Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security
biblio
"IntelliCAN: Attack-resilient Controller Area Network (CAN) for secure automobiles"
Submitted by grigby1 on Thu, 02/23/2017 - 1:27pm
fault tolerance
Very large scale integration
security
pubcrawl170106
nanotechnology
mechanical engineering computing
masquerade attack
IntelliCAN
Hardware Security
Fault tolerant systems
attack-resilient controller area network
error detection
Discrete Fourier transforms
controller area networks
controller area network(CAN)
computer network security
CAN protocols
automobiles
automobile
biblio
"An Artificial Intelligence-Based Trust Model for Pervasive Computing"
Submitted by grigby1 on Thu, 02/23/2017 - 11:56am
human-like decision making
user trustworthiness
ubiquitous computing scenarios
ubiquitous computing
Trusted Computing
trust model
security
pubcrawl170105
pervasive computing
pattern classification
network interactions
naïve Bayes classifier
Itemsets
Apriori algorithm
effective trust model
Decision Making
Data mining
computers arena
computational services distribution
Computational modeling
Classification algorithms
behavioral patterns
Bayes methods
artificial intelligence-based trust model
Artificial Intelligence
biblio
"Approach to Enhancing Concurrent and Self-Reliant Access to Cloud Database: A Review"
Submitted by grigby1 on Thu, 02/23/2017 - 11:54am
encryption algorithm
storage management
Servers
self-reliant access
security
pubcrawl170105
Protected Database-as-a-Service
power station
multiple geographically distributed clients
multiple business
metadata storage
metadata
meta data
Master key
Advance Encryption Standard
encryption
Distributed databases
database-as-a-service
database management
database installation
customer services
Cryptography
confidentiality
concurrent access
concurrency (computers)
commerce
cloud database
Cloud Computing
biblio
"Mapping Security Requirements to Identify Critical Security Areas of Focus in PaaS Cloud Models"
Submitted by grigby1 on Thu, 02/23/2017 - 11:47am
Platform-as-a-Service
Software Architecture
service level objectives
security requirement mapping
security of data
Security Mappinng
security concern
security
Science of Security
pubcrawl
privacy concern
platform-as-a-service cloud models
Access Control
PaaS cloud models
PaaS cloud architectures
matrix algebra
encryption
data privacy
critical security area identification
computer architecture
Computational modeling
Cloud Computing
authentication
adaptive security mapping matrix
biblio
"Auditing Protocols for Cloud Storage: A Survey"
Submitted by grigby1 on Thu, 02/23/2017 - 11:41am
auditing protocol
Cloud Computing
cloud storage
Computational modeling
Data models
data privacy
information science
integrity
outsourcing
protocol auditing
Protocols
pubcrawl170105
Scalability
Secure
security
biblio
"Random number generation based on sensor with decimation method"
Submitted by grigby1 on Thu, 02/23/2017 - 11:39am
pubcrawl
wash-rinse-spin approach
testing random number
sensor fusion
sensor data
security
Random sequences
random sequence
random number uniform distribution
random number independence
random number generation
adversarial control
privacy
NIST
minimizing correlation
internet
Generators
decimation method
data privacy
Cryptography
cryptographic mechanisms
Correlation
biblio
"Improved Detection of 1-2-4 LSB Steganography and RSA Cryptography in Color and Grayscale Images"
Submitted by grigby1 on Thu, 02/23/2017 - 11:36am
image colour analysis
Steganography
security
RSA cryptography
RSA
public key cryptography
pubcrawl170105
pubcrawl
privacy
LSB
Image edge detection
1-2-4 LSB steganography
Image color analysis
hidden knowledge
grayscale images
Gray-scale
encryption
data privacy
Cryptography
color images
Color
biblio
"A Dynamic Supervisory Mechanism of Process Behaviors Based on Dalvik VM"
Submitted by grigby1 on Thu, 02/23/2017 - 11:34am
malware
system security sensitive behavior
system resource monitoring
system resource auditing
supervisory proces
spy privacy
smartphone security threats
smart phones
security
pubcrawl170105
private information
mobile phones
android
malicious chargeback software
Java
Humanoid robots
framework
dynamic supervisory mechanism
data privacy
Dalvik VM
Cameras
Androids
Android operating system
Android (operating system)
biblio
"Pattern classification under attack on spam filtering"
Submitted by grigby1 on Thu, 02/23/2017 - 11:26am
privacy
unsolicited e-mail
spam filtering
spam email security evaluation
spam attack scenario
security of data
security issues
Security Evaluation
security
pubcrawl
adversarial attacks
pattern classification system
pattern classification
filtering algorithms
Filtering
Electronic mail
pubcrawl170105
Classification algorithms
adversarial classification
biblio
"Dynamic Remote Attestation Based on Concerns"
Submitted by grigby1 on Thu, 02/23/2017 - 11:20am
privacy
trusted root
Trusted Computing
tree data structures
storage applications
static measure
software metrics
Software measurement
software integrity metrics
Software Architecture
security
request service software module
Remote Attestation
pubcrawl
privacy protection
Application software
operating systems
Monitoring
Merkel hash tree
load module
integrity measurement architecture
efficiency improvement
dynamic remote attestation
dynamic credible monitoring module
Data protection
concerns
computing environments
challenger relationship analysis
attestation relationship analysis
« first
‹ previous
…
406
407
408
409
410
411
412
413
414
…
next ›
last »