Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security issues
biblio
A Secure Fog-Cloud Based Architecture for MIoT
Submitted by aekwall on Mon, 01/20/2020 - 11:53am
medical data
Temperature sensors
Software Architecture
security of data
security issues
secure fog-cloud based architecture
Scalability
Resiliency
pubcrawl
Monitoring
MIoT devices
MIoT architectures
MIoT
Medical services
medical Internet of Things
attribute-based encryption
medical computing
medial data
Internet of Things
healthcare services
healthcare providers
Healthcare
health care
Fog Computing and Security
Fog computing
Data Security
computer architecture
Cloud Computing
Biomedical monitoring
biblio
Uncertainty-Aware Authentication Model for Fog Computing in IoT
Submitted by aekwall on Mon, 12/30/2019 - 12:16pm
Naive Bayes
uncertainty-aware authentication model
uncertainty handling
uncertainty
Support vector machines
support vector machine
supervised learning
supervised classification algorithms
security issues
Scalability
Resiliency
regression analysis
pubcrawl
privacy issues
prediction model
pattern classification
Fog computing
Mobile Edge Computing
logistic regression
IoT
Internet of Things
Fog Computing and Security
Decision trees
Decision Tree
Cloud Computing
Cisco Systems
Bayes methods
authorisation
authentication
attribute based access control model
ABAC model
security
biblio
Total Error Reduction in Presence of Malicious User in a Cognitive Radio Network
Submitted by grigby1 on Thu, 12/05/2019 - 10:55am
PUE attack
unused spectrum
total error reduction
total error probability
telecommunication security
spectrum sensing interval
Signal to noise ratio
sensors
security issues
secondary users
Resiliency
resilience
radio transmitters
radio spectrum management
attacker strength
pubcrawl
probability
primary user spectrum bands
primary user emulation attack
Neyman-Pearson criterion
malicious user
error probability
energy detector
emulation
emulated primary signal
Cognitive Radio Security
Cognitive Radio Network
cognitive radio
biblio
Security Assessment of Libyan Government Websites
Submitted by grigby1 on Wed, 10/23/2019 - 12:39pm
security issues
Reconnaissance
resilience
Resiliency
Safety
Scalability
secure programming practices
security assessment
security assessment results
pubcrawl
security level
security of data
security policies
SSL Trust Models
vulnerability assessment
Web sites
Website Vulnerability
internet
Cryptography
data privacy
E-Government
encryption
Government
government data processing
Human behavior
In formation Security
Computer crime
Libya E-government
Libyan government websites
Metrics
Penetration Testing
privacy
privacy polic
Privacy Policy
biblio
CCA Secure Proxy Re-Encryption Scheme for Secure Sharing of Files through Cloud Storage
Submitted by grigby1 on Thu, 09/26/2019 - 10:43am
resilience
Peer-to-peer computing
Proxy Reencryption
pubcrawl
Public key
public key cryptography
quantum computing
quantum computing algorithms
random oracle model
random processes
Metrics
Resiliency
ring-lwe
robust file storage capability
search problem
search problems
secure data sharing
Secure File Sharing
secure file sharing scheme
security issues
decryption time
chosen ciphertext secure
Cloud Computing
cloud storage security
cloud storage service
Collaborative Work
composability
computing technologies
confidentiality
CSS
CCA secure proxy re-encryption scheme
encrypted files
encryption
groupware
Human behavior
Human Factors
lattice based cryptography
Lattices
malicious insiders
biblio
NL-IDS: Trust Based Intrusion Detection System for Network Layer in Wireless Sensor Networks
Submitted by grigby1 on Mon, 08/05/2019 - 11:35am
security issues
protocol layers
pubcrawl
resilience
Resiliency
Routing
Routing protocols
Scalability
secure path
policy-based governance
security system
sensor node trust
telecommunication security
trust
trust based intrusion detection system
Wireless Sensor Network
wireless sensor networks
WSN
Mathematical model
Black hole attackers
Blackhole attack
collaboration
composability
Conferences
false trust
Intrusion Detection
intrusion detection system
Black hole attack
Measurement
Metrics
mobile ad hoc networks
network intrusion detection
network layer
NL-IDS
periodic trust value
biblio
Ensuring Cloud Data Security Using Public Auditing with Privacy Preserving
Submitted by grigby1 on Mon, 08/05/2019 - 11:30am
encryption audits
windows server instance
third party auditor
storage management
Servers
security issues
secure hash algorithm
secure auditing system
Resiliency
resilience
public auditing
pubcrawl
privacy preserving
Metrics
metadata
advanced encryption standard algorithm
encryption
data storing
data privacy
data integrity
data confidentiality
Cryptography
Compositionality
cloud service providers
cloud data security
cloud data
Cloud Computing
auditing
Amazon EC2 cloud
biblio
Towards a security monitoring plane for named data networking and its application against content poisoning attack
Submitted by aekwall on Mon, 08/05/2019 - 10:44am
Measurement
security of data
security monitoring plane
security monitoring approach
security issues
security
Scalability
Resiliency
pubcrawl
NDN specification
NDN node
named data networking
Monitoring
microdetector
clean slate
IP networks
internet
Information Centric Networks
information centric networking paradigm
Hypothesis testing
Detectors
computer network security
clean-slate approach
Bayesian Network techniques
Bayesian network structure
Bayesian network
Bayes methods
Anomaly Detection
biblio
KLRA: A Kernel Level Resource Auditing Tool For IoT Operating System Security
Submitted by grigby1 on Mon, 07/01/2019 - 10:03am
operating system kernels
tools
Task Analysis
self-adaptive heuristic security mechanism
security of data
security issues
Security Audits
security
Scalability
resource-sensitive events
resource auditor
Resiliency
resilience
pubcrawl
Operating systems security
KLRA
kernel level resource auditing tool
kernel level
Kernel
IoT operating system security
iot operating system
IoT device
Internet of Things
Human Factors
Human behavior
Hardware
data privacy
biblio
Machine Learning-Based Recommendation Trust Model for Machine-to-Machine Communication
Submitted by grigby1 on Mon, 06/10/2019 - 1:56pm
resilience
Naive Bayes
pattern classification
Peer-to-peer computing
privacy
pubcrawl
radial support vector machine
Random Forest
receiver operating characteristics
Reliability
Mathematical model
Resiliency
security
security issues
security threats
Supervisory Control and Data Supervisory Acquisition(SCADA)
Support vector machines
telecommunication computing
trust computation measures
Trusted Computing
k nearest neighbor
composability
Computational modeling
computer network security
Decision Tree
Decision trees
internet
Internet of Things(IoTs)
Internet of Vehicles(IoVs)
Internet Protocol
Bayes methods
learning (artificial intelligence)
machine learning
machine learning trust evaluation
Machine learning-based recommendation trust model
Machine Type Communication Devices
Machine-to-Machine communication nodes
machine-to-machine communications
Machine-to-Machine(M2M)
malicious data
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »