Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data protection
biblio
Data Protection in OpenStack
Submitted by grigby1 on Tue, 01/16/2018 - 5:33pm
operational cloud deployment
virtual machines
virtual machine images
storage encryption
security of data
security features
Security analysis
Scalability
Resiliency
public domain software
pubcrawl
Pervasive Computing Security
Organizations
basic security controls
OpenStack range
Open Source Software
open source cloud computing platform
Neutrons
Metrics
Human Factors
Hardware
encryption
Data Security
Data protection
cloud providers
Cloud Computing
biblio
Holistic DDoS mitigation using NFV
Submitted by grigby1 on Tue, 01/16/2018 - 5:27pm
holistic DDoS attack mitigation
virtualisation
telecommunication traffic
security
Resiliency
pubcrawl
privacy
Organizations
NFV
networking service models
network function virtualization
Metrics
Human behavior
Cloud Computing
Hardware
edge computing
distributed denial-of-service
DDoS traffic
DDoS attack mitigation
DDoS
Data protection
cyber-attack
computer network security
Computer crime
composability
biblio
Development of a mathematical model of the control beginning of DDoS-attacks and malicious traffic
Submitted by grigby1 on Tue, 01/16/2018 - 5:25pm
internet
Training
telecommunication traffic
subsequent blocking
started attack
Servers
Resiliency
pubcrawl
Network Monitoring
mixed traffic
Metrics
Mathematical model
Malicious Traffic
Algorithm design and analysis
Human behavior
DDoS-attacks
DDoS-attack
DDoS attack detection
Data protection
Cybersecurity
control beginning
computer network security
Computer crime
composability
Clustering algorithms
Classification algorithms
biblio
Privacy preserving auditing for shared data in cloud
Submitted by grigby1 on Tue, 01/16/2018 - 5:16pm
Outsourced Database Integrity
TPA
third-party auditor
Third Party Auditor (TPA)
shared data integrity verification
shared data
Servers
resource allocation
Resiliency
public verifiers
pubcrawl
privacy preserving auditing
privacy preserving
outsourcing
Cloud Computing
on-demand computing resource delivery
Metrics
group signature
encryption
Databases
data storage
Data protection
data privacy
data integrity
data centers
computer centres
composability
cloud data integrity
biblio
Automated U.S diplomatic cables security classification: Topic model pruning vs. classification based on clusters
Submitted by K_Hooper on Wed, 01/10/2018 - 10:14am
Springs
pubcrawl
Resiliency
Scalability
security
security of data
sensitive information leaks
sensitive text data
Sensitivity
protection mechanism
text analysis
text leakage
text security classification
topic model pruning
Training
untrusted channels
US government
WikiLeaks dataset
Electronic mail
automated US diplomatic cables security classification
automatic unstructured text security class detection
cyberattacks
data infrastructure protection
data leak prevention system
Data protection
DLP system
Edward Snowden incident
adversarial environment
email leakage
feature extraction
government data processing
Human behavior
Insider Threats
natural language processing
pattern classification
printers
biblio
Privacy and Security: How to Differentiate Them Using Privacy-Security Tree (PST) Classification
Submitted by grigby1 on Thu, 12/28/2017 - 12:34pm
Metrics
security of data
Science of Security
Scalability
Resiliency
pubcrawl
PST classification
privacy-security tree classification
privacy
Policy-Governed Secure Collaboration
pattern classification
authentication
Law
information system domain
information security
information privacy
Human Factors
Human behavior
Data protection
data privacy
composability
collaboration
biblio
Scalability of Cloud Based SCIT-MTD
Submitted by grigby1 on Thu, 12/28/2017 - 12:28pm
moving target defense
Web application
Virtual machining
share-nothing architecture pattern
Servers
self cleansing intrusion tolerance
security of data
security
SCIT
Scalability
Resiliency
quality attributes
pubcrawl
multiple instance system
multinode system
attack surface
malicious intrusions
load demand modeling
intrusion tolerance
internet
Data protection
cybersecurity protection
continuous rotation
computer architecture
composability
cloud infrastructure services
Cloud Computing
cloud based SCIT-MTD scalability
cloud
biblio
A Practical One-Time File Encryption Protocol for IoT Devices
Submitted by grigby1 on Tue, 12/12/2017 - 12:25pm
security issues
OTFEP
privacy issues
Protocols
pubcrawl
Resiliency
Scalability
scalable one-time file encryption protocol
secure key distribution mechanism
node scalability
security protocol
Servers
small file
specialized security requirements
stream file
system manager
third-party auditors
file encryption
cryptographic techniques
data privacy
Data protection
database
database management systems
Electronic mail
Elliptic curve cryptography
encryption
Cryptographic Protocols
file organisation
file protection
Internet of Things
IoT
IoT devices
IoT environment
Metrics
biblio
Insider Threats and Cryptographic Techniques in Secure Information Management
Submitted by grigby1 on Tue, 12/12/2017 - 12:24pm
Human behavior
unauthorized leakage
strategic data splitting
semantic analysis
secure information management
Resiliency
pubcrawl
Protocols
policy-based governance
Metrics
Insider Threats
information management security
information management
Human Factors
authorisation
enterprise management processes
Economics
data reconstruction methods
Data protection
data analysis
Cryptography
Cryptographic Protocols
cryptographic data splitting algorithms
Companies
collaboration
cognitive systems
cognitive data analysis
business data processing
biblio
Adopting Strict Content Security Policy for XSS Protection
Submitted by grigby1 on Mon, 11/20/2017 - 11:25am
Licenses
XSS protection
Web application flaw
Tutorials
security policies
security of data
script source
pubcrawl
Production
policy-based governance
Policy
collaboration
internet
Government
Governance
Google
Data protection
CSP
content-injection flaw
content security policy
Conferences
computer security
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
next ›
last »