Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security
biblio
Policy Design Based on Risk at Big Data Era: Case Study of Privacy Invasion in South Korea
Submitted by BrandonB on Tue, 05/05/2015 - 8:24am
risk avoidance
impact level
individual ICT risk
individualism group
intensive ICT risk
Moon
personal data
privacy
privacy invasion
probability level
risk acceptance
ICT security
risk management
risk mitigation
risk transfer
security
severe ICT risk
social science perspective
South Korea
strong ICT risk
technological risk
data spill accident case analysis
Big Data
Big Data characteristics
Big Data laws
Big Data market
Big Data norms
Big Data technology
cultural types
culture type
data privacy
Accidents
data variety
data velocity
data volume
egalitarianism group
fatalism group
hierarchy group
ICT policy
ICT risk based policy design
ICT risk management
biblio
Using Security Logs for Collecting and Reporting Technical Security Metrics
Submitted by BrandonB on Tue, 05/05/2015 - 8:24am
open source technology
Workstations
technical security metric reporting
technical security metric collection
Security Metrics
security logs
security log analysis
security
Peer-to-peer computing
Big Data
Monitoring
Measurement
log analysis techniques
log analysis methods
internet
Correlation
computer network security
biblio
Information Security Maintenance Issues for Big Security-Related Data
Submitted by BrandonB on Tue, 05/05/2015 - 8:23am
information security maintenance
security-related data
security of data
security
secure infrastructure
real-time systems
IT infrastructure
ISM
information security maintenance issues
arrays
information security
Distributed databases
Data visualization
Data models
big security-related data
big data protection problem statement
Big Data
biblio
A Big Data Architecture for Large Scale Security Monitoring
Submitted by BrandonB on Tue, 05/05/2015 - 8:23am
IP networks
transport protocols
telecommunication traffic
storage management
Spark
security
scalable distributed data storage
scalable distributed data management
network traffic
network intrusion prevention
network intrusion detection
NetFlow records
Monitoring
local enterprise networks
large scale security monitoring
Big Data
HTTP traffic
honeypot data
Hadoop
forensic analysis
DNS data
distributed system
Distributed databases
Digital Forensics
Data mining
data exploitation
data correlation schemes
Correlation
computer network security
Big Data architecture
biblio
Load balancing for privacy-preserving access to big data in cloud
Submitted by BrandonB on Tue, 05/05/2015 - 8:23am
random data placement algorithm
geo-distributed cloud site
information retrieval
load balanced storage system
low-complexity algorithm
NP-hardness
ORAM algorithm
privacy preserving access
Random access memory
file servers
random processes
resource allocation
responsiveness
security
Servers
storage management
storage server
data placement problem
Cloud Computing
cloud storage
computational complexity
Conferences
data availability
data content protection
data maintenance cost reduction
data management
Big Data
data privacy
Data protection
Data Security
Distributed databases
distributed file system
encryption
file server
biblio
Automated Intrusion Response System Algorithm with Danger Theory
Submitted by BrandonB on Tue, 05/05/2015 - 8:13am
Detectors
security
real-time systems
real-time network danger evaluation equation
network security
memory detector
Mathematical model
Knowledge Discovery
immature detector
distributed computing
adaptive automated intrusion response system
danger theory
danger evaluation
computer network security
Communication networks
automated intrusion response system
artificial immune systems
artificial immune system
artificial immune
biblio
RRE: A Game-Theoretic Intrusion Response and Recovery Engine
Submitted by BrandonB on Tue, 05/05/2015 - 8:13am
RRE
Markov processes
network level game-theoretic response selection engine
network security property
network-level multiobjective response selection
network-level security metric values
networked computing systems
nonlinear inference
optimal network-level response actions
partially observable competitive Markov decision process
lower level attack consequences
security
Snort alerts
stochastic games
Subspace constraints
system-level security events
trees (mathematics)
two-player Stackelberg stochastic game
uncertainty
fuzzy logic theory
attack-response trees
automated response techniques
Boolean functions
Boolean logic
computer network security
Computers
decision theory
detection algorithms
Engines
ART
fuzzy rule set
fuzzy set theory
fuzzy system
game-theoretic intrusion response and recovery engine strategy
game-theoretic optimization process
Games
Intrusion Detection
Intrusion response systems
biblio
Security solutions for Web Service attacks in a dynamic composition scenario
Submitted by BrandonB on Tue, 05/05/2015 - 7:44am
SOAPAction spoofing
security
security solutions
service oriented architecture
service-oriented architecture
Simple object access protocol
SOA
SOAP
SOAP messages
schema validation
standards
UDDI
Web service attacks
web services
WS-Addressing spoofing
WSAS API
WSDL
XML injection
Information services
application program interfaces
authentication
authorisation
authorization
confidentiality
data integrity
dynamic composition scenario
Electronic publishing
API
integrity
internet
Lead
nonrepudiation
Protocols
SAS API
schema hardening
biblio
FlowNAC: Flow-based Network Access Control
Submitted by BrandonB on Tue, 05/05/2015 - 7:42am
authentication
authorisation
authorization
computer network security
Cryptographic Protocols
EAPoL-in-EAPoL encapsulation
flow-based network access control
FlowNAC
IEEE 802.1X
Network Access Control
Ports (Computers)
Protocols
security
Servers
software defined networking
standards
biblio
A Group File Encryption Method using Dynamic System Environment Key
Submitted by BrandonB on Tue, 05/05/2015 - 7:38am
dynamic system environment key
system environment key
Servers
security level
security
message authentication
group file encryption
GEMS
file organisation
encryption
eavesdropping attack
auditing security scheme
DRM
decryption method
Cryptography
Computers
Cloud Computing
business data processing
autocrypt
authorization
authorisation
authentication
« first
‹ previous
…
425
426
427
428
429
430
431
432
433
…
next ›
last »