Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security issues
biblio
Overview on vehicular ad hoc network and its security issues
Submitted by BrandonB on Wed, 05/06/2015 - 8:52am
telecommunication switching
safekeeping
Safety
security
security issues
self-configurable network connectivity
signal-weakening barrier
telecommunication network routing
telecommunication security
Roads
travel comfort
unauthorized message injection
VANET
vehicles
vehicular ad hoc networks
Vehicular ad-hoc networks (VANET)
vehicular communications
wireless links
eavesdropping
attacks
authentication
Availability
Computer crime
confidentiality
Cryptography
data privacy
data trust
active safety enhancement
information exchange
information transmission
message alteration
message routing
non-repudiation
Position based routing
preventive safety enhancement
privacy
biblio
Data mining for privacy preserving association rules based on improved MASK algorithm
Submitted by BrandonB on Tue, 05/05/2015 - 9:27am
Itemsets
Time complexity
security issues
scanning database
query processing
privacy preserving association rules
privacy preservation
multi-parameters perturbation
mining associations with secrecy konstraints
matrix algebra
Algorithm design and analysis
inverse matrix
information privacy
improved MASK algorithm
DPQR algorithm
data privacy
data perturbation strategy
data perturbation and query restriction
Data mining
association rules
biblio
Data mining for privacy preserving association rules based on improved MASK algorithm
Submitted by BrandonB on Tue, 05/05/2015 - 9:27am
Itemsets
Time complexity
security issues
scanning database
query processing
privacy preserving association rules
privacy preservation
multi-parameters perturbation
mining associations with secrecy konstraints
matrix algebra
Algorithm design and analysis
inverse matrix
information privacy
improved MASK algorithm
DPQR algorithm
data privacy
data perturbation strategy
data perturbation and query restriction
Data mining
association rules
biblio
Smart City Security Issues: Depicting Information Security Issues in the Role of an Urban Environment
Submitted by BrandonB on Tue, 05/05/2015 - 9:26am
big cities
Cities and towns
Cloud Computing
data privacy
information security
Intelligent sensors
privacy issues
security issues
security of data
Servers
smart cities
Smart City
smart city security
urban environment
biblio
Poster Abstract: Security Comes First, a Public-key Cryptography Framework for the Internet of Things
Submitted by BrandonB on Thu, 04/30/2015 - 11:53am
IoT
smart devices
security issues
safety issues
public-key cryptography
public key cryptography
Protocols
open systems
IP-based security solutions
IP networks
Acceleration
interoperability
Internet-connectivity
Internet services
Internet of Things
internet
Hardware
Engines
end-to-end communication
Cryptography
biblio
Poster Abstract: Security Comes First, a Public-key Cryptography Framework for the Internet of Things
Submitted by BrandonB on Wed, 04/29/2015 - 10:47am
IoT
smart devices
security issues
safety issues
public-key cryptography
public key cryptography
Protocols
open systems
IP-based security solutions
IP networks
Acceleration
interoperability
Internet-connectivity
Internet services
Internet of Things
internet
Hardware
Engines
end-to-end communication
Cryptography
biblio
Attacks and Defenses in the Data Plane of Networks
Submitted by Heather Lucas on Wed, 09/17/2014 - 6:33pm
NetFPGA
software-programmable network processors
software vulnerabilities
security issues
Routing protocols
programmable router
Program processors
processing monitor
packet processing software
packet forwarding
network security
network routers
network processor
network attack
Computer crime
logic devices
internet
hardware-based defense mechanism
field programmable gate arrays
embedded systems
embedded system security
denial-of-service attack
data plane
custom-logic hardware
control plane
computer networks
computer network security
« first
‹ previous
1
2
3
4
5
6
7
8