
Cloud Computing
C and C Servers
botnet life cycle
botnet detection methods
botnet
algorithmically generated domains
AGD
biblio
Building an Open Identity Platform for India
Submitted by grigby1 on Wed, 03/08/2017 - 1:31pm
internet
vendor neutrality
unique identity project
technology platform
technology architecture
supply chains
security of data
security
pubcrawl170112
open systems
open standards
open source components
open identity platform
Aadhaar authentication service
India
design thinking
data centers
computer centres
computer architecture
Buildings
biometrics (access control)
biometric identity system
authentication
architecture
Aadhaar system
biblio
Data supply chain in Industrial Internet
Submitted by grigby1 on Wed, 03/08/2017 - 1:28pm
Metals
Web Protocol
visionary data supply chain
supply chains
standards
Punching
pubcrawl170112
Protocols
Production facilities
Open Messaging Interface
business data processing
IoT
internet
industry business activities
industrial Internet application architecture
industrial internet
Data processing
Data collection
data analysis
computer architecture
biblio
Protecting endpoint devices in IoT supply chain
Submitted by grigby1 on Wed, 03/08/2017 - 1:26pm
IoT supply chain
uniquely identifiable embedded computing devices
Traceability
supply chains
supply chain security
supply chain management
security issues
security challenges
secure access control
RFID-enabled solution
RFID tag
radiofrequency identification
pubcrawl170112
production engineering computing
privacy challenges
privacy
authentication
IoT device authentication
Internet of Things (IoT)
Internet of Things
Internet infrastructure
internet
Hardware
endpoint device protection
Endpoint Device
data transfer
data privacy
control chip
communication efficiency
centralized database
authorisation
biblio
Internet of Things (IoT): Security challenges, business opportunities reference architecture for E-commerce
Submitted by grigby1 on Wed, 03/08/2017 - 1:23pm
IoT
WiFi
supply chains
sensors
security of data
security industry
security challenges
security
RFID
reference architecture
pubcrawl170112
physical devices
Bluetooth
Internet of Things (IoT)
Internet of Things
internet
intelligent devices
electronic commerce
e-commerce
Databases
Connected Devices & Wearables
Cloud Computing
business opportunities
Business
biblio
Query of Uncertain QoS of Web Service
Submitted by grigby1 on Wed, 03/08/2017 - 12:53pm
Computers
continuous probability distribution
internet
optimization approaches
Probability distribution
pubcrawl170110
Q measurement
QoS
quality of service
query processing
Semantics
uncertain QoS query
uncertainty
Web Service
web services
biblio
Abstractions and Solutions to Support Smart-objects in the Future Internet
Submitted by grigby1 on Tue, 03/07/2017 - 12:50pm
future Internet architecture
internet
Mobility
named objects
network abstractions
network services
pubcrawl170201
smart-objects
virtual networks
biblio
Towards Improving Web Attack Detection: Highlighting the Significant Factors
Submitted by grigby1 on Tue, 03/07/2017 - 12:41pm
internet
XSS
Web attack detection
Web application vulnerabilities
Web Application Security
Web application protection
Uniform resource locators
session management
pubcrawl170109
Monitoring
IP networks
Intrusion Detection
broken authentication
injection
information management
information access
hackers
e-business
denial of service attack
Data protection
cyber attack
cross-site scripting
Computer crime
Buffer overflows
biblio
Modeling Fraud Prevention of Online Services Using Incident Response Trees and Value at Risk
Submitted by grigby1 on Tue, 03/07/2017 - 12:41pm
internet
Trojan horses
trees (mathematics)
risk analysis
pubcrawl170109
probability estimation
probability
online financial service
Online banking
IRT
Computer crime
incident response tree
fraud prevention modelling
fraud
financial data processing
Europe
estimation theory
cyber criminal
conditional fraud value
biblio
Identifying digital threats in a hacker web forum
Submitted by grigby1 on Tue, 03/07/2017 - 12:39pm
Discussion forums
Social network services
sentiment analysis tool
sentiment analysis
query processing
pubcrawl170109
parts of speech tagger
natural language processing
malicious hackers
internet
HTML
Hacking
hacker Web forum
hacker language analysis
discussion posts
automated analysis tools
digital threat identification
Databases
data systems
data querying
Data mining
cyber-attacks
customized Web-crawler
critical infrastructures
critical infrastructure
critical computer networks
Computer hacking
Computer crime
communication platform
« first
‹ previous
…
78
79
80
81
82
83
84
85
86
…
next ›
last »