Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security
biblio
A secured distributed OCR system in a pervasive environment with authentication as a service in the Cloud
Submitted by BrandonB on Thu, 04/30/2015 - 1:18pm
multiprocessing
vocabularies
security of data
security issue
security
secured distributed OCR system
recognition process
pervasive environment
Pattern recognition
Optical character recognition software
optical character recognition
natural language processing
authentication
mobile environment
mobile computing
Mobile communication
Distributed OCR system
distributed computing technologies
distributed Arabic optical character recognition
Computational modeling
cloud computing technology
Cloud Computing
authentication as a service
biblio
Security applications challenges of RFID technology and possible countermeasures
Submitted by BrandonB on Thu, 04/30/2015 - 1:17pm
Product Code
wireless technology
warfare machinery
telecommunication security
security
RFID tag
RFID reader
RFID
radiofrequency identification
product code technology
antennas
Management
ISO standards
Intelligent systems
integrated circuits
information technology
information and communication technology
ICT
frequency allocation
Communication channels
biblio
A Finite State Hidden Markov Model for Predicting Multistage Attacks in Cloud Systems
Submitted by BrandonB on Thu, 04/30/2015 - 1:16pm
risk model
multistaged cloud attack
occurrence probability
Prediction algorithms
prediction of multi-staged attacks
Predictive models
probability
risk analysis
risk assessment
multistage attacks
security
security of data
security risk
security technology
security threat
sensors
Vectors
early warning alerts
adaptive risk approach
auto response controller
autonomous cloud intrusion detection framework
Cloud Computing
cloud resources
cloud systems
Correlation
DARPA 2000 dataset
ACIDF
early warnings
finite state hidden Markov model
finite state hidden Markov prediction model
Hidden Markov models
HMM
intrusion prevention
LLDDoS1.0 attack
biblio
Proposal of a secure, deployable and transparent middleware for Internet of Things
Submitted by BrandonB on Thu, 04/30/2015 - 1:16pm
Internet of Things
Zigbee
Transparent Middleware
TLS
smart objects
security of data
security architecture
security
secure middleware
protection measures
OAuth
middleware
IoT transparent middleware
AES
electronic data interchange
deployable middleware
data privacy
data integrity
data exchange service privacy
data exchange service integrity
data exchange service confidentiality
data exchange service authenticity
computer architecture
authorization
authentication
biblio
Sustainable security advantage in a changing environment: The Cybersecurity Capability Maturity Model (CM2)
Submitted by BrandonB on Thu, 04/30/2015 - 1:15pm
education
sustainable security advantage
security of data
security controls
security advantage
security
proactive security posture
privacy
Organizations
knowledge integration
capabilities
cybersecurity readiness
cybersecurity capability maturity model
critical asset protection
Context
Computer crime
CM2 model
CM2
Capability maturity model
biblio
M2M technologies: Enablers for a pervasive Internet of Things
Submitted by BrandonB on Thu, 04/30/2015 - 1:15pm
Communications technology
Conferences
context-awareness
European FP7 project BUTLER
Internet of Things
Internet of Things security
M2M service layer standardization
M2M technology
pervasive Internet of Things
security
Smart homes
Telecommunication standards
ubiquitous computing
Wireless communications
biblio
Swiper: Exploiting Virtual Machine Vulnerability in Third-Party Clouds with Competition for I/O Resources
Submitted by BrandonB on Thu, 04/30/2015 - 1:13pm
Cloud Computing
delays
IP networks
security
Synchronization
Throughput
Virtualization
biblio
HVSTO: Efficient privacy preserving hybrid storage in cloud data center
Submitted by BrandonB on Thu, 04/30/2015 - 1:12pm
privacy preserving hybrid storage
Virtualization
virtualisation
Virtual machining
virtual machines
virtual machine storage
solid state disk
service infrastructure
Servers
security
privacy preserving shared storage system
Cloud Computing
large-scale cloud data center
Indexes
I/O latency performance improvement
hybrid VM storage
HVSTO
distributed structure
distributed storage
data privacy
Conferences
computer centres
biblio
Monitoring Translation Lookahead Buffers to Detect Code Injection Attacks
Submitted by BrandonB on Thu, 04/30/2015 - 1:10pm
hackers
translation lookahead buffers monitoring
TLB
system monitoring
security
memory pages identification
legitimate code injection attack
invasive software
Handheld computers
blocks malicious injected code activation
external I/O operations
Decision support systems
data execution prevention
Computer crime
code injection attack detection
Code injection
Buffer storage
biblio
Analysis of Monolithic and Microkernel Architectures: Towards Secure Hypervisor Design
Submitted by BrandonB on Thu, 04/30/2015 - 1:09pm
microkernel architectures
XEN
virtualization platform
virtualisation
Virtual machining
Virtual machine monitors
security tradeoffs
security of data
security
secure hyper visor design
networking
monolithic hyper visor architectures
monolithic architectures
monolithic architecture
monitoring interface
Monitoring
application program interfaces
microkernel architecture
micro kernel hyper visor architectures
micro architecture
management API
Kernel
hypervisor security
Hyper-V
hyper visor security
hyper calls
Hardware
ESXi
computer architecture
Cloud Computing
attack surface
« first
‹ previous
…
431
432
433
434
435
436
437
438
439
…
next ›
last »