Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data protection
biblio
Build Trust in the Cloud Computing - Isolation in Container Based Virtualisation
Submitted by grigby1 on Fri, 11/03/2017 - 10:31am
pubcrawl
virtualisation
Virtual machining
virtual machines
Trusted Computing
trust relationship
trust layer
stress test
security system
Scalable Security
scalable computing resources
Scalability
role-based access control model
RBAC model
RBAC
Access Control
Kernel
IT ecosystems
isolation benchmarking tools
isolation benchmarking
Data Security
Data protection
Containers
container protection
Container isolation
container based virtualisation
cloud users
cloud service providers
Cloud Computing
authorisation
biblio
CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data
Submitted by grigby1 on Fri, 11/03/2017 - 10:27am
Intrusion Detection
user file encryption
user data
Resiliency
ransomware behavior analysis
ransomware attacks
Ransomware
pubcrawl
Monitoring
Metrics
malware
invasive software
Intrusion Detection Systems
antivirus
Human behavior
file decryption
Entropy
encryption
early-warning detection system
Data protection
CryptoLock
Cryptography
composability
behavioral analysis
behavior indicators
arrays
biblio
RamCrypt: Kernel-based Address Space Encryption for User-mode Processes
Submitted by grigby1 on Tue, 05/30/2017 - 11:46am
composability
data lifetime
Data protection
linux operating systems security
memory disclosure attacks
Metrics
physical attacks
pubcrawl
RAM encryption
Resiliency
biblio
Silent Shredder: Zero-Cost Shredding for Secure Non-Volatile Main Memory Controllers
Submitted by grigby1 on Thu, 05/18/2017 - 2:28pm
Data protection
Hardware Security
keywords encryption
phase-change memory
pubcrawl
remanence
Resiliency
biblio
Data-Centric Access Control for Cloud Computing
Submitted by grigby1 on Mon, 04/24/2017 - 10:42am
Big Data
big data privacy
big data security
big data security in the cloud
Cloud Computing
composability
Data protection
Human behavior
Information Centric Networks
Information Flow Control
pubcrawl
Resiliency
Scalability
biblio
On implementing a client-server setting to prevent the Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext (BREACH) attacks
Submitted by grigby1 on Thu, 04/20/2017 - 11:43am
Dictionaries
Bandwidth
BREACH attack
BREACH attacks
browser reconnaissance and exfiltration via adaptive compression of hypertext attacks
Browsers
client-server setting
client-server systems
Compression
Compression algorithms
confidentiality
Cryptographic Protocols
Cryptography
data compression
Data protection
DEFLATE compression algorithm
Web traffic
encoding
encryption
fixed-dictionary compression
high-value secrets protection
HTTP compression
Network reconnaissance
plaintext
pubcrawl
Resiliency
security
security model
Servers
SSL/TLS
TLS protocol
transport protocols
biblio
Transparent authentication systems for mobile device security: A review
Submitted by grigby1 on Wed, 03/08/2017 - 1:46pm
multimodal
user re-authentication
usability
transparent authentication systems
transparent authentication
text messages
task re-authentication
sensors
sensitivity application level
sensitive data
security improvement
pubcrawl170115
point-of-entry authentication
personal information
performance evaluation
authentication
mobile user
Mobile Security
Mobile handsets
mobile devices
mobile device security
mobile computing
Mobile communication
keystroke
Fingerprint recognition
Data protection
contact lists
biometric
behavioural profiling
authorisation
biblio
Distinguishable de-identified faces
Submitted by grigby1 on Wed, 03/08/2017 - 1:13pm
Active appearance model
Brightness
Clustering algorithms
Data protection
distinguishable de-identified faces
face recognition
Facial features
k-anonymity approach
k-same de-identified video
privacy
privacy protection
pubcrawl170113
testing
biblio
Facial expression preserving privacy protection using image melding
Submitted by grigby1 on Wed, 03/08/2017 - 1:13pm
image melding-based method
visualization
Visual privacy protection
Target recognition
social networking services
pubcrawl170113
privacy
image recognition
image quality degradation
Avatars
image context
facial regions
Facial features
facial expression preserving privacy protection
facial expression
Facebook
face recognition
Data protection
biblio
Towards Improving Web Attack Detection: Highlighting the Significant Factors
Submitted by grigby1 on Tue, 03/07/2017 - 12:41pm
internet
XSS
Web attack detection
Web application vulnerabilities
Web Application Security
Web application protection
Uniform resource locators
session management
pubcrawl170109
Monitoring
IP networks
Intrusion Detection
broken authentication
injection
information management
information access
hackers
e-business
denial of service attack
Data protection
cyber attack
cross-site scripting
Computer crime
Buffer overflows
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
next ›
last »