Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Google
biblio
Dangers and Prevalence of Unprotected Web Fonts
Submitted by grigby1 on Fri, 04/17/2020 - 9:46am
Metrics
Web sites
Web Browser Security
Web
unprotected Web fonts
subresource integrity mechanism
stylesheets
SRI support
software vendors
software packages
software package
security-conscious users
Resiliency
resilience
pubcrawl
online front-ends
attack surface
maliciously modified version
malicious script
malicious font
internet
integrity
Human Factors
Human behavior
Google
fonts
fingerprint identification
Cryptography
cryptographic fingerprints verification
Compositionality
composability
CDNs
biblio
SERS: A Security-Related and Evidence-Based Ranking Scheme for Mobile Apps
Submitted by aekwall on Mon, 04/13/2020 - 9:05am
Security by Default
User Ratings
trust
subjective logic
static taint analysis
smart phones
smart mobile devices
SERS
sentiment analysis
security-related internal aspect
security-related comments
security-related and evidence-based ranking scheme
security of data
app distribution platforms
security
Scalability
Resiliency
ranking
pubcrawl
mobile computing
Mobile Apps
Measurement
Google PlayStore
Google
Databases
Data mining
biblio
A Proposed Virtual Private Cloud-Based Disaster Recovery Strategy
Submitted by grigby1 on Mon, 03/02/2020 - 12:34pm
Organizations
virtual private cloud-based disaster recovery strategy
traditional disaster recovery
System recovery
security
Resiliency
resilience
Recovery Time Objective (RTO)
recovery time objective
Recovery Point Objective (RPO)
recovery point objective
pubcrawl
Planning
back-up procedures
information technology
information security
Google
disasters
Disaster Recovery (DR)
Disaster Cycle
Computational modeling
Cloud-Based Disaster Recovery
Cloud Computing
business continuity issues
business continuity
biblio
Two-factor authentication framework for private cloud
Submitted by aekwall on Mon, 03/02/2020 - 11:25am
frequently used solution
two factor authentication
Web authentication form
unique code
two-factor authentication framework
two-factor authentication
TOTP user
TOTP authentication forms
TOTP
TFA
simple user authentication
public cloud
private cloud solutions
private cloud
Password authentication
OpenStack cloud
security
cloud providers
banking Websites
authentication module
additional field
Human Factors
password
message authentication
authentication
social networking (online)
Mobile handsets
Google
pubcrawl
Software
authorisation
Cloud Computing
biblio
Influence of Internet Protocols and CDN on Web Browsing
Submitted by grigby1 on Tue, 02/18/2020 - 10:56am
transport protocols
public websites
QUIC
QUIC/UDP protocols
resilience
Resiliency
Scalability
TLS/TCP protocols
tool Web View
Protocols
Web
Web browsing
Web Caching
Web contents
Web ecosystem
Web pages
Web servers
Web sites
HTTP/2 protocols
Alexa websites
CDN
CDN delivery
content delivery network
French Agency
french websites
Google
HTTP/2
pubcrawl
Human behavior
internet
Internet protocols
Loading
long-term measurement campaign
Metrics
monitoring website
Optical fiber networks
biblio
A Methodical Overview on Phishing Detection along with an Organized Way to Construct an Anti-Phishing Framework
Submitted by grigby1 on Tue, 11/26/2019 - 2:47pm
pubcrawl
machine learning
personal information
Phishing
phishing approaches
phishing attack
Phishing Detection
phishing Websites
phishy URL
internet
security and privacy
security attack
tools
Uniform resource locators
unsolicited e-mail
Web sites
website features
credit card details
Anti Phishing Working Group
Anti-phishing
Anti-Phishing framework
anti-phishing model
Banking
blacklisting
classification
Computer crime
account details
emails
feature extraction
Google
HTTPs
Human behavior
human factor
in-use anti-phishing tools
biblio
Certificate Transparency Using Blockchain
Submitted by grigby1 on Wed, 10/23/2019 - 11:39am
Protocols
web domains
web communication
telecommunication security
SSL-TLS protocols
SSL Trust Models
Servers
Scalability
safe distributions
Resiliency
resilience
public logs
public keys
public key cryptography
Public key
pubcrawl
authorisation
PKI
Metrics
IBM Hyperledger Fabric blockchain platform
hyperledger
Human behavior
Google
Computed tomography
certification authorities
certification
certificate validation process
certificate transparency
certificate revocation mechanism
certificate authorities
Browsers
blockchain
biblio
Google’s new curriculum teaches kids how to detect disinformation
Submitted by willirn1 on Wed, 09/11/2019 - 9:34am
Articles of Interest
C3E 2019
Cognitive Security
Cognitive Security in Cyber
fake news
Google
Cognitive Security
Articles of Interest
C3E 2019
biblio
Identification of Distributed Malware
Submitted by grigby1 on Mon, 06/10/2019 - 12:59pm
public domain software
malware writers
Metrics
mobile computing
Mobile handsets
multiple anti-virus apps
open source platform
personal data
privacy
pubcrawl
malware prevention
Resiliency
security
Servers
simple worms
smart phones
smartphone revolution
sophisticated DDOS
static analysis
technological complexities increase
generic viruses
Android malware
Android system
attackers
botnets
computer malware
computer viruses
distributed direction
distributed malware
fully functional portable computers
android
Google
graph matching algorithm
graph theory
Human behavior
inholding multiple applications
Labeling
malware
Malware Analysis
malware detection
biblio
Trust4App: Automating Trustworthiness Assessment of Mobile Applications
Submitted by aekwall on Mon, 03/11/2019 - 9:38am
smart phones
privacy
privacy health
pubcrawl
publicly available factors
risky apps
security
security assessment
security of data
potentially sensitive data
tools
transparent trustworthiness score
trust
Trust4App framework
Trusted Computing
trustworthiness
trustworthiness indicators
user reviews
Google
Apple App store
application marketplaces
automatic trustworthiness frameworks
automating trustworthiness assessment
composability
comprehensive trustworthiness assessment
Data collection
data privacy
actionable trustworthiness assessment
Google Play store
holistic personalized trustworthiness score
intuitive trustworthiness assessment
malicious developers
malware
Mobile Applications
mobile computing
Mobile Security
« first
‹ previous
1
2
3
4
5
6
next ›
last »