Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security
biblio
Malicious behavior in online social network
Submitted by grigby1 on Thu, 02/23/2017 - 11:17am
content
estimation
malicious behavior
online social network
OSN
OSNs
post
privacy
Protocols
security
security of data
social networking (online)
Suspensions
Twitter
user
pubcrawl170105
biblio
"Cost and Communication Efficient Auditing over Public Cloud"
Submitted by grigby1 on Thu, 02/23/2017 - 11:16am
pubcrawl
third party authentication system
third party auditor
Storage technology
storage management
storage collection
software performance evaluation
Servers
security of data
security
Secure storage
auditing
Protocols
Memory
database
data storage security
data privacy
data acquisition security
cost efficient auditing
communication efficient auditing
cloud data security
Cloud Computing
biblio
"DIVa: Decentralized identity validation for social networks"
Submitted by grigby1 on Thu, 02/23/2017 - 11:05am
learning (artificial intelligence)
user profile attribute
social networking (online)
Social network services
security
real-world OSN dataset
pubcrawl170105
Privacy-preserving Learning
privacy preservation
privacy
online social network
mining technique
association rules
fine-grained community-aware correlation
Ensemble Learning
DIVa
Decentralized Online Social Networks
decentralized learning approach
decentralized identity validation
data privacy
Data mining
Correlation
Computational modeling
Community-aware Identity Validation
biblio
"Securing the Clustered Database Using Data Modification Technique"
Submitted by grigby1 on Thu, 02/23/2017 - 11:02am
Distributed databases
weka tool
standards
security of data
security
pubcrawl
Privacy preserving protocols
pattern clustering
online media
Iris
information protection
clustering
Distributed Database
distributed clustered database environments
database clustering
Data protection
pubcrawl170105
data privacy
data modification
Data mining
computer science
biblio
"De-identification of Textual Data Using Immune System for Privacy Preserving in Big Data"
Submitted by grigby1 on Thu, 02/23/2017 - 10:45am
immune systems
textual data de-identification
text analysis
specific immune system algorithm
security
pubcrawl170105
privacy preserving
privacy
Informatics
Big Data
Immune system
de-identification
data privacy
Data models
Data mining
Cryptography
CLONALG
biblio
"Towards dependable CPS infrastructures: Architectural and operating-system challenges"
Submitted by abfox on Tue, 02/14/2017 - 1:33pm
advanced persistent threat
computer architecture
CPS infrastructure
cyber-physical system
cyber-physical systems
Kernel
Linux
operating systems (computers)
operating-system level
pubcrawl170101
rudimentary solution
security
security of data
Virtual private networks
biblio
"Detecting Security Threats Using Mobile Devices"
Submitted by abfox on Tue, 02/14/2017 - 1:30pm
Monitoring
telecommunication traffic
Servers
security threats detection
security threat detection
security of data
security
pubcrawl170101
Ports (Computers)
performance escalation
advanced persistent threat
Mobile handsets
mobile devices
mobile computing
distributed denial-of-service
DDoS Attack
Data collection
covering array
combinatorial testing
advanced persistent threats
biblio
"Scalable Security Event Aggregation for Situation Analysis"
Submitted by abfox on Tue, 02/14/2017 - 12:43pm
scalable security event aggregation
large-scale data processing
on-demand aggregation
parallel processing
pattern clustering
performance evaluation
periodic aggregation
pubcrawl170101
query languages
query support
large-scale data analysis
SEAS-MR
security
security analytics
Security event aggregation
security event aggregation system over MapReduce
sensors
situation analysis
stealthy hacking processes
big-data security analytics
advanced persistent threats
Aggregates
Analytical models
APT
attack methodologies
Big Data
big-data analytics
big-data computing
advanced persistent threat
Computer crime
Computers
cyber-attacks
data analysis
Data processing
Database languages
Hadoop cluster
high-level query languages
biblio
"WAP: Models and metrics for the assessment of critical-infrastructure-targeted malware campaigns"
Submitted by abfox on Tue, 02/14/2017 - 12:37pm
Markov Models
WAP
Topology
system survivability
Survivability
Steady-state
soft impacts
security community
security
scanning nodes
rejuvenation
quarantine
pubcrawl170101
probability
network topology
Mathematical model
advanced persistent threat
malware infections
malware
invasive software
infection probability
four-node topology
false positives
false negatives
early malware detection
critical infrastructures
critical infrastructure sectors
Critical Infrastructure Protection
coordinated massive malware campaign assessment
contagion probability
Analytical models
advanced persistent threats
biblio
"A novel simulation approach for fault injection resistance evaluation on smart cards"
Submitted by grigby1 on Tue, 02/14/2017 - 12:15pm
fault simulation
Software
smart cards
smart card source code
Smart card
Side-channel attack
side-channel analyses
security
Registers
pubcrawl170102
Physical attack
Object oriented modeling
multiple fault attacks
instruction skip
Hardware
generic fault injection simulation tool
advanced encryption standard
fault injection simulations
fault injection resistance evaluation
Fault injection
embedded systems
embedded fault simulator
EFS
data modification
Data models
Cryptography
control flow fault models
complex smart card systems
combined attack
backward analyses
AES
« first
‹ previous
…
407
408
409
410
411
412
413
414
415
…
next ›
last »