Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security
biblio
Threats in end to end commercial deployments of Wireless Sensor Networks and their cross layer solution
Submitted by BrandonB on Tue, 05/05/2015 - 9:15am
security goals
WSNSP
wireless sensor networks
wireless sensor network service providers
Wireless Sensor Network
web services
Web servers
threats
telecommunication security
standard security documents
sensor web portals
sensor portal
attacks
security attacks
security
Portals
Mobile communication
end to end commercial deployments
Department of Homeland Security
Department of Defense
cross layer solution
cross layer security solution
commercial
Availability
biblio
A MIMO cross-layer precoding security communication system
Submitted by BrandonB on Tue, 05/05/2015 - 9:13am
MIMO cross-layer precoding security communication system
upper layer
telecommunication security
security
random array
precoding
physical layer security system
physical layer security cross-layer security
Physical layer
modulation
Bit error rate
MIMO cross-layer precoding secure communications
MIMO communication
MIMO
higher layer cryptography
Educational institutions
eavesdropper's channel
CSI
Cryptography
biblio
Ethos' Deeply Integrated Distributed Types
Submitted by BrandonB on Tue, 05/05/2015 - 8:55am
Robustness
type system
type safety
type constraints
Trusted Computing
Semantics
security-sensitive bugs
security
safety-critical software
Safety
runtime-agnostic Ethos
Runtime
deeply integrated distributed types
Protocols
programming languages
program debugging
operating systems (computers)
operating system approach
operating system
multilingual Ethos
Language-theoretic security
language runtime
Kernel
Ethos operating system
biblio
Current issues and challenges on cyber security for industrial automation and control systems
Submitted by BrandonB on Tue, 05/05/2015 - 8:35am
control systems
Cyber incident
cyber security
cyber threat
IACS
IEC standards
industrial automation and control systems
industrial control
malware
production engineering computing
Protocols
security
security of data
Vulnerability
biblio
Security with privacy - A research agenda
Submitted by BrandonB on Tue, 05/05/2015 - 8:35am
PE applications
social media
security of data
security
Research Agenda
privacy-preserving data management
privacy-preserving data analysis
privacy-enhancing techniques
privacy
PII
personally identifiable information
PE techniques
Big Data
outsourced data
Media
encryption
Electronic mail
data sources
data privacy
cloud environment
Cloud Computing
Cancer
business intelligence
big data analysis
biblio
Towards adapting metamodelling technique for database forensics investigation domain
Submitted by BrandonB on Tue, 05/05/2015 - 8:34am
DBMS
software engineering domain
Servers
security
Organizations
model
metamodelling technique
Metamodelling
Metamodel
Forensics
Digital Forensics
Complexity theory
DBF metamodel
DBF complex knowledge processes
Database systems
database system integrity protection
database system confidentiality protection
database management systems
database forensics investigation domain
Database forensic investigation
Database forensic
data privacy
biblio
Trust and Big Data: A Roadmap for Research
Submitted by BrandonB on Tue, 05/05/2015 - 8:31am
Big Data
Cloud Computing
computer science
Conferences
Context
Data mining
data-driven approaches
focal issues
FORSEC project
next generation online trust
reputation
reputation-based trust management
security
trust
trust-related data
Trusted Computing
biblio
Privacy and Big Data
Submitted by BrandonB on Tue, 05/05/2015 - 8:29am
anonymization
Big Data
data analysis
Data collection
Data integration
data privacy
data retention
de-identification
Government
privacy
Public policy
security
biblio
A Survey of Intrusion Detection Systems in Wireless Sensor Networks
Submitted by BrandonB on Tue, 05/05/2015 - 8:28am
mobile agents
WSN
wireless sensor networks
Wireless Sensor Network
Unified modeling language
telecommunication security
security
research issues
Monitoring
Ad hoc networks
mobile ad hoc networks
mobile ad hoc network
MANET
Intrusion Detection Systems
Intrusion Detection
IDS guidelines
IDS
biblio
Analysis of Cloud Computing Performance, Scalability, Availability, amp; Security
Submitted by BrandonB on Tue, 05/05/2015 - 8:28am
Availability
Cloud Computing
Computer hacking
internet
parallel computing
parallel processing
Scalability
security
security of data
virtual machine
virtual machines
« first
‹ previous
…
424
425
426
427
428
429
430
431
432
…
next ›
last »