Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
server
biblio
Comparative Analysis of Secured Transport Systems using RFID Technology for Schools
Submitted by grigby1 on Fri, 03/17/2023 - 12:51pm
GPS
server
RFIDs
RFID tags
Limiting
Human Factors
RFID
ML
IoT
Schedules
real-time systems
Safety
Resiliency
resilience
pubcrawl
Servers
security
biblio
Defences Against web Application Attacks and Detecting Phishing Links Using Machine Learning
Submitted by aekwall on Fri, 07/01/2022 - 9:47am
Classification algorithms
Chained Attacks
Web application
PHP and MySQL
long short term memory networks
logistic regression
Apache access Logs
server
application security
support vector machine
Random Forest
Phishing
Support vector machines
attacks
cyber security
Training data
machine learning
Resiliency
Scalability
pubcrawl
machine learning algorithms
Training
deep learning
biblio
Predicting Cyber Attacks in a Proxy Server using Support Vector Machine (SVM) Learning Algorithm
Submitted by aekwall on Wed, 03/23/2022 - 9:21am
Predictive Metrics
vector
support
server
proxy
machine
learning
Computers
programming
security
Prediction algorithms
DoS
composability
Resiliency
pubcrawl
Servers
Support vector machines
Task Analysis
biblio
A Solution of Text Based CAPTCHA without Network Flow Consumption
Submitted by grigby1 on Thu, 03/18/2021 - 2:35pm
information processing
verification logic
text-based CAPTCHA
text based CAPTCHA
telecommunication traffic
software engineering
Servers
server
security risks
security
pubcrawl
network flow
information processing security issues
authorisation
Human behavior
high-security text-based CAPTCHA solution
formal verification
encryption
distributed information processing
composability
client-server systems
client malicious programs
client
captchas
CAPTCHA technology
biblio
HTTP security headers analysis of top one million websites
Submitted by grigby1 on Fri, 11/20/2020 - 2:15pm
web security
security of data
Security Policies Analysis
server
set-cookie
strict- transport-security
tools
top one million websites survey
transport protocols
Uniform resource locators
security
web security policies
Web sites
websites
World Wide Web
www subdomain
X-content-type
X-frame-options
X-XSS-protection
X.509 Certificate
HTTP/2
Charge coupled devices
collaboration
content security policy
content-security-policy
Databases
HTTP headers
HTTP response headers analysis
HTTP security headers analysis
HTTP strict transport security
Alexa top one million list
HTTPs
HTTPS requests
hypermedia
internet
policy-based governance
Protocols
pubcrawl
redirections
referrer-policy
biblio
IoT Server Availability Considering DDoS-Attacks: Analysis of Prevention Methods and Markov Model
Submitted by grigby1 on Wed, 12/18/2019 - 2:47pm
Metrics
technical diagnostics
storage management
Software
smart business center diagnostics
Servers
server
SBC server protection
SBC network
Resiliency
resilience
Random access memory
pubcrawl
prevention methods
network servers
authentication
Markov processes
Markov model
IoT server availability
Internet of Things
Industrial Internet of Things
Human behavior
encryption
dependability
DDoS-attacks
DDoS-attack
DDoS Attack Prevention
Databases
computer network security
composability
biblio
Secured aerial photography using Homomorphic Encryption
Submitted by grigby1 on Mon, 12/04/2017 - 12:58pm
image encryption
Servers
server
Scientific Computing Security
Resiliency
public key cryptosystem
public key cryptography
pubcrawl
photography
NTRU
multiagent system
Metrics
Image quality
aerial photography
image capture
Homomorphic encryption
encryption
drones
Drone
concatenation
Compositionality
Cloud Computing
cloud
Amazon EC2 cloud server
aerial photography security
biblio
A survey of distributed denial of service attack
Submitted by grigby1 on Mon, 11/20/2017 - 12:05pm
Interconnected Systems
video surveillance
UDP
TCP
Servers
server
resources
Resiliency
pubcrawl
Protocols
Metrics
IP networks
botnets
information security
Human Factors
Human behavior
Floods
distributed denial of service attack
DDoS attack detection strategies
DDoS
computer network security
Computer crime
Cloud Computing
biblio
Design and Implementation of Kerberos Using DES Algorithm
Submitted by grigby1 on Thu, 05/18/2017 - 2:19pm
client
DES (Data Encryption Standard)
Human behavior
KDC (Key Distribution Center)
Kerberos
Metrics
pubcrawl
Resiliency
server
biblio
Towards robust, scalable and secure network storage in Cloud Computing
Submitted by BrandonB on Wed, 05/06/2015 - 2:11pm
security of data
networking
on-demand access
operating system
pay per use model
privacy
proactive security
RAID
remote application access
remote service access
robust scalable secure network storage
network storage architecture
server
Servers
service availability
service outsourcing
storage management
ubiquitous computing
ubiquitous next generation information technology architecture
virtualisation
Virtualization
data integrity
authentication
Availability
built in security
client overhead
Cloud Computing
cloud computing environment
cloud service provider
Compliance
computer architecture
confidentiality
adaptive security
data privacy
Data Security
data sharing
data storage
Distributed databases
information centric security
integrity
internet
middleware
1
2
next ›
last »