Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Google
biblio
Cloud Cryptography: User End Encryption
Submitted by grigby1 on Thu, 07/08/2021 - 1:36pm
Google
user privacy in the cloud
user privacy
Scalability
Resiliency
resilience
pubcrawl
Metrics
key generation
Business
encryption
decryption
Cryptography
cloud computing security
Cloud Computing
cloud
Ciphers
biblio
Attribution in Scale and Space
Submitted by aekwall on Thu, 05/13/2021 - 10:48am
Medical services
Task Analysis
Kernel
Human behavior
pubcrawl
composability
Google
Metrics
Mathematical model
attribution
Two dimensional displays
Perturbation methods
biblio
Meddling Middlemen: Empirical Analysis of the Risks of Data-Saving Mobile Browsers
Submitted by grigby1 on Tue, 04/27/2021 - 1:14pm
security
pubcrawl
Human behavior
resilience
Resiliency
Ecosystems
privacy
Metrics
Browsers
Compositionality
Browser Security
Google
Web servers
biblio
A Dynamic Analysis Security Testing Infrastructure for Internet of Things
Submitted by grigby1 on Tue, 02/16/2021 - 11:46am
Reliability
dynamic networks
software analysis
offline data analysis
live traffic monitoring
Google Home
Google devices
dynamic analysis security testing infrastructure
Amazon devices
security testing
Amazon Echo
dynamic analysis
Google
testing
security controls
Internet of Things
network traffic
composability
telecommunication traffic
data privacy
IoT devices
computer network security
Resiliency
resilience
Metrics
pubcrawl
IoT
Monitoring
data analysis
security
biblio
Profiling Vulnerabilities Threatening Dual Persona in Android Framework
Submitted by grigby1 on Thu, 01/28/2021 - 12:31pm
Quadroot
IPC
Kernel
malware
managed profiles
Market research
Metrics
mobile computing
National Vulnerability Database NVD
Pingroot
profiling vulnerabilities threatening dual persona
pubcrawl
inter-process communication
resilience
Resiliency
Scalability
security of data
security threat analysis
smart phones
smartphone
Stagefright
unrestricted access
vulnerable Android versions
certificate forging
Android (operating system)
Android 5
Android for Work
Android Lollipop release
Android platform
Android security model
Android smartphones
Android vulnerabilities
Android vulnerability Website
Androids
BYOP
android encryption
checksum collisions
crafted MMS
CYOD
dual persona
EMM
encryption
FUM score
Google
GSuite
Human behavior
biblio
A Study on Analytical Visualization of Deep Web
Submitted by grigby1 on Fri, 01/15/2021 - 11:22am
deep Web visualization
visualization
unknown dark channels
Tors encryption client
security
search engines
pubcrawl
Java
internet
Human Factors
Human behavior
Google
drugs
analysis
deep web
Databases
Data visualization
data visualisation
dark web
Cryptography
Crime Trace
crime monitoring
crime management
crime information visual system
Computer crime
biblio
The privacy paradigm : An overview of privacy in Business Analytics and Big Data
Submitted by grigby1 on Mon, 12/28/2020 - 11:37am
Big Data
Technology management
privacy paradigm
GPDR
data mining technologies
dados
business analytics
analytics
big data privacy
Google
Data protection
Companies
privacy
information technology
data privacy
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
business data processing
Data mining
data analysis
biblio
iDaaS: Inter-Datacenter Network as a Service
Submitted by grigby1 on Tue, 12/01/2020 - 3:37pm
Resiliency
Internet-scale Computing Security
lower bandwidth price
Metrics
multiple iDaaS providers
Policy Based Governance
predictable network performance
Pricing
private wide area networks
pubcrawl
resilience
Internet-scale applications
Scalability
service-inter-datacenter network
Stackelberg game
telecommunication traffic
traditional application providers
unpredictable network performance
video streaming
WANs
wide area networks
wide area traffic
efficient bandwidth pricing algorithm
bandwidth allocation
bandwidth guarantee
bandwidth price
bandwidth reservation algorithms
bandwidth trading market
Cloud Computing
collaboration
composability
computer centres
Distributed databases
Bandwidth
game theory
Games
Google
Human behavior
Human Factors
iDaaS provider
Inter-datacenter network
Inter-Datacenter Network as a Service
internet
Internet giants
biblio
Search Prevention with Captcha Against Web Indexing: A Proof of Concept
Submitted by grigby1 on Fri, 09/11/2020 - 10:44am
containing sensitive words
webpages
web-based captcha conversion tool
web indexing
web index
Web crawler
search prevention algorithm
search prevention
search engine database
search engine bot
search engine
malicious web crawlers
Google search engine
Crawlers
security of data
captcha version
CAPTCHA
captchas
indexing
information retrieval
Google
Web pages
search engines
composability
internet
Human behavior
pubcrawl
security
biblio
A Survey of Research on CAPTCHA Designing and Breaking Techniques
Submitted by grigby1 on Fri, 09/11/2020 - 10:43am
CAPTCHA
text-based
Speech recognition
image-based
image segmentation
Completely Automated Public Turing Test to Tell Computers and Humans Apart
CAPTCHA designing techniques
CAPTCHA categories
CAPTCHA breaking techniques
audio/video based
attack methods
security of data
captchas
usability
security mechanism
Google
computer science
composability
Human behavior
pubcrawl
security
1
2
3
4
5
6
next ›
last »