Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information confidentiality
biblio
OWASP Risk Analysis Driven Security Requirements Specification for Secure Android Mobile Software Development
Submitted by grigby1 on Tue, 11/17/2020 - 2:41pm
OWASP
access sensitive information
Android development
data leaks
defensive requirements analysis
development lifecycle
development stage
guided security requirement analysis
Mobile Apps
mobile apps flaws
mobile software engineers
necessary security knowledge
information confidentiality
OWASP mobile top ten risks
OWASP risk analysis driven security requirements specification
secure Android mobile software development
secure mobile SDLC
secure mobile software development education
security defects open doors
security requirements
software developers
useful mobile security guidelines
Operating systems security
software engineering
security
pubcrawl
Metrics
Resiliency
data integrity
security threats
composability
mobile computing
smart phones
malware
software development management
security of data
security vulnerabilities
SDLC
risk analysis
resilience
testing
Detectors
Mobile Applications
Banking
Android (operating system)
security holes
biblio
Study on E-government Information Security in the Era of Big Data
Submitted by grigby1 on Fri, 10/16/2020 - 11:13am
network technology defects
information management
information management departments
information security awareness
information security threats
information storage
intranets
large-scale network
management deficiency
information confidentiality
policy-based governance
proper information encryption
pubcrawl
resilience
Resiliency
set pair analysis theory
strict information management
survivability association
e-government hierarchy model
Cloud Computing
collaboration
complex system
Cryptography
Cybersecurity
data application
E-Government
E-government development
Big Data
e-government information management
e-government information security system
Electronic government
encryption
government data processing
Human behavior
identity authentication
biblio
Abstract Model of Eavesdropper and Overview on Attacks in Quantum Cryptography Systems
Submitted by aekwall on Mon, 03/30/2020 - 11:41am
promptly developed areas
document circulation
extended classification
human life
important directions
information confidentiality
information transactions
loophole of the device
mini-computer
non-coherent attack
open communication networks
cryptographic methods
quantum cryptography methods
quantum cryptography systems
quantum cryptosystems
quantum hacking
quantum key distribution equipment
reliable information security technology
reliable security
specific quantum systems
traditional cryptography methods
quantum computing security
Reliability
Computer crime
Scalability
data privacy
telecommunication security
Protocols
Resiliency
pubcrawl
composability
classification
Handheld computers
security of data
quantum cryptography
quantum computing
Predictive Metrics
information technologies
Quantum Key Distribution
quantum protocols
abstract eavesdropper model
coherent attack
commercially available quantum key distribution system