Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security
biblio
Challenges to network forensics in cloud computing
Submitted by grigby1 on Tue, 03/07/2017 - 12:36pm
challenges to network forensics in cloud
Cloud architecture
Cloud Computing
Computational modeling
computer architecture
data outsourcing
data privacy
digital control
Digital Forensics
network forensics
network forensics in cloud
outsourcing
pubcrawl170109
security
Software Architecture
telecommunication traffic
biblio
Security in Cloud-Based Cyber-Physical Systems
Submitted by grigby1 on Tue, 03/07/2017 - 12:33pm
Cloud Computing
cloud-based cyber-physical systems
Computer crime
cyber-physical systems
Data processing
information security
modern production devices
physical interaction
Production
pubcrawl170109
security
security of data
sensors
smart mobility services
biblio
On resilience of Wireless Mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications
Submitted by grigby1 on Tue, 03/07/2017 - 12:33pm
network layer attacks
wireless sensor networks
wireless mesh routing protocol
wireless mesh networks
wireless mesh network
Wireless communication
security
Routing protocols
Routing Protocol
Routing
pubcrawl170109
Ambient Assisted Living
IoT-based ambient assisted living applications
Internet of Things
eHealthcare
DoS attacks
Denial of Service attacks
denial of service
data packet delivery ratio
computer network security
Computer crime
biblio
MLDED: Multi-layer Data Exfiltration Detection System
Submitted by grigby1 on Tue, 03/07/2017 - 12:32pm
forensic readiness data exfiltration system
tuning
standards
sensitive data exfiltration detection
security
pubcrawl170109
plain ASCII text
PDF files
Organizations
organization information system
multilayer data exfiltration detection system
MLDED system
keyword labeling
keyword extraction
information protection strategy
Algorithm design and analysis
Digital Forensics
data theft
data loss
data leakage threats
data leakage
data hiding
Data Exfiltration
Data Breach
Cryptography
crime ware services
computer network security
Computer crime
Complexity theory
Communication networks
biblio
Literature review of different contention of E-commerce security and the purview of cyber law factors
Submitted by grigby1 on Tue, 03/07/2017 - 12:32pm
Information systems
security privacy policy
security
pubcrawl170109
privacy
legislation
jurisdiction
IT
internet
information technology
Business
electronic commerce
e-consumer protection
E-Commerce Security
e-commerce law
data privacy
cyberspace security
cyber-crime activity
cyber law factor
Computer crime
biblio
XSSDM: Towards detection and mitigation of cross-site scripting vulnerabilities in web applications
Submitted by grigby1 on Tue, 03/07/2017 - 12:31pm
Reactive power
XSSDM
Web Application Security
Web application
static taint analysis
static analysis
standards
source code (software)
source code
Servers
Sensitivity
security vulnerability
security
Computer crime
pubcrawl170109
program diagnostics
pattern matching technique
pattern matching
internet
HTML
cyber crime
cross-site scripting vulnerability detection
Cross-site scripting (XSS)
context-sensitive approach
Context Sensitive
Context
biblio
A review on recent phishing attacks in Internet
Submitted by grigby1 on Tue, 03/07/2017 - 12:31pm
phishing attacks
Web sites
URL
unsolicited e-mail
Uniform resource locators
textual analysis
text analysis
Tabnapping
socially engineered messages
security
pubcrawl170109
phishing Website
phishing emails
Browsers
malware code
malware
invasive software
internet
illegal activity
email messages
email classification
Electronic mail
cyber-crime
Computer crime
Companies
biblio
A PSNR-Controllable Data Hiding Algorithm Based on LSBs Substitution
Submitted by grigby1 on Mon, 02/27/2017 - 11:56am
mobile devices
Steganography
steganalysis
sensors
security
Resistance
Resiliency
pubcrawl170107
PSNR-controllable data hiding algorithm
PSNR
personal privacy
PCDH
Algorithm design and analysis
LSB substitution
information security
Image coding
encoding
decoding algorithms
Decoding
Control Theory
computational complexity
computation complexity
Complexity theory
biblio
Identifying interdependencies using attack graph generation methods
Submitted by grigby1 on Mon, 02/27/2017 - 11:55am
risk management
Interdependency
Internet of Things
interoperability
power system faults
Power system protection
pubcrawl170107
pubcrawl170108
risk assessment methods
interdependencies modelling
Safety-Critical Systems
security
Security Metrics
security of data
system complexity
vulnerabilities identification
Wireless communications
distributed schema
attack graphs
Cascading Failures
collaboration
Collaborative Infrastructures
communication assets
complex interconnected networks
Complexity theory
critical infrastructures
attack graph generation methods
e-health
generation complexity
graph theory
heterogeneous collaborative infrastructures
industrial manufacturing automation
information and communication technologies
interdependencies identification
biblio
Forecasting severity of software vulnerability using grey model GM(1,1)
Submitted by grigby1 on Mon, 02/27/2017 - 11:55am
Predictive models
Vulnerability
software vulnerability forecasting severity
software security level
software security
software risk level
software reliability
Software
severity
security of data
security
pubcrawl170107
grey model
prediction
Measurement
Mathematical model
grey theory
grey systems
grey system theory
GM(1
forecasting theory
forecasting
Data models
« first
‹ previous
…
404
405
406
407
408
409
410
411
412
…
next ›
last »