Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data protection
biblio
Scalable QAM Modulation for Physical Layer Security of Wireless Networks
Submitted by aekwall on Mon, 03/16/2020 - 10:33am
wireless networks
Scalable Security
wireless channel
scalable quadrature modulation
scalable QAM
quadrature amplitude modulation
QAM modulation
OFDM
Internet of Things concept
FFT
connected devices
cryptographic algorithms
IoT
wireless channels
Scalability
energy consumption
physical layer security
Data protection
pubcrawl
IoT applications
IoT devices
Internet of Things
computer network security
biblio
Estimation of Information System Security Using Hybrid Simulation in AnyLogic
Submitted by aekwall on Mon, 03/09/2020 - 11:16am
Petri nets
Security Risk Estimation
perimeter protection
Object oriented modeling
information system security
hybrid simulation
discrete event simulation
deterministic and probabilistic model
context-role
Permission
security system analysis
business data processing
Human Factors
security of data
Information systems
Probabilistic logic
Mathematical model
optimisation
Data protection
optimization
Metrics
pubcrawl
Resiliency
information security
Scalability
biblio
Privacy Risk Assessment for Data Subject-Aware Threat Modeling
Submitted by aekwall on Mon, 03/09/2020 - 11:16am
data subject-aware threat modeling
Privacy Risk
privacy by design
Monte Carlo methods
GDPR
Context modeling
data flow diagram system models
data protection by design
data subject-aware privacy risk assessment model
Human Factors
General Data Protection Regulation
Monte Carlo simulations
privacy risk assessment
privacy threat modeling activities
risk estimation approach
threat modeling tool prototype
Security Risk Estimation
Threat Modeling
risk analysis
data privacy
risk assessment
risk management
Analytical models
Data protection
data flow analysis
Metrics
privacy
pubcrawl
Resiliency
Data models
security
Scalability
security of data
biblio
Multi-Level Proactive Security Auditing for Clouds
Submitted by aekwall on Mon, 03/09/2020 - 11:05am
proactive auditing
security policy verification
security of data
Security Audits
security auditing
Scalability
runtime cloud security auditing
Resiliency
pubcrawl
Cloud Computing
multilevel proactive security auditing system
Multi-Level Security
Human behavior
formal verification
Data protection
cloud tenant protection
Cloud Security
biblio
Secure Memory for Embedded Tamper-Proof Systems
Submitted by grigby1 on Mon, 03/02/2020 - 1:32pm
security of data
memory supply voltage manipulation
metastability
Metrics
protection circuitry
pubcrawl
Resiliency
Scalability
secure memory
Memory management
storage management
Tamper resistance
tamper-proof embedded systems
tamper-proof system
Tamper-Resistance
Trusted Component
Voltage measurement
Aerospace electronics
memory instability
memory data leakage protection
memory data change
memory cell circuitry
integrated circuits
Integrated circuit modeling
Human Factors
Human behavior
embedded tamper-proof systems
embedded systems
Data protection
data change scenaria
Cryptography
composability
change memory contents
biblio
Two Factor Authentication using Twofish Encryption and Visual Cryptography Algorithms for Secure Data Communication
Submitted by aekwall on Mon, 03/02/2020 - 12:25pm
alphanumeric password system
twofish encryption and visual cryptography method
Twofish encryption
two factor authentication
TEVC method
TEVC encryption algorithm
password protections
message code confirmation
Java platform
Graphical Password authentication
Graphical Password
fingerprint scan
dual authentication process
authentication method
authorisation
secure authentication
data communication
Human Factors
data visualisation
computational complexity
encryption
visual cryptography
Java
message authentication
Data protection
internet
pubcrawl
Cryptography
biblio
Self-Encrypting Deception: Weaknesses in the Encryption of Solid State Drives
Submitted by grigby1 on Mon, 02/17/2020 - 5:07pm
microsoft windows
vulnerabilities
standards
SSD
solid state drives
Software
security weaknesses
security guarantees
reverse engineering
Resiliency
resilience
pubcrawl
policy-based governance
peripheral interfaces
password
bitlocker
Metrics
internal models
Human behavior
hardware-encryption
hardware full-disk encryption
Hardware
flash memories
firmware
external models
encryption software
encryption
Data protection
Cryptography
critical security weaknesses
biblio
An Empirical Study on the Data Security and Privacy Awareness to Use Health Care Wearable Devices
Submitted by aekwall on Mon, 02/17/2020 - 2:56pm
health care wearable devices
wearables security
structural equation analysis
security practice
security knowledge
security conduct
Security Awareness
security attitude
psychological effects
private businesses
privacy awareness
physical negative effects
personal health data
patient monitoring
multilayer medical resources
medical market
security of data
health applications
psychology
medical data
National security
privacy protection
user privacy protection
health care
Data protection
privacy
pubcrawl
Human behavior
Resiliency
Data Security
Scalability
biblio
Regaining Insight and Control on SMGW-based Secure Communication in Smart Grids
Submitted by aekwall on Mon, 02/17/2020 - 2:17pm
proxy
TLS
telecommunication security
SMGW-based secure communication control
smart power grids
smart meters
smart meter gateways
smart meter gateway
Smart Grids
smart grid security
Smart Grid
security
Scalability
Resiliency
Receivers
pubcrawl
case-specific security settings
privacy
power system security
power engineering computing
policy language
performance evaluation
network servers
Metrics
Logic gates
internetworking
Internet of Things
Data protection
critical smart grid infrastructure
communication security control
communication security
communication protection
biblio
Research on SQL Injection Attack and Prevention Technology Based on Web
Submitted by grigby1 on Mon, 02/10/2020 - 11:25am
Prevention Technology
Web
user input data legitimacy
Structured Query Language
SQL injection attack
SQL injection
SQL detection
SQL
Servers
security of data
Resiliency
resilience
query processing
pubcrawl
privacy
application security risks
policy-based governance
Metrics
injection attack
Information filters
Human behavior
Databases
database security protection technology
database security attack
database query code
database management systems
Data protection
component
collaboration
B/S mode application development
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »