Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data protection
biblio
imdpGAN: Generating Private and Specific Data with Generative Adversarial Networks
Submitted by aekwall on Mon, 03/29/2021 - 11:57am
Predictive Metrics
Generative Adversarial Learning
Privacy-preserving Learning
learning latent representations
learned representations
information maximizing differentially private generative adversarial network
imdpGAN
end to end framework
personally identifiable information
binary classification
face recognition
privacy protection
private data
Scalability
differential privacy
deep learning
generative adversarial networks
Generators
Training
Data protection
pattern classification
neural nets
privacy
pubcrawl
Resiliency
learning (artificial intelligence)
biblio
A Formal Model for the Automatic Configuration of Access Protection Units in MPSoC-Based Embedded Systems
Submitted by grigby1 on Mon, 03/29/2021 - 11:56am
Resiliency
MPSoC-based embedded systems
multiple processing cores
multiprocessing systems
multiprocessor system-on-chip
on-chip isolation
pubcrawl
real-time systems
resilience
model-based design
Safety
safety-critical embedded system
safety-critical software
security
security-critical embedded system
system-level isolation
system-on-chip
timing
dedicated access protection units
access permissions
access protection
access protection unit
authorisation
Code Generation
composability
configuration code
Data protection
abstract permission declarations
embedded systems
formal model
Hardware
heterogeneous system-on-chip platforms
information flow requirements
information flow tracking
internal communication links
Metrics
biblio
Enforcing Corporate Governance's Internal Controls and Audit in the Cloud
Submitted by aekwall on Mon, 03/22/2021 - 1:06pm
Compositionality
Self-protection
organizational aspects
internal controls and audit process
Internal Controls and Audit functions
integrity guarantee
ICA functions
corporate governance
cloud-based services
business organizations
privacy guarantee
auditing
encryption audits
Selective Encryption
outsourcing
security of data
Predictive Metrics
business data processing
data privacy
process control
cloud-based solutions
Data protection
pubcrawl
Resiliency
security
Organizations
encryption
data access
Cryptography
Cloud Computing
biblio
Research on Sensitivity Audit Scheme of Encrypted Data in Power Business
Submitted by aekwall on Mon, 03/22/2021 - 1:05pm
Predictive Metrics
informatization construction
known plaintext attacks
plaintext attacks
power business data sensitivity
power engineering computing
Power industry
power production
power system economics
power system security
Frequency measurement
pubcrawl
security demonstration
sensitive data audit
Sensitivity
sensitivity audit scheme
Standard Network Data Security System
standards
transparent encryption
Weight measurement
Data protection
Scalability
Resiliency
Human behavior
Business
ciphertext data
Compositionality
Cryptography
data information
Data models
Security Audits
data resource
Data Security
data security protection
data storage
decryption key
Electricity supply industry
encrypted data
encryption
encryption audits
biblio
A Novel Privacy Preserving HMAC Algorithm Based on Homomorphic Encryption and Auditing for Cloud
Submitted by aekwall on Mon, 03/22/2021 - 1:05pm
Python
hash message authentication code
HMAC
message authentication
Predictive Metrics
privacy preserving HMAC algorithm
programming
pubcrawl
Public Examine
encryption audits
Resiliency
RSA
RSA algorithm
stable audit program
third party auditor
TPA
user data
Cryptography
AES
AES algorithm
auditing
basic security threats
Cloud Computing
cloud data
Compositionality
confidentiality
user privacy in the cloud
data authentication
data integrity
data privacy
Data protection
Data uprightness
decryption
encryption
biblio
Improving Security Control of Text-Based CAPTCHA Challenges using Honeypot and Timestamping
Submitted by grigby1 on Thu, 03/18/2021 - 2:35pm
image segmentation
Web sites
Web Bots
web applications
user-friendliness
text-based CAPTCHA challenge
text analysis
segmentation technique
security of data
security mechanism
pubcrawl
optical character recognition
Multilingual CAPTCHA
internet
CAPTCHA string
Human Interaction Proof
human computer interaction
Human behavior
honeypot technique
honeypot
Hip
hidden text-boxes
deformations
Data protection
composability
captchas
CAPTCHA Usability
biblio
Analysis of the Most Common Software and Hardware Vulnerabilities in Microprocessor Systems
Submitted by grigby1 on Thu, 03/04/2021 - 2:45pm
resilience
Metrics
microcomputers
microprocessor systems
Microsoft Windows (operating systems)
network access
Production
Program processors
pubcrawl
remote attack
local computer calculation network
Resiliency
Server Message Block service
Silicon
Software Vulnerability
Transistors
WannaCry trojan encoder
Windows Operating System Security
Windows OS
encryption program
security
authorisation
composability
Computer crime
computer viruses
Computers
Cryptography
Data protection
Windows operating system
File systems
Hardware
hardware algorithm protection
hardware vulnerabilities
hardware vulnerability
information protection
information security
invasive software
biblio
Introducing Code Assets of a New White-Box Security Modeling Language
Submitted by grigby1 on Thu, 03/04/2021 - 2:35pm
Metrics
white-box security modeling language
White-box security
WB security analysis
testing
specification languages
source code (software)
software protection technologies
software protection solutions
Software
Security modeling language
reverse engineer
Resiliency
resilience
pubcrawl
White Box Security
i-WBS
Data protection
Conferences
Computer crime
Computational modeling
composability
code security
code assets
Binary codes
binary code
attacker
Analytical models
security
white box
biblio
Enhanced Privacy and Data Protection using Natural Language Processing and Artificial Intelligence
Submitted by aekwall on Mon, 02/22/2021 - 1:39pm
natural language processing
unsupervised machine learning
unlabeled domain-specific documents corpora
text analysis
Task Analysis
specific-domain knowledge data sets
sensitive information
Sensitive Data Extraction
Scalability
Resiliency
pubcrawl
privacy preservation
physical documents
expert systems
Medical services
machine learning
knowledge transfer
Human behavior
digital documents
Data protection
data privacy
data obfuscation procedures
artificial intelligence training
artificial intelligence systems
Artificial Intelligence
privacy
biblio
Cookies in a Cross-site scripting: Type, Utilization, Detection, Protection and Remediation
Submitted by grigby1 on Wed, 02/10/2021 - 1:20pm
Browsers
Cross Site Scripting
XSS
spyware
protection
mitigation
cookies
Cisco 2018
artificial intelligence techniques
cross-site scripting
classification
web applications
Cryptography
Artificial Intelligence
security vulnerabilities
Data protection
internet
Scalability
Resiliency
resilience
Human behavior
pubcrawl
security of data
encryption
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »