Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Web servers
biblio
Security system based on microcontrollers
Submitted by
aekwall
on Mon, 03/25/2019 - 8:57am
security
Monitoring
Resiliency
Human behavior
pubcrawl
composability
Metrics
internet
Temperature sensors
microcontrollers
carbon monoxide level measurement
computerised instrumentation
development board Arduino
Ethernet interface
file servers
humidity measurement
Intelligent sensors
level measurement
Local area networks
magnetic contact
Magnetic field measurement
magnetic sensors
microcontroller
microsensors
movement detection measurement
process control
security system
sensor modules
single-chip microcontrollers
Smart Home
Temperature measurement
unauthorized entrance detection
Web server implementation
Web servers
sensor security
biblio
CCSP: A compressed certificate status protocol
Submitted by
grigby1
on Thu, 06/07/2018 - 2:15pm
Browsers
CAS
CCSP
certificate authorities
certificate revocation checks
Certificate Revocation Lists
certification
compressed certificate status protocol
computer network security
Conferences
Human behavior
internet
Metrics
OCSP servers
OCSP-based methods
Online Certificate Status Protocol servers
Protocols
pubcrawl
Public key
public key cryptography
Receivers
resilience
Resiliency
Scalability
signed certificates
sophisticated cyber-attackers
SSL Trust Models
timestamped certificates
Web browser
Web servers
biblio
CAre: Certificate Authority Rescue Engine for Proactive Security
Submitted by
grigby1
on Thu, 06/07/2018 - 2:14pm
Browsers
CAre
centralized system
certificate authorities
certificate authority
Certificate Authority Rescue Engine
certification
Cryptography
Data Security
digital signatures
encryption
Human behavior
internet
Metrics
online front-ends
proactive security
pubcrawl
Public key
public key cryptography
public key infrastructure
resilience
Resiliency
Scalability
SSL technology
SSL Trust Models
web security
Web servers
Web site security
biblio
MalFire: Malware firewall for malicious content detection and protection
Submitted by
K_Hooper
on Wed, 04/04/2018 - 9:00am
ad blocking tool
Adware
adware content
adware injection
Companies
Compositionality
contemporary threats
Content Injection
data privacy
firewalls
Human behavior
internet
invasive software
IP networks
MalFire
malicious content detection
malicious content protection
malware
malware firewall
malware injection
Metrics
online portion
privacy
pubcrawl
Resiliency
security
sensitive information
tools
user data privacy
user data security
vulnerability detection
Web servers
biblio
Are Wearables Ready for HTTPS? On the Potential of Direct Secure Communication on Wearables
Submitted by
grigby1
on Mon, 04/02/2018 - 11:56am
available wearable computing devices
Bluetooth
Ciphers
computer network security
Cryptography
direct communication
direct Internet communication
direct Internet connection
direct secure communication
energy consumption
Human behavior
internet
Internet servers
network measurements
privacy
Protocols
pubcrawl
resilience
Resiliency
Scalability
secure communication protocols
secure Internet communication
security
smart phones
wearable computers
wearables
wearables security
Web servers
wireless LAN
biblio
A Novel Multifactor Two-Server Authentication Scheme under the Mobile Cloud Computing
Submitted by
grigby1
on Thu, 02/15/2018 - 10:48am
resilience
pubcrawl
Resiliency
Human behavior
Human Factors
authentication
privacy protection
Mobile communication
Web servers
Fingerprint recognition
Metrics
human factor
multifactor authentication
BAN
mobile cloud computing
multifactor
two-server
biblio
User Behavior Anomaly Detection for Application Layer DDoS Attacks
Submitted by
grigby1
on Tue, 01/16/2018 - 5:25pm
anomalous behavior instance detection
Anomaly Detection
application layer DDoS attacks
Browsers
composability
Computer crime
computer network security
Cyber Attacks
DDoS attack detection
distributed denial of service attacks
feature extraction
file servers
HTTP DDoS attacks
HTTP Web server logs
Human behavior
internet
legitimate application layer requests
Metrics
PCA
PCA-subspace
Penetration Testing
principal component analysis
principle component analysis
protocol characteristics
Protocols
pubcrawl
Resiliency
student resource portal
subspace anomaly detection method
user behavior anomaly detection method
Web servers
web services
biblio
Inhibiting Browser Fingerprinting and Tracking
Submitted by
K_Hooper
on Wed, 12/20/2017 - 10:33am
Browser Fingerprinting
browser fingerprinting identification
Browsers
browser tracking
data privacy
fingerprint identification
Fingerprinting Countermeasure
Fingerprint recognition
Human behavior
internet
Metrics
online front-ends
privacy
pubcrawl
Resiliency
side-effects
user browser experience
user computer
user privacy
Web browser
Web Browser Security
Web pages
Web servers
Web sites
Web Tracking
biblio
TLS Connection Validation by Web Browsers: Why do Web Browsers Still Not Agree?
Submitted by
K_Hooper
on Wed, 12/20/2017 - 10:33am
Browsers
Certificate Validation
Human behavior
IP networks
Metrics
online front-ends
Protocols
pubcrawl
Public key
Resiliency
security of data
standards
TLS connection validation
Web browser behaviour
Web browsers
Web Browser Security
Web browser validation process
Web servers
Web users
X.509 Certificate
X.509 certificates
biblio
Introduction to HTTP security headers and implementation of HTTP strict transport security (HSTS) header for HTTPS enforcing
Submitted by
K_Hooper
on Wed, 12/20/2017 - 10:33am
Browsers
communication security
Computer crime
HSTS
HTTP protocol
HTTP strict transport security header
HTTPS protocol
Human behavior
hypermedia
internet
Internet of Things
IoT
Metrics
Protocols
pubcrawl
Resiliency
security
security of data
security policies
SSL-TLS certificates
transport protocols
Web Browser Security
Web browsers
Web servers
Web sites
1
2
next ›
last »