Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data collection
biblio
Mobile Crowdsourcing of Data for Fault Detection and Diagnosis in Smart Buildings
Submitted by grigby1 on Tue, 08/22/2017 - 11:31am
Buildings
crowdsourcing
Data collection
energy performance
fault detection and diagnosis
Human behavior
Metrics
multiple fault diagnosis
occupants
pubcrawl
Resiliency
biblio
Vehicular Digital Forensics: What Does My Vehicle Know About Me?
Submitted by grigby1 on Tue, 05/30/2017 - 12:38pm
manet privacy
vehicular ad hoc network
security
Scalability
Resiliency
pubcrawl
privacy
Metrics
MANET security
collaboration
infotainment systems
information forensics
Human behavior
Forensics
Data collection
computational intelligence
composability
biblio
Deploying Honeypots and Honeynets: Issue of Privacy
Submitted by grigby1 on Wed, 03/08/2017 - 2:38pm
IP networks
security
pubcrawl170114
privacy
network security
network forensics
Monitoring
legal issues
legal framework
Law
Data collection
honeypots
honeypot
honeynets
honeynet
EU law
Digital Forensics
data retention
Data processing
data privacy
biblio
Data supply chain in Industrial Internet
Submitted by grigby1 on Wed, 03/08/2017 - 2:28pm
Metals
Web Protocol
visionary data supply chain
supply chains
standards
Punching
pubcrawl170112
Protocols
Production facilities
Open Messaging Interface
business data processing
IoT
internet
industry business activities
industrial Internet application architecture
industrial internet
Data processing
Data collection
data analysis
computer architecture
biblio
Designing a database encryption technique for database security solution with cache
Submitted by grigby1 on Wed, 03/08/2017 - 2:24pm
Elliptic curves
database management software
database management systems
database security solution
Databases
DBMS
Decision Making
Elliptic curve cryptography
Elliptic Curve Cryptography(ECC)
database encryption technique
elliptical curve cryptography module
encryption
financial information
personal files
pubcrawl170112
public key cryptography
RSA
supply chain management
Data collection
cache storage
client details
company secrets
computer architecture
corporate data
corrupted data
customer service management
data availability
Advanced Encryption Standard(AES)
data consistency
data integrity
data loss
data management
data organization
data quality
data retrieval
database cache
biblio
Mobile banking and information security risks: Demand-side predilections of South African lead-users
Submitted by grigby1 on Mon, 02/27/2017 - 12:54pm
Predilections
usage control theory
UCON
TPP
tinkering process
Tinker
theory-of-technology acceptance model
theory-of-perceived risk
TAM
South African lead-users
software packages
software package
security of data
quantitative approach
pubcrawl170108
pubcrawl170107
Banking
Mobile communication
mobile commerce
mobile banking services
Mobile banking
Lead-users
Lead
information security risks
information security risk
information security
Human Factors
Gauteng province
demand-side predilections
Data collection
data analysis
Context
biblio
"Detecting Security Threats Using Mobile Devices"
Submitted by abfox on Tue, 02/14/2017 - 2:30pm
Monitoring
telecommunication traffic
Servers
security threats detection
security threat detection
security of data
security
pubcrawl170101
Ports (Computers)
performance escalation
advanced persistent threat
Mobile handsets
mobile devices
mobile computing
distributed denial-of-service
DDoS Attack
Data collection
covering array
combinatorial testing
advanced persistent threats
biblio
Data Generation and Analysis for Digital Forensic Application Using Data Mining
Submitted by BrandonB on Wed, 05/06/2015 - 10:38am
firewall logs
Web browser
transactional data
storage management
security
remote system forensic
packet captures
network traffic
network traces
network forensic analysis
network attack detection
memory forensic analysis
Log Data collection
intrusion detection system
FTK 4.0
firewalls
clustering
Digital Forensics
Digital forensic tool
digital forensic application
Databases
Data visualization
data storage
Data mining
data generation
Data collection
data analysis
cyber system
cyber crime huge log data
Computers
Computer crime
biblio
Model-based control of device replication for trusted data collection
Submitted by BrandonB on Wed, 05/06/2015 - 9:58am
Hierarchical Control
voting protocol mechanisms
trusted data collection
Trusted Computing
Situational Assessment
Sensor Replication
security of data
security attack
quality of service
QoS
Protocols
malicious devices
Adaptive Fault-tolerance
Frequency modulation
device replication autonomic management
delays
data corruptions
Data collection
black-box
batteries
bandwidth attack
Bandwidth
Attacker Modeling
algorithm correctness
biblio
Privacy and Big Data
Submitted by BrandonB on Tue, 05/05/2015 - 9:29am
anonymization
Big Data
data analysis
Data collection
Data integration
data privacy
data retention
de-identification
Government
privacy
Public policy
security
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »