Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security
biblio
Genetic Hash Algorithm
Submitted by BrandonB on Wed, 05/06/2015 - 10:47am
genetic hash algorithm
Watermarking
visualization
trees (mathematics)
security
search optimization technique
image watermarking
hash visualization
Hash functions
Genetics
authentication
genetic algorithms
Fitness value
Data visualization
data hiding
data encapsulation
Cryptography
complex random generated images
Chromosome
Biological cells
biblio
Personalized authentication procedure for restricted web service access in mobile phones
Submitted by BrandonB on Wed, 05/06/2015 - 10:09am
mobile computing
web services
smart phones
Servers
security
restricted Web service access
personalized authentication procedure
performance evaluation
multilevel authentication procedure
Multi-Level Authenticatio
mobile phones
Mobile handsets
authentication
Mobile communication
malware intrusions
internet
face recognition
biometrics (access control)
biometric signature acquisition device
Biometric Recognition
biometric face recognition
biometric capture device
authorisation
biblio
A decentralized approach for security and privacy challenges in the Internet of Things
Submitted by BrandonB on Wed, 05/06/2015 - 10:06am
Information Leakage
wireless technologies
user privacy
sensitive data management
security challenges
security
public key cryptography
privacy
personal area networks
lightweight token
IoT stakeholders
IoT deployment
Internet of Things
internet
6LoWPAN
elliptic curve digital signature algorithm
ECDSA
distributed capability-based access control mechanism
distributed access control
digital signatures
data privacy
Cryptography
cryptographic primitives
computer network security
CoAP resources
authorization
authorisation
authentication
biblio
Toward Curricular Guidelines for Cybersecurity
Submitted by BrandonB on Wed, 05/06/2015 - 9:57am
curriculum
security
biblio
Harnessing the Cloud for Teaching Cybersecurity
Submitted by BrandonB on Wed, 05/06/2015 - 9:55am
cloud
Cloud Computing
computer security
Cybersecurity
long distance education
network security
security
biblio
Sustainable security advantage in a changing environment: The Cybersecurity Capability Maturity Model (CM2)
Submitted by BrandonB on Wed, 05/06/2015 - 9:48am
education
sustainable security advantage
security of data
security controls
security advantage
security
proactive security posture
privacy
Organizations
knowledge integration
capabilities
cybersecurity readiness
cybersecurity capability maturity model
critical asset protection
Context
Computer crime
CM2 model
CM2
Capability maturity model
biblio
Big data analysis system concept for detecting unknown attacks
Submitted by BrandonB on Wed, 05/06/2015 - 9:41am
future attack detection
unknown attack detection
state agencies
service destruction
security systems
security
prevention system
personal information leakage
pattern matching methods
Monitoring
large-scale system attacks
Intrusion Detection
information management
information extraction
hacking attacks
advanced persistent threat detection
detection rate
defence technologies
Data storage systems
Data models
Data mining
data handling
cyber-attacks
critical infrastructures
Computer crime
Big Data analysis techniques
Big Data analysis system
Big Data
APT detection
Alarm systems
biblio
Data Generation and Analysis for Digital Forensic Application Using Data Mining
Submitted by BrandonB on Wed, 05/06/2015 - 9:38am
firewall logs
Web browser
transactional data
storage management
security
remote system forensic
packet captures
network traffic
network traces
network forensic analysis
network attack detection
memory forensic analysis
Log Data collection
intrusion detection system
FTK 4.0
firewalls
clustering
Digital Forensics
Digital forensic tool
digital forensic application
Databases
Data visualization
data storage
Data mining
data generation
Data collection
data analysis
cyber system
cyber crime huge log data
Computers
Computer crime
biblio
Probabilistic Threat Propagation for Network Security
Submitted by BrandonB on Wed, 05/06/2015 - 9:33am
infected nodes
Upper bound
threat probabilities
security
probability
probabilistic threat propagation
Probabilistic logic
Peer-to-peer computing
network security analysis
network security
network hosts
monitored networks
malicious Web destinations
malicious nodes
internet
Blacklist
graphical modeling work
graph theory
graph analytics world
graph algorithms
forensic analysis
external Internet
Digital Forensics
cyclic propagation
computer network security
community detection
Communities
Communication networks
Botnets detection
botnet
biblio
Protection against Web 2.0 Client-Side Web Attacks Using Information Flow Control
Submitted by BrandonB on Wed, 05/06/2015 - 9:32am
Information Leakage
Web pages
Web 2.0 client-side Web attacks
Web 2.0
social networks
Servers
Semantics
security
secure browsing environment
protection systems
malicious script injection
legitimate Web sites
invasive software
internet
AJAX
Information Flow Control
IDS systems
firewalls
feature extraction
Data protection
cyber-criminals
cross-site scripting
cross-site request forgery
Computer crime
Client-side web attacks
Browsers
botnets
antivirus solutions
« first
‹ previous
…
417
418
419
420
421
422
423
424
425
…
next ›
last »