Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
ubiquitous computing
biblio
Automatic Mapping of Cyber Security Requirements to Support Network Slicing in Software-Defined Networks
Submitted by grigby1 on Mon, 03/05/2018 - 1:12pm
network slicing
ubiquitous networks
ubiquitous computing
standards
Software-Defined Networks
software defined networking
social lives
security related standards
security related incidents
security
Resiliency
resilience
quality of service
pubcrawl
next generation networks
next generation network management
automatic mapping
Metrics
Industries
industrial automation domain
future-proof network management
future-proof approach
future network management paradigms
dynamic networks
cyber security requirements
cyber security QoS requirements
computer security
computer network security
computer network management
composability
automation
biblio
Automatic Mapping of Cyber Security Requirements to Support Network Slicing in Software-Defined Networks
Submitted by grigby1 on Mon, 03/05/2018 - 1:11pm
network slicing
ubiquitous networks
ubiquitous computing
standards
Software-Defined Networks
software defined networking
social lives
security related standards
security related incidents
security
Resiliency
resilience
quality of service
pubcrawl
next generation networks
next generation network management
automatic mapping
Metrics
Industries
industrial automation domain
future-proof network management
future-proof approach
future network management paradigms
dynamic networks
cyber security requirements
cyber security QoS requirements
computer security
computer network security
computer network management
composability
automation
biblio
Lightweight Obfuscation Techniques for Modeling Attacks Resistant PUFs
Submitted by grigby1 on Tue, 02/06/2018 - 1:55pm
message authentication
Ubiquitous Computing Security
ubiquitous computing
Support vector machines
Scalability
Resistance
Resiliency
resilience
PUF
pubcrawl
physical unclonable functions
physical unclonable function (PUF)
neural nets
Metrics
Arbiter-PUF
machine-learning
machine learning
low-cost pervasive devices
low-cost authentication
Logic gates
lightweight obfuscation
learning (artificial intelligence)
Human Factors
Human behavior
delays
authentication
Artificial Neural Networks
biblio
A Communication Security Protocol for Ubiquitous Sensor Networks
Submitted by grigby1 on Tue, 02/06/2018 - 1:54pm
Metrics
wireless sensor networks
ubiquitous sensor networks
ubiquitous network system
Ubiquitous Computing Security
ubiquitous computing
telecommunication security
security
Scalability
Resiliency
Public key
pubcrawl
Protocols
privacy
Access Credential
Medical services
Logic gates
key exchange computation process
information technology
Human Factors
Human behavior
gateway
Cryptography
cryptographic access
communication security protocol
communication protocol
cipher content
authentication
biblio
Towards Automation in Information Security Management Systems
Submitted by grigby1 on Tue, 02/06/2018 - 1:54pm
small and medium-sized enterprises
Process Automation
pubcrawl
Resiliency
risk management
Scalability
security controls automation
security of data
security requirements
Metrics
small-to-medium enterprises
Stakeholders
standards
tools
ubiquitous computing
Ubiquitous Computing Security
workflow enactment
information protection
automated process execution
automation
context-aware ISMS
continuous risk-driven ISMS
Data protection
highly interconnected information security management
Human behavior
Human Factors
ADAMANT
information security
Information Security Management System
information security management systems
Information Security Risk Management
Information systems
ISMS related activities
ISO 27001 compliant ISMS
biblio
Ransomware: The CryptoVirus Subverting Cloud Security
Submitted by grigby1 on Tue, 02/06/2018 - 1:54pm
security
malware
Metrics
pubcrawl
Ransomware
ransomware attack
ransomware vulnerabilities
Resiliency
Scalability
IT security specialists
security effectiveness
security threat
Servers
threats
ubiquitous computing
Ubiquitous Computing Security
ubiquitous environment
vulnerabilities
cloud threat mechanisms
business enterprises
cloud
Cloud architecture
Cloud Computing
cloud network
cloud platforms
Cloud Security
cloud technology
Business
computer architecture
computer viruses
Cryptography
CryptoVirus
disparate locations
Human behavior
Human Factors
information technology
biblio
Collaborative Anomaly Detection Framework for Handling Big Data of Cloud Computing
Submitted by grigby1 on Tue, 02/06/2018 - 1:47pm
Interquartile Range (IQR)
UNSW-NB15 dataset
ubiquitous computing
security of data
Scalability
Resiliency
pubcrawl
pay-per-use based services
network observations
Metrics
Large-scale systems
Big Data
Gaussian Mixture Model (GMM)
false positive rate
dynamic distributed architecture
detection rate
data privacy
Collaborative anomaly detection framework
cloud computing environments
Cloud Computing
CADF
big data security in the cloud
biblio
Context-aware graph-based analysis for detecting anomalous activities
Submitted by grigby1 on Tue, 12/12/2017 - 1:24pm
pubcrawl
Insider Threats
maximum flow algorithm
Metrics
multimodal resources
optimisation
optimization
Organizations
policy-based governance
insider threat
query-adaptive graph-based optimization approach
Reliability
Resiliency
Support vector machines
time-dependent data
ubiquitous computing
user model mutual similarity
user profile analysis
context-dependent anomaly type
anomalous activity detection
anomalous user activity identification
Anomaly Detection
anomaly localization
anomaly occurrence
collaboration
Complexity theory
context-aware graph-based analysis
Activity Recognition
data analysis
Electronic mail
exhaustive identification
gesture recognition
graph analysis
graph theory
Human behavior
Human Factors
biblio
From Reactionary to Proactive Security: Context-Aware Security Policy Management and Optimization under Uncertainty
Submitted by grigby1 on Mon, 11/20/2017 - 12:25pm
Mobile handsets
ubiquitous computing
stochastic programming models
stochastic programming
security policy planning
security policies
security of data
security economics
reactionary security
pubcrawl
proactive security
policy-based governance
Policy
Access Control
mathematical optimization
Government
Governance
context-aware security policy management
Context-aware security
context-aware computing
Context modeling
Context
Computational modeling
collaboration
Adaptation models
biblio
A Data Hiding Approach for Sensitive Smartphone Data
Submitted by grigby1 on Tue, 09/05/2017 - 1:50pm
composability
digital signal processing
Metrics
Mobile and Wireless Security
privacy
Privacy Protections
pubcrawl
Resiliency
signal processing security
Smartphones
ubiquitous computing
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »