Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security and privacy
biblio
A Nobel Cryptosystem for Group Data Sharing in Cloud Storage
Submitted by grigby1 on Wed, 03/18/2020 - 11:28am
data user
Secure File Sharing
resilience
Resiliency
pubcrawl
security and privacy
private files
private data sharing
mutually established secret key
Hash Function
file identifier
encrypted file
Cryptography
data owner
cryptosystem
cloud storage
cloud service provider
Aggregates
group data sharing
storage management
Servers
data privacy
Cloud Computing
encryption
biblio
Adaptive Security and Privacy in Smart Grids: A Software Engineering Vision
Submitted by grigby1 on Mon, 03/09/2020 - 1:58pm
security requirements failures
pubcrawl
reconfiguring system controls
resilience
Resiliency
Runtime
Scalability
security
security and privacy
security requirements
Privacy Threats
security threats
Smart Grid
Smart Grid Privacy
Smart Grids
smart grids adaptive security
smart grids privacy
smart power grids
software engineering
software engineering vision
Human Factors
automating prevention
collaboration
composability
computer architecture
data privacy
energy producers
engineering adaptive security
failure analysis
Human behavior
Adaptive software
Metrics
Monitoring
NIST
policy-based governance
power engineering computing
power system security
privacy
privacy requirements failures
biblio
A Methodical Overview on Phishing Detection along with an Organized Way to Construct an Anti-Phishing Framework
Submitted by grigby1 on Tue, 11/26/2019 - 2:47pm
pubcrawl
machine learning
personal information
Phishing
phishing approaches
phishing attack
Phishing Detection
phishing Websites
phishy URL
internet
security and privacy
security attack
tools
Uniform resource locators
unsolicited e-mail
Web sites
website features
credit card details
Anti Phishing Working Group
Anti-phishing
Anti-Phishing framework
anti-phishing model
Banking
blacklisting
classification
Computer crime
account details
emails
feature extraction
Google
HTTPs
Human behavior
human factor
in-use anti-phishing tools
biblio
Research on Security and Privacy of Big Data Under Cloud Computing Environment
Submitted by grigby1 on Fri, 03/22/2019 - 11:38am
Big Data
big data security
cloud
Cloud Computing
cloud data
encryption
Metrics
pubcrawl
resilience
Resiliency
Scalability
security and privacy
storage scheme
biblio
Big IoT Data Stream Analytics with Issues in Privacy and Security
Submitted by grigby1 on Wed, 03/06/2019 - 3:26pm
IoT
pubcrawl
security and privacy
Data Analytics
stream data
big data privacy
biblio
Challenges and Preparedness of SDN-based Firewalls
Submitted by grigby1 on Mon, 01/21/2019 - 11:18am
network manageability
Vulnerability Management
virtualization privacy
surveys and overviews
software defined networking
security and privacy
sdn based firewall
Resiliency
pubcrawl
privacy
OpenFlow protocol
OpenFlow
network security
Access Control
Metrics
Human behavior
header space analysis
flow control
firewalls
data plane
data centers
data center networks
control plane
Conflict Resolution
conflict detection
composability
biblio
Ditio: Trustworthy Auditing of Sensor Activities in Mobile & IoT Devices
Submitted by grigby1 on Mon, 12/10/2018 - 10:30am
pubcrawl
composability
sensors
trustworthiness
Mobile and IoT devices
operating systems
security and privacy
profile
Farid Naït-Abdesselam
security and privacy
networking
Internet of Things
healthcare systems
Missouri
biblio
Secure and concealment in cluster based framework on vehicular networks
Submitted by grigby1 on Wed, 06/20/2018 - 11:28am
Roads
wireless sensor networks
Wireless Sensor Network
vehicular networks
Vehicular Communication
vehicular ad hoc networks
vehicular ad hoc network (VANET)
vehicular ad hoc network
VANET networks
telecommunication security
sensor nodes
Selfish node
security and privacy
security
secure concealment
Cloud Computing
Resiliency
resilience
pubcrawl
privacy
Metrics
MANET
lightweight cloud environment
Incentive scheme
embedded systems
Delay tolerant network (DTN)
Conferences
Compositionality
cluster based framework
biblio
Privacy Preserving Two-Server Diffie-Hellman Key Exchange Protocol
Submitted by grigby1 on Thu, 05/24/2018 - 11:19am
composability
Compositionality
Metrics
privacy-preserving protocols
provable security
pubcrawl
resilience
Resiliency
security and privacy
security services
« first
‹ previous
1
2
3
4
5
next ›
last »