Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data protection
biblio
A Novel Moving Target Defense Technique to Secure Communication Links in Software-Defined Networks
Submitted by aekwall on Mon, 09/09/2019 - 9:47am
secure communication links
moving target defense (MTD)
MTD model
MTD-based security model
network architecture
Network Control
network device
network intruders
novel moving target defense technique
SDN security model
secure communication
message transmission
security solution
sensitive data leakages
Software-defined networking (SDN)
Switches
transmitted messages
user identities
user privacy protection
work-in-progress research
Predictive Metrics
OpenFlow
IP networks
Receivers
security
computer network management
Data models
Resiliency
pubcrawl
Routing
Data protection
software-defined networking
computer network security
Scalability
network management
Software-Defined Networks
moving target defense
centralized orientation
communication environment
communication links
Computer Network Attacks
computer networking
biblio
Covert Communication Under Channel Uncertainty and Noise Uncertainty
Submitted by grigby1 on Thu, 09/05/2019 - 10:25am
low probability of detection communication
user privacy protection
uncertainty
Throughput
telecommunication security
signal transmission
Signal to noise ratio
Scalability
resilience
receive SNR
Rayleigh fading channel
Rayleigh channels
Probability density function
noise uncertainty
noise power
average probability
Gain
fading channels
error statistics
eavesdropper
Data protection
covert throughput loss
covert throughput gain
covert communication
covert channels
Compositionality
channel uncertainty
channel gain
Channel estimation
average probability of detection error
biblio
Vulnerability Analysis of Content Management Systems to SQL Injection Using SQLMAP
Submitted by aekwall on Mon, 02/25/2019 - 10:39am
tools
program testing
pubcrawl
Resiliency
security vulnerability
SQL
SQL injection
SQLI
SQLi vulnerabilities
SQLMAP
privacy
Vulnerability
Vulnerability Analysis
vulnerability scanner
Web application
web applications
Web sites
websites
WordPress
Drupal website pages
Computer hacking
content management
content management systems
Cybersecurity
data confidentiality
data integrity
Data protection
Databases
Computer crime
Human behavior
internet
Joomla website pages
LAMP server
Metrics
Nikto
Penetration Testing
policy-based-governance
biblio
LipPass: Lip Reading-based User Authentication on Smartphones Leveraging Acoustic Signals
Submitted by grigby1 on Mon, 01/21/2019 - 11:28am
privacy protection
learning (artificial intelligence)
lip movement patterns
lip reading-based user authentication system
LipPass
Lips
message authentication
mobile computing
pattern classification
Human behavior
pubcrawl
replay attacks
Resiliency
smart phones
Smartphones
spoofer detectors
support vector machine
Support vector machines
biometric-based authentication
Acoustic signal processing
acoustic signals
Acoustics
audio signal processing
authentication
authorisation
binary classifiers
binary tree-based authentication
Acoustic Fingerprints
build-in audio devices
composability
Data protection
deep learning-based method
Doppler effect
Doppler profiles
feature extraction
biblio
A privacy-aware distributed software architecture for automation services in compliance with GDPR
Submitted by grigby1 on Mon, 01/21/2019 - 11:17am
privacy-aware software architecture
human-centric automation
human-machine collaboration
Law
legal regulation
legislation
Metrics
privacy
privacy breach protection
Privacy policy analysis for digital ecosystems
privacy-aware distributed software architecture
human behaviour analysis
pubcrawl
Resiliency
robots
secure communication
Security and Privacy in Digital Ecosystems
Software Architecture
virtualisation
virtualization privacy
virtualization techniques
distributed processing
authorisation
authorization
automation
automation services
Automation systems
composability
Cryptography
data breaches
Data protection
Databases
ART
distributes services
encryption
end-to-end encryption
EU citizens
factory automation
factory domain
GDPR compliance
General Data Protection Regulation
Human behavior
biblio
mHealth: A Privacy Threat Analysis for Public Health Surveillance Systems
Submitted by grigby1 on Wed, 11/14/2018 - 12:18pm
Mobile Health Data Collection Systems
threat analysis
surveillance
security of data
security
Scalability
public surveillance
public healthcare
public health surveys
Public Health Surveillance Systems
pubcrawl
privacy impact assessment methodology
privacy
primary healthcare
PIA
national-level databases
comprehensive privacy threat analysis
mobile computing
mHealth data collection system
mhealth
medical computing
MDCS
Human Factors
health care
GeoHealth
expert systems
data security issues
data quality
Data protection
data privacy
Data collection
biblio
A data protection model for fog computing
Submitted by grigby1 on Fri, 10/26/2018 - 3:45pm
fog-based privacy-aware role based access control
security of data
security
Scalability
Resiliency
region-based trust-aware model
RBTA model
pubcrawl
Mobility
IoT
Internet of Things
FPRBAC
Access Control
fog security
fog location
Fog computing
edge computing
Data Security
data protection model
Data protection
Data models
Computational modeling
Cloud Computing
biblio
A noise parameter configuration technique to mitigate detour inference attack on differential privacy
Submitted by grigby1 on Fri, 09/28/2018 - 10:58am
inference attack
Scalability
Resiliency
pubcrawl
Probability distribution
privacy protection
privacy preserving technique
privacy
noise parameter configuration method
Mathematical model
linear regression
attribute correlation
Human behavior
differential privacy method
differential privacy
detour inference attack mitigation
Databases
data utility
Data protection
data privacy
Correlation
composability
biblio
Differential privacy-based data de-identification protection and risk evaluation system
Submitted by grigby1 on Fri, 09/28/2018 - 10:58am
Human behavior
value added analysis
Synthetic Dataset
Scalability
risk evaluation system
Resiliency
query processing
pubcrawl
privacy-sensitive data
privacy protection issues
native differential privacy
Big Data
differential privacy-based data de-identification protection
differential privacy
de-identification
data query
Data protection
data privacy
Data mining
data disclosure estimation system
data de-identification process
composability
biblio
A Privacy Preserving Model for Energy Internet Base on Differential Privacy
Submitted by grigby1 on Fri, 09/28/2018 - 10:57am
Monitoring
user behavior privacy
Sensitivity
Scalability
Resiliency
pubcrawl
privacy preserving model
privacy preserving data release
privacy preserving data mining
privacy preserving
privacy
power engineering computing
nonintrusive load monitoring
Non-intrusive Load Monitoring
NILM
Algorithm design and analysis
Load management
Human behavior
Exponential distribution
energy Internet privacy protection
energy internet
electrical data use analysis
differential privacy
Data Security
Data protection
data privacy
Data mining
data availability
composability
batteries
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
…
next ›
last »