Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Hacker
biblio
Security and Privacy Analysis of Wearable Health Device
Submitted by
grigby1
on Mon, 12/28/2020 - 11:28am
authorisation
security
Servers
Bluetooth
pubcrawl
Human behavior
resilience
Resiliency
telecommunication security
data privacy
privacy
health care
composability
mobile computing
Computer crime
sensitive information
Security analysis
Data Security
security vulnerability
mobile devices
Privacy Risk
malicious attack
Biomedical monitoring
bluetooth security
Bluetooth networking
Bluetooth pairing process
dieting formula
eating constraint
fitbit
Google Glass
Hacker
health monitor system
health tracker devices
human health parameter monitoring
Jawbone
mobile health
mobile wearable health devices
privacy breach
privacy features
security risk
sensitive data information
user data security
user sleeping arrangements
Wearable devices
biblio
A hybrid method for detection and prevention of SQL injection attacks
Submitted by
grigby1
on Thu, 06/07/2018 - 2:13pm
access content
collaboration
common gateway interface
Computer hacking
Data mining
database design
database driven web applications
database management systems
Databases
detection
dynamic
Hacker
Human behavior
hybrid method
hybrid SQLIA
internet
Policy
policy-based governance
Policy-Governed Secure Collaboration
Prevention
privacy
pubcrawl
Resiliency
Runtime
security of data
sensitive information
serious security threat
Servers
SQL
SQL injection
SQL injection attack
SQL statements
SQLIA
static
web applications
biblio
Dynamic Malware Detection Using API Similarity
Submitted by
grigby1
on Mon, 04/02/2018 - 11:33am
API
API similarity
APIs
application program interfaces
Compositionality
Computer crime
credit card
credit card details
Data mining
dynamic Malware detection method
feature extraction
Hacker
information security
invasive software
malware
Malware Analysis
malware samples
malware-detection method
pattern matching
pubcrawl
resilience
Resiliency
Sea measurements
tools
trojan
Trojan horses
Trojans
user-confidential information
biblio
A Digital Triage Forensics framework of Window malware forensic toolkit: Based on ISO}/IEC 27037:2012
Submitted by
grigby1
on Tue, 03/07/2017 - 12:31pm
Computer crime
Computers
crime scene investigation
critical analysis
cyber security incident
Cybercrime
data leakage
digital evidence handling
digital forensic
Digital Forensics
digital triage forensics
digital triage forensics framework
DTF methodologies
Hacker
IEC standards
internet
invasive software
ISO standards
ISO/IEC 27037
ISO/IEC 27037:2012
malware
malware forensics
operating systems (computers)
pubcrawl170109
Window malware forensic toolkit
biblio
A Multi-token Authorization Strategy for Secure Mobile Cloud Computing
Submitted by
BrandonB
on Wed, 05/06/2015 - 12:22pm
vulnerable wireless communication links
trust
traffic interception
identity management systems
identity management system
Hacker
data privacy
credentials
computing models
Computer hacking
cloud resources
cloud computing security
Cloud Computing
authorization architecture
authorization
authorisation
Access Control
Servers
security of data
security
Secure Mobile Computing
secure mobile cloud computing
radio links
privacy
Organizations
omnipresent mobile-based clients
OAuth
multitoken authorization strategy
Modified Identity Management System
mobile computing
Mobile communication
mobile cloud computing
mathematical modeling
mathematical analysis
malicious code
IdM