Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data protection
biblio
Security Domain for the Sensor Nodes with Strong Authentication
Submitted by aekwall on Mon, 12/07/2020 - 12:24pm
security domain
military communication
mobile radio
neural style transfer
Predictive Metrics
processing power
pubcrawl
Resiliency
Scalability
military applications
security in IoT
sensor node resources
sensory data
tpm
Trusted Platform Module
trusted platform modules
Wireless communication
wireless sensor networks
Data protection
authorisation
composability
cooperating mobile sensor nodes
cryptographic protection
Cryptography
cyber-physical system security
data exchange
data link layer
authentication
data source authentication
data transmission security
domain member
energy resources
Internet of Things
IoT solutions
Logic gates
biblio
Graph Mining-based Trust Evaluation Mechanism with Multidimensional Features for Large-scale Heterogeneous Threat Intelligence
Submitted by aekwall on Mon, 11/23/2020 - 11:38am
Data mining
trust-aware threat intelligence sharing platform
trust-aware intelligence architecture model
TISP
intelligence feature extraction
heterogeneous threat intelligence
GTTI
graph mining
cyber threat intelligence sharing platforms
human trust
Human behavior
trust evaluation mechanism
trust evaluation
security of data
Data protection
Databases
standards
graph theory
pubcrawl
feature extraction
Trusted Computing
security
malware
Organizations
IP networks
biblio
Analysis of key Factors for Organization Information Security
Submitted by grigby1 on Fri, 11/20/2020 - 2:26pm
Organizations
User training
User awareness
Training
Standards organizations
Security Policies Analysis
security of data
security culture
pubcrawl
policy-based governance
outsider attack
Data protection
organization information security
organisational aspects
insiders misuse
information security system
information security structure
Information Security Culture
information security
information protection
Human Factors
biblio
Enhancing Security and Privacy of Next-Generation Edge Computing Technologies
Submitted by aekwall on Mon, 11/16/2020 - 2:57pm
attack surface area
Resilient Security Architectures
system security manager
Security Micro-architecture
reputational penalties
raw confidential data
next-generation edge computing technologies
Internet-of-Things service architectures
financial penalties
edge security
device level attacks
Data protection
data confidentiality breach
Cloud to Edge
IoT
Active Security
cyber resilience
Embedded System
IoT architecture
edge computing
GDPR
pubcrawl
Resiliency
Internet of Things
data privacy
Data Security
computer network security
biblio
Completeness Integrity Protection for Outsourced Databases Using Semantic Fake Data
Submitted by aekwall on Mon, 11/16/2020 - 1:10pm
database management systems
semantic fake data
range query
outsourced databases
Order Preserving Encryption
data integrity problem
data completeness
CPDB
Completeness Protected Database
completeness integrity protection
Outsourced Database Integrity
Outsourced Database
outsourcing
Semantics
Cloud Computing
Data protection
Databases
query processing
Metrics
composability
pubcrawl
Resiliency
data integrity
data privacy
cloud storage
encryption
Cryptography
Servers
biblio
Using of an anonymous communication in e-government services: In the prevention of passive attacks on a network
Submitted by grigby1 on Fri, 10/16/2020 - 11:22am
government data processing
telecommunication security
security
Resiliency
resilience
Receivers
pubcrawl
Protocols
policy-based governance
passive attacks prevention
networking
network attacks
Monitoring
anonymous communication
Electronic government
e-government services
E-Government
digital participation
Delta
Data protection
Cybersecurity
communication technologies
Communication networks
commerce
collaboration
auctions
biblio
An approach to Privacy on Recommended Systems
Submitted by aekwall on Mon, 10/12/2020 - 11:31am
user security
Expert Systems and Privacy
users personal information
referral systems
recommended systems
privacy protection techniques
online companies
website
expert systems
Europe
recommender systems
user privacy
Human Factors
security
data privacy
Companies
social networks
Data protection
internet
social networking (online)
Facebook
privacy
pubcrawl
Human behavior
History
Scalability
biblio
Rethinking Location Privacy for Unknown Mobility Behaviors
Submitted by aekwall on Mon, 09/28/2020 - 12:02pm
blank-slate models
Computing Theory and Privacy
Zirconium
unknown mobility
sporadic hardwired models
Quantifying privacy
profile estimation-based LPPM
privacy properties
nonsporadic location privacy scenarios
mobility patterns
Mobility Models
mechanism design
LPPM design
location privacy-preserving mechanisms
location privacy service
location privacy protections
Scalability
blank-slate approach
design phase
location privacy
Training data
data privacy
testing
Training
Data protection
privacy
pubcrawl
Human behavior
Resiliency
Data models
mobile computing
biblio
Optically Interrogated Unique Object with Simulation Attack Prevention
Submitted by aekwall on Mon, 09/21/2020 - 3:47pm
analogue measurement
confinement
UNO
unique photo-luminescence properties
unique object
simulation attacks
simulation attack protection
simulation attack prevention
simulation attack
semiconductor quantum dots
Quantum dots
Quantum Confinement UNO responds
physical object
photoluminescence
photoconductive cells
Nonlinear optics
security of data
absorption
light sources
Computer simulation
Adaptive optics
Cameras
resilience
quantum computing
cyber-physical systems
Entropy
privacy
Data protection
composability
pubcrawl
Resiliency
biblio
Enhanced Honey Encryption Algorithm for Increasing Message Space against Brute Force Attack
Submitted by grigby1 on Fri, 09/04/2020 - 3:24pm
Human Factors
brute force attacks
user data protection algorithm
message transmission
message space limitation problem
message space limitation
honeywords generation method
honey encryption algorithm
distribution transforming encoder
distribution probability theory
Distribution functions
discrete distribution function
cumulative distribution function
CDF
Brute Force Attack
policy-based governance
Cryptography
encoding
password
Databases
Web sites
Force
Data protection
Decoding
collaboration
pubcrawl
probability
Data Security
honey encryption
unauthorized access
authorisation
encryption
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »