Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data protection
biblio
Testing Techniques and Analysis of SQL Injection Attacks
Submitted by grigby1 on Thu, 05/24/2018 - 11:08am
SQL Injection vulnerability
resilience
Resiliency
security of data
security systems
security testing
sensitive data
sensitive information
SQL
SQL injection
SQL Injection attacks
SQL injection problems
relational databases
SQL query
testing techniques
three-tier-architecture
traditional security policies
user interfaces
users
Web application vulnerabilities
web applications
Web sites
website
handy interface
attackers
Cogeneration
commonly used Web application attacks
composability
Data protection
database-driven Web applications
DH-HEMTs
different security systems
effective data protection systems
good target
governmental organizations
attack
Human behavior
integrated circuits
internet
Knowledge engineering
Metrics
penetration testing technique
program testing
proper data protection
pubcrawl
relational database security
biblio
Distributed Intrusion Detection Using Mobile Agents in Wireless Body Area Networks
Submitted by grigby1 on Mon, 04/02/2018 - 11:55am
security of data
patient monitoring
privacy
pubcrawl
real-time patient monitoring
resilience
Resiliency
Scalability
security
patient data
sensors
telecommunication security
Wearable devices
wearables security
Wireless body area networks
Wireless communication
wireless medical sensors
wireless sensor networks
Human behavior
body area networks
body sensor networks
Communication system security
Data protection
distributed intrusion detection
distributed mobile agent-based intrusion detection system
health care
healthcare systems
autonomous mobile agents
implanted medical devices
learning (artificial intelligence)
local network level anomaly detection
machine learning algorithms
medical healthcare applications
mobile agents
patient care
biblio
BigCrypt for Big Data Encryption
Submitted by grigby1 on Mon, 04/02/2018 - 11:49am
Pretty Good Privacy technique
zero tolerance security
symmetric key encryption
storage management
Software
Servers
RSA
Rijndael
Resiliency
resilience
Receivers
Public key
pubcrawl
probability
probabilistic approach
private information
Asymmetric Encryption
Metrics
Human behavior
Hadoop
Hacking
encryption
Data protection
Cryptography
Compositionality
cloud storage
Cloud Computing
BigCrypt
big data encryption
Big Data
asymmetric encryption technique
biblio
Foresighted Deception in Dynamic Security Games
Submitted by grigby1 on Mon, 04/02/2018 - 11:40am
optimization
Stochastic processes
stochastic games
stochastic deception game
security protection
security of data
security
SDG
Resiliency
resilience
pubcrawl
policy-based governance
Artificial Neural Networks
myopic deception
Metrics
learning (artificial intelligence)
Iterative methods
iterative algorithm
Information systems
Heuristic algorithms
Games
dynamic security games
Data protection
biblio
Deep Web Online Anonymity
Submitted by grigby1 on Mon, 04/02/2018 - 11:30am
resilience
Internet user
Logic gates
Metrics
online anonymity
personal information sharing
privacy
privacy protection
pubcrawl
internet
Resiliency
social hub
social media
social networking (online)
Terrorism
user data
Vulnerabilities of Social Media
cyber space
anonymity
Browsers
composability
Computer crime
Computer hacking
Computers
crime
Cryptography
Anarchy
Cyberspace Anonymity
Data protection
deep web
Government
hidden encrypted network
Human behavior
information privacy
biblio
End-To-End Security Architecture for Federated Cloud and IoT Networks
Submitted by grigby1 on Mon, 03/19/2018 - 12:49pm
network federation mechanisms
virtualisation
Software Architecture
smart Internet of Things
SFC
service function chaining
sensors
security policy enforcement
security of data
security
Resiliency
resilience
pubcrawl
NFV
network slices protection
network function virtualisation
actuator security
Metrics
IoT networks
Internet of Things
Human behavior
heterogeneous platforms
end-to-end security architecture
Data protection
Data Analytics
data analysis
computer architecture
composability
Communication networks
clouds
cloud networks
Cloud Computing
biblio
Users' Identification through Keystroke Dynamics Based on Vibration Parameters and Keyboard Pressure
Submitted by grigby1 on Tue, 02/27/2018 - 1:39pm
sensors
keystroke dynamics
message authentication
Metrics
multilayer perceptrons
perceptron algorithms
probability density
pubcrawl
quadratic form networks
keystroke analysis
special sensors
time characteristics
Time-frequency Analysis
unauthorized access
user identification
vibration parameters
Vibrations
wide artificial neural networks
error probabilities
Bayes methods
Bayes rule
biometrics (access control)
complementary parameters
Correlation
correlation between biometrie attributes
Data protection
dynamics
authorisation
error statistics
Human behavior
Human Factors
keyboard pressure parameters
keyboard vibration
Keyboards
Keys pressure
biblio
Hail to the Thief: Protecting data from mobile ransomware with ransomsafedroid
Submitted by grigby1 on Wed, 02/21/2018 - 12:47pm
Ransomware
Metrics
Mobile communication
mobile computing
mobile devices
Mobile handsets
mobile ransomware
performance evaluation
pubcrawl
RANSOMSAFEDROID prototype
malware
resilience
Resiliency
Scalability
secure local persistent partition
sensitive data
software performance evaluation
storage management
Trusted Computing
TrustZone based backup service
data recovery
android encryption
Android ransomware dissemination
Androids
ARM TrustZone extension
back-up procedures
backup tools
Cryptography
data encryption
Data protection
Android (operating system)
device filesystem
Hardware
Human behavior
Human Factors
Humanoid robots
i.MX53 development board
incremental backups
invasive software
biblio
Pick location security: Seamless integrated multi-factor authentication
Submitted by grigby1 on Thu, 02/15/2018 - 10:48am
pick location security
Mobile Applications
mobile computing
mobile device
Mobile handsets
Multi Factor Authentication
Multi-factor authentication
multifactor authentication
multifactor authentication system
Metrics
pubcrawl
resilience
Resiliency
seamless integrated multifactor authentication
sensitive data protection
Servers
user mobile device location
global positioning system (GPS)
authentication method
authorisation
Bluetooth
Bluetooth device
browser
Data protection
device Bluetooth key
Global Positioning System
authentication
Human behavior
human factor
Human Factors
identity theft
impersonation
location
message authentication
biblio
AI-supported Decision-making Under the General Data Protection Regulation
Submitted by grigby1 on Thu, 02/15/2018 - 10:39am
resilience
privacy
Artificial Intelligence
pubcrawl
Resiliency
Human behavior
Scalability
Data protection
human factor
Human Factors
algorithmic transparency
automated decision-making
GDPR
right to explanation
AI
« first
‹ previous
…
11
12
13
14
15
16
17
18
19
next ›
last »