Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
enterprise applications
biblio
Analysis of Cybersecurity Threats in Cloud Applications Using Deep Learning Techniques
Submitted by grigby1 on Wed, 02/26/2020 - 3:41pm
IDS
threat vectors
telecommunications equipment
Support vector machines
security of data
pubcrawl
privacy
neural nets
Metrics
Measurement
learning (artificial intelligence)
cloud applications
enterprise grade security applications
enterprise applications
deep neural networks
deep learning techniques
deep learning
cybersecurity threats
Cybersecurity
cloud environments
Cloud Computing
biblio
Secure Digital Service Payments using Zero Knowledge Proof in Distributed Network
Submitted by aekwall on Mon, 01/20/2020 - 11:12am
trustless network
Hash functions
initial trust setup phase
interactive zero knowledge proof
post quantum attacks
PoW
secure digital service payments
SHA3-finalists
tokenized assets
trusted third party
financial transactions
TTP
Witness Indistinguishability
Zcash
zero knowledge proof
zero knowledge proof method
ZKSNARK
ZKSTARK
zero trust
cryptocurrencies
Scalability
data confidentiality
Cryptographic Protocols
Resiliency
pubcrawl
policy-based governance
bitcoin
blockchain
security of data
smart contracts
multiparty computation
Proof-of-work
distributed network
Human Factors
blockchain ecosystem
enterprise applications
fair exchange
biblio
Spring Boot Based REST API to Improve Data Quality Report Generation for Big Scientific Data: ARM Data Center Example
Submitted by grigby1 on Fri, 03/22/2019 - 11:59am
service-oriented architecture
production-grade Spring applications
pubcrawl
public domain software
resilience
Resiliency
rest
REST service API
Scalability
Servers
popular Spring Boot java-based framework
spring boot
spring boot application
spring configuration
spring model-view-controller framework
Springs
tools
user interfaces
web application technologies
data integrity
application server
arm data center example
atmospheric radiation measurement data center
auto configuration
Big Data
big data security
computer centres
CRUD
CRUD web applications
application program interfaces
data quality report generation
Databases
enterprise applications
internet
Java
java framework
Metrics
natural sciences computing
biblio
A Multi-Layered Approach to Securing Enterprise Applications by Using TLS, Two-Factor Authentication and Single Sign-On
Submitted by grigby1 on Fri, 02/08/2019 - 3:34pm
Mobile Internet applications
two-factor authentication
two factor authentication
single sign-on capability
single sign-on authentication
Security Token
security requirements
security of data
security
pubcrawl
password
OTP mechanism
one-time passwords
One-Time Password (OTP)
MultiLayered Framework
multilayered approach
application data
mobile computing
IP networks
Internet attackers
internet
Information Security concept
information protection
information and communication technology
Human Factors
Human behavior
enterprise applications
Dogs
Computer crime
authentication application
authentication