Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security
biblio
Evaluation of Web Security Mechanisms Using Vulnerability amp; Attack Injection
Submitted by BrandonB on Thu, 04/30/2015 - 2:06pm
security
Web application security mechanism evaluation
vulnerability-&-attack injector tool
vulnerability injection methodology
VAIT
TV
SQL Injection attacks
SQL
software fault tolerance
Software
security of data
attack injection methodology
review and evaluation
Probes
intrusion detection system
Internet applications
internet
Input variables
Fault injection
fault diagnosis
Educational institutions
Databases
biblio
Analysis of Field Data on Web Security Vulnerabilities
Submitted by BrandonB on Thu, 04/30/2015 - 2:03pm
security of data
XSS
Web security vulnerabilities
Web application vulnerabilities
vulnerability scanners
static code analyzers
SQL injection
SQL
source code (software)
source code
software faults
software fault tolerance
Software
security patches
attack injectors
security mechanisms
security
review and evaluation
realistic vulnerability
languages
Java
Intrusion Detection Systems
Internet applications
internet
field data analysis
code inspectors
Blogs
Awards activities
biblio
A unified model for cherishing privacy in database system an approach to overhaul vulnerabilities
Submitted by BrandonB on Thu, 04/30/2015 - 2:01pm
Inference Detection
security policy
security of data
security
privacy cherished database architecture model
intrusion tolerance subsystem
intrusion thwarting
Intrusion Detection
inference thwarting
data privacy
Handheld computers
Decision support systems
database system privacy
database static protection
Database Security Configurations
Database Security
database management systems
biblio
A unified model for cherishing privacy in database system an approach to overhaul vulnerabilities
Submitted by BrandonB on Thu, 04/30/2015 - 2:01pm
Inference Detection
security policy
security of data
security
privacy cherished database architecture model
intrusion tolerance subsystem
intrusion thwarting
Intrusion Detection
inference thwarting
data privacy
Handheld computers
Decision support systems
database system privacy
database static protection
Database Security Configurations
Database Security
database management systems
biblio
A unified model for cherishing privacy in database system an approach to overhaul vulnerabilities
Submitted by BrandonB on Thu, 04/30/2015 - 2:01pm
Inference Detection
security policy
security of data
security
privacy cherished database architecture model
intrusion tolerance subsystem
intrusion thwarting
Intrusion Detection
inference thwarting
data privacy
Handheld computers
Decision support systems
database system privacy
database static protection
Database Security Configurations
Database Security
database management systems
biblio
Intrusion tolerance mechanisms using redundant nodes for wireless sensor networks
Submitted by BrandonB on Thu, 04/30/2015 - 1:54pm
re-route detection
wireless sensor networks
wireless networks
telecommunication traffic
telecommunication security
telecommunication network routing
telecommunication channels
security
Routing
redundant nodes
redundant node
all-channel analyzer
Protocols
Monitoring
intrusion tolerance mechanisms
intrusion tolerance architecture
intrusion tolerance
Intrusion Detection
expert intrusion detection analysis system
data traffic detection
data communication
biblio
Identity-Based Distributed Provable Data Possession in Multicloud Storage
Submitted by BrandonB on Thu, 04/30/2015 - 1:37pm
bilinear pairings
Cloud Computing
Computational modeling
distributed computing
Distributed databases
identity-based cryptography
Indexes
Protocols
provable data possession
security
Servers
biblio
Authenticated Data Structures, Generically
Submitted by BrandonB on Thu, 04/30/2015 - 1:31pm
authenticated data structures
Cryptography
programming languages
security
biblio
A secure and unclonable embedded system using instruction-level PUF authentication
Submitted by BrandonB on Thu, 04/30/2015 - 1:26pm
Benchmark testing
delays
embedded systems
field programmable gate arrays
instruction-level PUF authentication
microprocessor chips
processor execution environment
secure embedded system
security
unclonable embedded system
Xilinx Spartan6-based FPGA board
biblio
Data security protocol for cloudlet based architecture
Submitted by BrandonB on Thu, 04/30/2015 - 1:20pm
encryption
unauthorized user
security
resource-rich computer
mobile devices
mobile computing
Mobile communication
mobile cloud computing technology
mobile cloud computing
internet
Cloud Computing
distributed cloud architecture
data security protocol
Cryptographic Protocols
Computers
computer architecture
cloudlet based architecture
cloudlet
cloud storage
« first
‹ previous
…
430
431
432
433
434
435
436
437
438
…
next ›
last »