Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Peer-to-peer computing
biblio
Review on Mechanisms for Detecting Sinkhole Attacks on RPLs
Submitted by grigby1 on Mon, 03/19/2018 - 1:46pm
RPL
Peer-to-peer computing
personal area networks
pubcrawl
resilience
Resiliency
Routing attack
Routing Protocol
Routing protocols
network topology
RPL components
security
Sinkhole attack
telecommunication security
Topology
wireless sensor networks
WSN
IP networks
composability
computer network security
Cyber Physical Systems Security
existing detection mechanisms
existing security challenges
internet
Internet of Things
Internet Protocol version 6
6LoWPAN
IPv6 packet
limited resources
lossy network
low power wireless personal area networks
maintenance engineering
network damage
network layer
biblio
De Duplication Scalable Secure File Sharing on Untrusted Storage in Big Data
Submitted by grigby1 on Mon, 03/19/2018 - 1:35pm
Resiliency
knowledge copy
knowledge deduplication
Metrics
Peer-to-peer computing
privacy issues
pubcrawl
Public key
resilience
knowledge confidentiality
Secure File Sharing
security
security issues
sensitive data
storage
Token
untrusted storage
Writing
data privacy
Big Data
ciphertexts
Cloud Computing
composability
confluent key
convergent secret writing
cryptographical hash price
Cryptography
ancient secret writing
decryption
deduplication scalable secure file sharing
embedded systems
encoding
encryption
hashkey
Human behavior
information copy
biblio
Access Control for Secure Distributed Data Structures in Distributed Hash Tables
Submitted by grigby1 on Mon, 03/19/2018 - 1:35pm
Resiliency
middleware
middle-ware scheme
P2P networks
P2P overlays
Peer-to-peer computing
peer-to-peer networks
pubcrawl
resilience
Metrics
reusable security architecture
secure distributed data structures
Secure File Sharing
security issues
social networking (online)
social networks
social projects
trusted third parties
data structures
authorisation
centralized servers
client-server model
client-server systems
communication protocols
composability
computer network security
Context
Access Control
DDS
DHT
Distributed databases
distributed data storage services
distributed hash tables
encryption
file sharing
Human behavior
biblio
Secured and Reliable File Sharing System with De-Duplication Using Erasure Correction Code
Submitted by grigby1 on Mon, 03/19/2018 - 1:35pm
Reliability
file-level deduplication system
file sharing system
File systems
Human behavior
Metrics
optimized storage
Peer-to-peer computing
pubcrawl
Reed Solomon Code
error correction codes
resilience
Resiliency
RSA encryption
Secure File Sharing
Secure storage
Servers
storage management
storage space
video files
Cryptography
authorized storage
Ciphers
cipher texts
Cloud Computing
cloud providers
cloud service subscriber
cloud storage servers
composability
computer network reliability
AES encryption
data deduplication technique
data encryption
data owners
de-duplication
encrypted file reliability
encrypted files
encryption
erasure correcting code
erasure correction code
biblio
A Multi-Level Secure File Sharing Server and Its Application to a Multi-Level Secure Cloud
Submitted by grigby1 on Mon, 03/19/2018 - 1:34pm
multilevel secure file sharing server
Servers
security of data
Security kernel
Secure File Sharing
Resiliency
resilience
pubcrawl
Peer-to-peer computing
Network file service
Multi-Level Security
Cloud Computing
multilevel secure cloud
Metrics
Kernel
Human behavior
GEMSOS
file servers
data sharing
computer security
computer architecture
composability
biblio
Modeling User Communities for Identifying Security Risks in an Organization
Submitted by grigby1 on Mon, 03/05/2018 - 1:23pm
security of data
Peer-to-peer computing
Personnel
production environment
pubcrawl
resilience
Resiliency
Scalability
security
peer to peer security
security risks
team working
tools
UEBA
User and Entity Behavior Analytics
user communities
user feedback
Measurement
Companies
entity behavior analytics
feature-based weight assignments
Human behavior
Human Factors
insider threat
Louvain method
Louvain modularity
community detection
Metrics
network traffic
Niara's data
optimization
peer group creation
Peer grouping
peer grouping employees
biblio
Cooperative Transmission for Physical Layer Security by Exploring Social Awareness
Submitted by grigby1 on Mon, 03/05/2018 - 1:23pm
fading channels
Geometry
Human behavior
Human Factors
Jamming
Metrics
peer to peer security
Peer-to-peer computing
pubcrawl
Random variables
Relays
resilience
Resiliency
Scalability
security
biblio
A First Estimation of the Proportion of Cybercriminal Entities in the Bitcoin Ecosystem Using Supervised Machine Learning
Submitted by grigby1 on Mon, 03/05/2018 - 1:14pm
Public key
learning (artificial intelligence)
machine learning
malware
Metrics
pattern classification
Peer-to-peer computing
peer-to-peer payment system
proportion estimation
pubcrawl
illicit activities
Ransomware
resilience
Resiliency
security of data
supervised learning
supervised learning classifiers
supervised machine learning
uncategorised observations
Cybercrime
bitcoin
Bitcoin ecosystem
Bitcoin transactions
blockchain
composability
Computer crime
cryptocurrency
cyber-criminal entities
Bagging classifiers
cybercrime-related categories
cybercriminal entities
Ecosystem
Ecosystems
financial data processing
Gradient Boosting classifiers
gradient methods
illegal goods trading
biblio
Forensic Attribution in NoSQL Databases
Submitted by grigby1 on Mon, 03/05/2018 - 1:03pm
message authentication
survey
Structured Query Language
sensitive information
security of data
Security by Default
Scalability
pubcrawl
policy-based governance
Peer-to-peer computing
NoSQL databases
NoSQL
Access Control
Human Factors
Human behavior
Forensics
forensic attribution
database forensics
collaboration
cloud implementations
Cloud Computing
authorisation
authentication
attribute-based encryption
biblio
Hijacking Bitcoin: Routing Attacks on Cryptocurrencies
Submitted by grigby1 on Thu, 02/15/2018 - 11:41am
Peer-to-peer computing
Human behavior
human factor
Human Factors
internet
Internet routing infrastructure
IP networks
mining pools
P2P networks
electronic money
pubcrawl
Routing
routing advertisements
routing attacks
routing manipulation
Routing protocols
Scalability
telecommunication network routing
bitcoin security
authorisation
autonomous systems
BGP
BGP hijack
BGP hijacks
BGP routing data
bitcoin
Bitcoin hijacking
ASes
Bitcoin topology
Bitcoin traffic manipulation
Computer crime
cryptocurrencies
cryptocurrency
Cryptography
Data mining
delays
« first
‹ previous
…
17
18
19
20
21
22
23
24
25
next ›
last »