Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Databases
biblio
A Method to Construct Vulnerability Knowledge Graph Based on Heterogeneous Data
Submitted by grigby1 on Tue, 10/12/2021 - 2:45pm
composability
computer security
Cyberspace
Databases
Error analysis
Knowledge engineering
Metrics
multi-source heterogeneous databases
Ontologies
power grid vulnerability
power grid vulnerability analysis
pubcrawl
Resiliency
sensors
vulnerability knowledge graph
vulnerability ontology
biblio
Research on RFID Technology Security
Submitted by grigby1 on Thu, 09/16/2021 - 2:10pm
Radio frequency identification (RFID)
security
RFIDs
RFID Vulnerability analysis
RFID security
RFID
Resiliency
resilience
radiofrequency identification
Access Control
radio frequency identification
Radio frequency
pubcrawl
Mifare card
Human behavior
encryption
Databases
authentication
biblio
Attack Graph-Based Quantitative Assessment for Industrial Control System Security
Submitted by grigby1 on Tue, 09/07/2021 - 1:56pm
industrial control
Security analysis
security
Resiliency
resilience
quantitative assessment
pubcrawl
integrated circuits
industrial control system
composability
Indexes
Graph Data Model
Databases
Data models
Critical Attack Path
Control Theory
computer science
biblio
Securing Govt Research Content using QR Code Image
Submitted by grigby1 on Tue, 08/31/2021 - 12:56pm
AES Randel
Ciphers
content
Databases
encryption
Government
Message service
pubcrawl
QR codes
QR Image
resilience
Resiliency
Secure
Servers
social networking (online)
TCP remoting
biblio
Transparent Data Encryption: Comparative Analysis and Performance Evaluation of Oracle Databases
Submitted by grigby1 on Tue, 08/31/2021 - 11:06am
pubcrawl
TDE
Software
Servers
resource management
Resiliency
resilience
relational database security
Random access memory
composability
Metrics
metadata
Human behavior
encryption
DBA
Databases
cyber-attack
Cons of Encryption
biblio
An Anomaly Detection System for the Protection of Relational Database Systems against Data Leakage by Application Programs
Submitted by grigby1 on Tue, 08/31/2021 - 11:04am
insider attacks
static analysis
Resiliency
resilience
relational database security
pubcrawl
Performance analysis
Monitoring
Metrics
Anomaly Detection
Human behavior
Hidden Markov models
Databases
database
data leakage
composability
application profile
biblio
Alphanumeric Database Security through Digital Watermarking
Submitted by grigby1 on Tue, 08/31/2021 - 11:04am
Ant colony optimization
composability
database watermarking
Databases
Human behavior
Metrics
multimedia databases
pubcrawl
relational database security
relational databases
resilience
Resiliency
reversible database watermarking
security
Software
Watermarking
biblio
A distortion-free watermarking approach for verifying integrity of relational databases
Submitted by grigby1 on Tue, 08/31/2021 - 11:03am
Metrics
Watermarking
tamper detection
Resiliency
resilience
relational databases
relational database security
Relational Database
Registers
pubcrawl
certification
integrity protection
Human behavior
Distortion-free
distortion
Databases
database watermarking
Conferences
composability
biblio
Practical Privacy Protection Scheme In WiFi Fingerprint-based Localization
Submitted by grigby1 on Tue, 08/17/2021 - 4:33pm
Metrics
wireless networks
Wireless fidelity
WiFi fingerprint localization
Servers
Secure multi-party calculation
Resiliency
resilience
pubcrawl
privacy
BayesNet
machine learning
Location Privacy in Wireless Networks
location privacy
Human behavior
Databases
data privacy
Computational modeling
Compositionality
biblio
Machine Learning Approach to Predict Computer Operating Systems Vulnerabilities
Submitted by grigby1 on Tue, 08/17/2021 - 3:56pm
microsoft windows
security
Resiliency
resilience
pubcrawl
Predictive models
predictive security metrics
Operating systems security
operating system
composability
Metrics
machine leaning
Linux Operating System Security
Linux operating system
Linux
Databases
Data mining
computer
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »