Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Servers
biblio
Implementation of SDN-based IDS to protect Virtualization Server against HTTP DoS attacks
Submitted by grigby1 on Fri, 04/09/2021 - 11:33am
Cloud Computing
Servers
pubcrawl
Resiliency
computer network security
web services
composability
telecommunication traffic
Denial of Service attacks
SDN
software defined networking
Switches
virtualisation
malicious software
Virtual machining
Virtualization
resilience
cloud
network intrusion detection system
IDS
network traffic analysis
denial-of-service attack
SDN technology
SDN networks
HTTP DoS
HTTP DoS attacks
intrusion attacks
SDN-based IDS
SDN-based security applications
virtualization environments
virtualization server
virtualization servers
biblio
Categorization and Organization of Database Forensic Investigation Processes
Submitted by grigby1 on Thu, 04/08/2021 - 5:10pm
Adaptation models
database management systems
Servers
Digital Forensics
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Data models
digital data
Databases
information forensics
Terminology
acquisition and preservation category
analysis and reconstruction category
Database forensic investigation
database forensic investigation processes
database forensics
design science research methodology
harmonized DBFI process
investigation process model
Planning
preparation and pre-response category
biblio
Reducing Processing Delay and Node Load Using Push-Based Information-Centric Networking
Submitted by aekwall on Thu, 04/08/2021 - 4:31pm
Scalability
Servers
telecommunication traffic
Resiliency
pubcrawl
Routing
internet
Distributed databases
telecommunication network routing
network traffic
Routing protocols
Load modeling
delays
ICN
information-centric networking
named data networking
Information Centric Networks
edge node
faces
content distribution method
contents deliver
node load
packet processing delay time
pull-type communication method
push-based information-centric networking
push-type communication method
returns data
specific content
biblio
Policy-Based Network Access and Behavior Control Management
Submitted by grigby1 on Mon, 03/29/2021 - 2:25pm
abstract policy configuration
Access Control
application server
application system access control
authorisation
behavior control management
behavior control model
behavior management control
behavior management control process
Communication networks
computer network management
data drive
Data Driven
data fusion
device connection
Human behavior
identity authentication
Identity management
illegal outreach control
information network
integrated network access
management simplification
Network Access Control
network device
network servers
policy-based network access
process control
Protocols
pubcrawl
resilience
Resiliency
Scalability
security
security management
security monitoring
security policy
Servers
biblio
uPort Open-Source Identity Management System: An Assessment of Self-Sovereign Identity and User-Centric Data Platform Built on Blockchain
Submitted by grigby1 on Mon, 03/29/2021 - 2:22pm
blockchain
Cryptography
DApp
Decentralized App
decentralized application
Decentralized IDentifier
DID
digital services
Distributed databases
ethereum
Human behavior
Identity management
identity management system
identity management systems
IdM
Mobile Applications
Open Source Software
pubcrawl
public domain software
resilience
Resiliency
Scalability
Self-Sovereign Identity
Servers
smart contracts
SSI
SSI IDM system
standards
uPort
uPort identity management system
uPort open-source identity management system
user-centric data platform
Verifiable Credential
biblio
Risks Identification in the Exploitation of a Geographically Distributed Cloud Infrastructure for Storing Personal Data
Submitted by grigby1 on Mon, 03/29/2021 - 1:14pm
auditing storage
augumented reality
Big Data
Cloud Computing
cloud services
cloud storage administrators
Companies
confidential information leaks
controller
cyber incidents
data leak
data privacy
Data protection
data storage subsystem
data subject GDPR
digital twin
Distributed databases
expert systems
geographically distributed cloud infrastructure
geographically distributed company
high-loaded infocommunications systems
Human Factors
information quality
Kaspersky Lab
models
natural person
Object recognition
payment information records
personal data
personal data records
privacy
processing
pubcrawl
Risk
risk Identification
risk management
Scalability
security
security of data
Servers
social engineering techniques
storage management
stored resources
storing personal data
system
Task Analysis
technical project
unsecured service
biblio
Secure Outsourcing Algorithms of Modular Exponentiations in Edge Computing
Submitted by aekwall on Mon, 03/22/2021 - 1:14pm
Scalability
Servers
security
Protocols
Resiliency
pubcrawl
privacy
edge computing
public key cryptography
outsourcing
modular exponentiation
exponentiation
Secure outsourcing algorithms
biblio
Traceable Ciphertext Policy Attribute-based Encryption Scheme with User Revocation for Cloud Storage
Submitted by aekwall on Mon, 03/22/2021 - 1:07pm
Cloud Computing
Servers
Access Control
authorisation
encryption
cloud storage
data privacy
private key cryptography
Resiliency
pubcrawl
Vegetation
storage management
Predictive Metrics
Compositionality
fine-grained access control
Traceability
encryption audits
CP-ABE scheme
user revocation
CP-ABE
associated user revocation
association revocation
ciphertext re-encryption technology
forward security
identity directory technology
single user revocation
traceable ciphertext policy attribute-based encryption scheme
user identity tracking
biblio
Integrity Auditing with Attribute based ECMRSA Algorithm for Cloud Data Outsourcing
Submitted by aekwall on Mon, 03/22/2021 - 1:07pm
Cloud Computing
Servers
abe
security
Protocols
Resiliency
pubcrawl
Cryptography
Databases
Predictive Metrics
Compositionality
data integrity
outsourcing
encryption audits
data sharing
data auditing
biblio
A Secure Data Dynamics and Public Auditing Scheme for Cloud Storage
Submitted by aekwall on Mon, 03/22/2021 - 1:06pm
Cloud Computing
Servers
cloud storage
data owner
data privacy
data integrity
security
Resiliency
pubcrawl
Public key
public key cryptography
storage management
Predictive Metrics
Compositionality
data storage
encryption audits
auditing
cloud service providers
public-key encryption
AES-256 algorithm
data dynamics operation
RSA-15360 algorithm
secure data dynamics
secure public auditing scheme
SHA-512 algorithm
1
2
3
4
5
6
7
8
9
…
next ›
last »