Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
security threats
biblio
Media Forensics and DeepFakes: An Overview
Submitted by grigby1 on Thu, 04/08/2021 - 5:11pm
deep learning
learning (artificial intelligence)
Digital Forensics
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
fraud
security threats
neural nets
Forensics
software packages
public opinion
information forensics
generative adversarial networks
Videos
Media
multimedia computing
Deepfakes
Information integrity
data-driven forensic methods
deep learning tools
digital image forensics
elections
fake media
false multimedia content
forensic tools
Media Forensics
real media
realistic fake images
synthetic media
Video Forensics
visual media integrity verification
biblio
Safe and secure software updates on high-performance embedded systems
Submitted by grigby1 on Mon, 03/29/2021 - 11:56am
Artificial Intelligence
artificial intelligence algorithms
automobiles
autonomous systems
certification
composability
computational complexity
dependable embedded systems
embedded systems
extended networking technologies
hardware complexity
hardware platform
high computing demands
high performance scale
high-performance embedded systems
interconnected system resilient
Metrics
OTASU
post-deployment evidence
potentially infinite scenarios
pubcrawl
regular software updates
resilience
Resiliency
Safety
secure software updates
security
security of data
security threats
standards
system dependability
traditional certification practices
biblio
Covert Channels of Data Communication
Submitted by grigby1 on Wed, 02/10/2021 - 12:50pm
authorisation
pubcrawl
resilience
Resiliency
Scalability
Access Control
security threats
Linux
Compositionality
confidential information
covert storage channels
covert channels
data communication
Linux kernel
Linux operating system
mandatory access control
protected operating system
biblio
Preventive Techniques of Phishing Attacks in Networks
Submitted by grigby1 on Wed, 02/03/2021 - 2:02pm
Anti-phishing
Computer crime
e-hunting websites
Electronic mail
fake applications
fake Websites
Honey Pot
honey pots
Human behavior
Human Factors
information security
information technology
internet
machine learning
malware
network security
online applications
online businesses
Phishing
phishing attack preventive techniques
pubcrawl
resilience
Resiliency
Scalability
security threats
social engineering
spam
Web sites
biblio
A Descriptive Study on Homomorphic Encryption Schemes for Enhancing Security in Fog Computing
Submitted by aekwall on Mon, 02/01/2021 - 11:33am
Cloud Computing
Scalability
Servers
Data Security
encryption
data integrity
data encryption
Resiliency
pubcrawl
privacy
Metrics
Data protection
public key cryptography
False Data Injection
security threats
edge computing
RSA
Human Factors
Fog computing
Homomorphic encryption
Application of Homomorphic Encryption
Brakerski-Gentry-Vaikuntanathan model
crypto-algorithms
ElGamal based algebric homomorphic encryption
homomorphic cryptosystem
homomorphic encryption schemes
in-direct rapid homomorphic encryption
Pailier
public key cryptosystem
public key cryptosystems
Terminology
work flow
biblio
Big Data Security and Privacy: Current Challenges and Future Research perspective in Cloud Environment
Submitted by grigby1 on Mon, 12/28/2020 - 12:40pm
Big Data
big data privacy
Big data privacy top
big data security
Cloud Computing
cloud environment
cloud server
data privacy
Data Security
data security challenges
data storage
data structures
Human behavior
internet
Metrics
Organizations
pubcrawl
resilience
Resiliency
Scalability
security of data
security threats
semistructured data
sensitive data storage
Servers
storage management
Structured Data
Unstructured Data
biblio
Towards Ensuring Trustworthiness in Cyber-Physical Systems: A Game-Theoretic Approach
Submitted by aekwall on Mon, 12/21/2020 - 1:34pm
game theoretic security
Human Factors
Scalability
Predictive Metrics
composability
CPS sensor nodes
cyber-physical systems
game theory
game-theoretic approach
Games
ICT
information and communication technologies
information and communication technology
Mathematical model
Nash Equilibrium
Peer-to-peer computing
pubcrawl
secure operation
security
security threats
sensors
trust
Trusted Computing
trustworthiness
biblio
A novel solution for securing robot communications based on the MQTT protocol and ROS
Submitted by grigby1 on Thu, 12/17/2020 - 1:37pm
authentication
automatic robotic surveillance
Data Security
delays
hijacking attacks
Human behavior
Human Factors
internet
IoT
man-in-the-middle attacks
medical robotic surveillance
Message Queuing Telemetry Transport protocol
mobile robots
MQTT
MQTT protocol
operating systems (computers)
Performance analysis
policy-based governance
Protocols
pubcrawl
queueing theory
resilience
Resiliency
robot communications
Robot Operating System
robot operating systems
robot programming
robotic applications
robotic solutions
ROS
ROS-enabled robotic surveillance system
ROS-enabled robotic systems
securing ROS-enabled robotic system
security
security of data
security threats
Servers
Service robots
telecommunication security
telemetry
transport protocols
biblio
An Approach for End-to-End (E2E) Security of 5G Applications
Submitted by aekwall on Mon, 11/23/2020 - 11:23am
computer network security
Scalability
Servers
attack surface
Cryptographic Protocols
Protocols
Resiliency
pubcrawl
internet
authentication
message authentication
5G mobile communication
security threats
Elliptic curve cryptography
security operations
heterogeneous environment
Compositionality
Three-dimensional displays
confidentiality
communication complexity
computation complexity
Resistance
key management
3D PAKE protocol
5G Applications
5G protocols
attack resistance rate
dependable security mechanism
differentiated security
diffie hellman key exchange
E2E
End to End Security analysis
End-to-End data protection
end-to-end security
flexible security mechanism
heterogeneous networked society
industrial vision
Internet Security Protocols
key business driver
manifold applications
networking paradigms
next-generation mobile technology
security defensive rate
Tetrahedron property analysis
Intelligent Data Security
Intelligent Data and Security
biblio
OWASP Risk Analysis Driven Security Requirements Specification for Secure Android Mobile Software Development
Submitted by grigby1 on Tue, 11/17/2020 - 2:41pm
security of data
security
pubcrawl
Metrics
Resiliency
data integrity
security threats
composability
mobile computing
smart phones
malware
software development management
software engineering
security vulnerabilities
SDLC
risk analysis
resilience
testing
Detectors
Mobile Applications
Banking
Android (operating system)
security holes
information confidentiality
access sensitive information
Android development
data leaks
defensive requirements analysis
development lifecycle
development stage
guided security requirement analysis
Mobile Apps
mobile apps flaws
mobile software engineers
necessary security knowledge
OWASP
OWASP mobile top ten risks
OWASP risk analysis driven security requirements specification
secure Android mobile software development
secure mobile SDLC
secure mobile software development education
security defects open doors
security requirements
software developers
useful mobile security guidelines
Operating systems security
1
2
3
4
5
6
7
8
next ›
last »