Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security
biblio
Static and dynamic malware behavioral analysis based on arm based board
Submitted by grigby1 on Wed, 03/08/2017 - 1:38pm
information system unauthorized use attempt detection
World Web application
static malware behavioral analysis
security
pubcrawl170114
network security
microprocessor chips
malicious activity detection
malicious activity analysis
invasive software
internet
ARM based board
honeypot engineering
honeypot
honeynet
HoneyD
Glasstopf
dynamic malware behavioral analysis
Dionaea
computer network security
CCFIS software
CCFIS sensor
biblio
Deploying Honeypots and Honeynets: Issue of Privacy
Submitted by grigby1 on Wed, 03/08/2017 - 1:38pm
IP networks
security
pubcrawl170114
privacy
network security
network forensics
Monitoring
legal issues
legal framework
Law
Data collection
honeypots
honeypot
honeynets
honeynet
EU law
Digital Forensics
data retention
Data processing
data privacy
biblio
Security function virtualization in software defined infrastructure
Submitted by grigby1 on Wed, 03/08/2017 - 1:38pm
SAVI SDI testbed
Whales
VNF
virtualized network function
virtualisation
software defined networking
software defined infrastructure
Software
Servers
security solution
security function virtualization
security attack
security
Bandwidth
pubcrawl170114
OPEX
network intrusion detection and prevention
IP networks
Inspection
honey-pot
DPI system
deep packet inspection system
computer network security
capital and operational expense
CAPEX
biblio
Challenges of Cloud Computing amp; Big Data Analytics
Submitted by grigby1 on Wed, 03/08/2017 - 1:38pm
AaaS
Big Data
Big Data Analytics
Cloud Computing
data analysis
Distributed databases
File systems
Hadoop
HDFS
Honey Pot Nodes
manufacturing
Map Reduce
Organizations
pubcrawl170114
security
biblio
The Honey Community: Use of Combined Organizational Data for Community Protection
Submitted by grigby1 on Wed, 03/08/2017 - 1:38pm
Honey Pot
would-be attackers
US military infrastructure
US CYBERCOM
United States
security of data
security
pubcrawl170114
Ports (Computers)
organisational aspects
multiorganization concept
Monitoring
honeypots
honeynets
Cities and towns
honey net
honey community
Government
geographic boundary
fictitious community
DHS
Cyberdefense
cyber frontier
critical infrastructures
critical cyber infrastructure
community protection
Communities
combined organizational data
biblio
Detecting untestable hardware Trojan with non-intrusive concurrent on line testing
Submitted by grigby1 on Wed, 03/08/2017 - 1:32pm
manufacturing testing
untestable hardware trojan
Trojan horses
security
Radiation detectors
pubcrawl170112
nonintrusive concurrent on line testing
Monitoring
microprocessor chips
built-in self-test
manufacturing stage
manufacturing cycle
integrated circuit testing
HT
Hardware
Europe
circuit geometrical characteristics
chip supply chain
biblio
Building an Open Identity Platform for India
Submitted by grigby1 on Wed, 03/08/2017 - 1:31pm
internet
vendor neutrality
unique identity project
technology platform
technology architecture
supply chains
security of data
security
pubcrawl170112
open systems
open standards
open source components
open identity platform
Aadhaar authentication service
India
design thinking
data centers
computer centres
computer architecture
Buildings
biometrics (access control)
biometric identity system
authentication
architecture
Aadhaar system
biblio
Framework Building and Application of the Performance Evaluation in Marine Logistics Information Platform in Taiwan
Submitted by grigby1 on Wed, 03/08/2017 - 1:31pm
security
marine logistics information platform
MTNet
NiceShipping
Performance
performance evaluation
pubcrawl170112
Safety
safety-snd-technology construct
marine information systems
service construct
shipper
supply chains
systematic instrument
Taiwan
TradeVan
Transportation
forwarder
analytic network process
ANP
charge construct
consignee
container yard
containerisation
customer broker
Decision Making
analytic hierarchy process
freight information platform
Information systems
interdependent criteria
logistics data processing
Logistics Information Platform
Marine
marine engineering
biblio
Secure object tracking protocol for Networked RFID Systems
Submitted by grigby1 on Wed, 03/08/2017 - 1:30pm
security
protocol
Protocols
pubcrawl170112
PUF
radiofrequency identification
radiofrequency identification technology
RFID
secure object tracking protocol
privacy
security protocol description language
SPDL model
supply chains
telecommunication security
tracker
unclonable
visibility
networked RFID system
cryptographic primitive
Cryptographic Protocols
Diffie-Hellman algorithm
distributed system
injection of fake objects
IoT
lawful business operation
Mathematical model
automated claim verification tool Scyther
non-repudiation
NRS
NRS system security
object traceability
object tracking
object visibility
physically unclonable function
biblio
Vulnerability analysis related to extraordinary events in power systems
Submitted by grigby1 on Wed, 03/08/2017 - 1:30pm
power system faults
Vulnerability
security
risk analysis
Risk
pubcrawl170112
power system vulnerability
power system simulation
power system reliability
Companies
power system
Power supplies
operating states
Meteorology
fault diagnosis
Extraordinary events
emergency preparedness
critical contingencies
« first
‹ previous
…
401
402
403
404
405
406
407
408
409
…
next ›
last »