Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
security threats
biblio
Vulnerabilities and Security Threats for IoT in Transportation and Fleet Management
Submitted by grigby1 on Fri, 05/20/2022 - 3:46pm
Internet of Things
security
pubcrawl
Human behavior
resilience
Resiliency
privacy
Metrics
Intelligent Transportation Systems
Transportation
Automobiles Tracker
Fleet Management
GPS/GPRS
real-time
security threats
threat mitigation
biblio
Using Machine Learning for Intrusion Detection System in Wireless Body Area Network
Submitted by aekwall on Wed, 08/11/2021 - 2:30pm
wireless sensor networks
security threats
machine learning
machine learning algorithms
Wireless communication
pubcrawl
Resiliency
composability
Noise measurement
Artificial Neural Networks
intrusion tolerance
body area networks
denial of service
Intrusion Detection Systems
wireless body area network
biblio
Security Issues With Fog Computing
Submitted by aekwall on Mon, 06/28/2021 - 12:34pm
Fog computing
security
Cloud Computing
computer architecture
edge computing
Fog Computing and Security
Medical services
pubcrawl
quality of service
Resiliency
Scalability
security threats
Servers
solutions
biblio
Study of Security Flaws in the Linux Kernel by Fuzzing
Submitted by aekwall on Thu, 06/24/2021 - 11:54am
Kernel
vulnerabilities
use-after-free
tools
Syzkaller
stack overflow
security threats
security
Protocols
Linux Operating System Security
Linux
Operating systems security
Industrial engineering
fuzzing
composability
Automated Response Actions
pubcrawl
Metrics
composabilty
resilience
Resiliency
biblio
Media Forensics and DeepFakes: An Overview
Submitted by grigby1 on Thu, 04/08/2021 - 5:11pm
fake media
Media
multimedia computing
Deepfakes
Information integrity
data-driven forensic methods
deep learning tools
digital image forensics
elections
Videos
false multimedia content
forensic tools
Media Forensics
real media
realistic fake images
synthetic media
Video Forensics
visual media integrity verification
fraud
learning (artificial intelligence)
Digital Forensics
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
deep learning
security threats
neural nets
Forensics
software packages
public opinion
information forensics
generative adversarial networks
biblio
Safe and secure software updates on high-performance embedded systems
Submitted by grigby1 on Mon, 03/29/2021 - 11:56am
Metrics
traditional certification practices
system dependability
standards
security threats
security of data
security
secure software updates
Safety
Resiliency
resilience
regular software updates
pubcrawl
potentially infinite scenarios
post-deployment evidence
OTASU
Artificial Intelligence
interconnected system resilient
high-performance embedded systems
high performance scale
high computing demands
hardware platform
hardware complexity
extended networking technologies
embedded systems
dependable embedded systems
computational complexity
composability
certification
autonomous systems
automobiles
artificial intelligence algorithms
biblio
Covert Channels of Data Communication
Submitted by grigby1 on Wed, 02/10/2021 - 12:50pm
Compositionality
protected operating system
mandatory access control
Linux operating system
Linux kernel
data communication
covert channels
covert storage channels
confidential information
authorisation
Linux
security threats
Access Control
Scalability
Resiliency
resilience
pubcrawl
biblio
Preventive Techniques of Phishing Attacks in Networks
Submitted by grigby1 on Wed, 02/03/2021 - 2:02pm
malware
Web sites
spam
social engineering
security threats
Scalability
Resiliency
resilience
pubcrawl
phishing attack preventive techniques
Phishing
online businesses
online applications
network security
Anti-phishing
machine learning
internet
information technology
information security
Human Factors
Human behavior
honey pots
Honey Pot
fake Websites
fake applications
Electronic mail
e-hunting websites
Computer crime
biblio
A Descriptive Study on Homomorphic Encryption Schemes for Enhancing Security in Fog Computing
Submitted by aekwall on Mon, 02/01/2021 - 11:33am
RSA
work flow
Terminology
public key cryptosystems
public key cryptosystem
Pailier
in-direct rapid homomorphic encryption
homomorphic encryption schemes
homomorphic cryptosystem
ElGamal based algebric homomorphic encryption
crypto-algorithms
Brakerski-Gentry-Vaikuntanathan model
Application of Homomorphic Encryption
Homomorphic encryption
Fog computing
Human Factors
Cloud Computing
edge computing
security threats
False Data Injection
public key cryptography
Data protection
Metrics
privacy
pubcrawl
Resiliency
data encryption
data integrity
encryption
Data Security
Servers
Scalability
biblio
Big Data Security and Privacy: Current Challenges and Future Research perspective in Cloud Environment
Submitted by grigby1 on Mon, 12/28/2020 - 12:40pm
Metrics
Unstructured Data
Structured Data
storage management
Servers
sensitive data storage
semistructured data
security threats
security of data
Scalability
Resiliency
resilience
pubcrawl
Organizations
Big Data
internet
Human behavior
data structures
data storage
data security challenges
Data Security
data privacy
cloud server
cloud environment
Cloud Computing
big data security
Big data privacy top
big data privacy
1
2
3
4
5
6
7
8
9
next ›
last »