Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
sensitive information
biblio
Encrypted Keyword Search in Cloud Computing using Fuzzy Logic
Submitted by
aekwall
on Mon, 01/18/2021 - 10:34am
Cloud Computing
Scalability
Servers
Keyword search
authorisation
Cryptography
data confidentiality
encryption
data encryption
Resiliency
pubcrawl
Metrics
query processing
Data protection
Fuzzy logic
fuzzy set theory
Indexes
information management
search engines
sensitive information
vital information
cloud service providers
complex Boolean queries
encrypted keyword search
fuzzy keyword search
Fuzzy Keyword Sets
information management professionals
keyword privacy
keyword safety
N-grams
Privacy Preserving Fuzzy Search
user document protection
Fuzzy Cryptography
biblio
Security and Privacy Analysis of Wearable Health Device
Submitted by
grigby1
on Mon, 12/28/2020 - 11:28am
authorisation
security
Servers
Bluetooth
pubcrawl
Human behavior
resilience
Resiliency
telecommunication security
data privacy
privacy
health care
composability
mobile computing
Computer crime
sensitive information
Security analysis
Data Security
security vulnerability
mobile devices
Privacy Risk
malicious attack
Biomedical monitoring
bluetooth security
Bluetooth networking
Bluetooth pairing process
dieting formula
eating constraint
fitbit
Google Glass
Hacker
health monitor system
health tracker devices
human health parameter monitoring
Jawbone
mobile health
mobile wearable health devices
privacy breach
privacy features
security risk
sensitive data information
user data security
user sleeping arrangements
Wearable devices
biblio
Copker: A Cryptographic Engine Against Cold-Boot Attacks
Submitted by
aekwall
on Mon, 11/30/2020 - 11:08am
Internet of Things
private key cryptography
Kernel
Resiliency
pubcrawl
Cryptography
cyber physical systems
random number generation
Random access memory
RSA
Computers
Compositionality
Registers
memory data
cryptographic keys
sensitive information
deterministic random bit generator
private key
Cathode ray tubes
Cache-as-RAM
cold-boot attack
cold-boot attacks
Copker stores kilobytes
CPU registers
cryptographic engine
cryptographic services
deterministic random bit generators
disk encryption
ECDSA signing
key-encryption key
multiple private keys
on-chip CPU caches
PGP Email clients
plain-text sensitive data
popular asymmetric cryptosystems
public-key cryptography implementation
RAM chips
suspend mode
Magnetic Remanence
biblio
Social Engineering for Diagnostic the Information Security Culture
Submitted by
aekwall
on Mon, 10/12/2020 - 10:46am
security
data privacy
Human behavior
pubcrawl
Computer crime
confidential information
Cybersecurity
Human Factors
sensitive information
security culture
Phishing
social engineering
controlled social engineering attacks
information assets
information assets protection
Information Security Culture
information security culture assessment
ISCA survey questionnaire
public university
social engineering techniques
Human Behavior and Cybersecurity
biblio
An Adversarial Perturbation Approach Against CNN-based Soft Biometrics Detection
Submitted by
aekwall
on Mon, 10/12/2020 - 10:33am
security of data
Scalability
data privacy
learning (artificial intelligence)
Human behavior
pubcrawl
deep learning
privacy
Neural networks
convolutional neural nets
authentication
Data processing
biometrics (access control)
Human Factors
computer vision
Privacy Threats
Perturbation methods
sensitive information
authentication systems
adversarial perturbation approach
adversarial stickers
biometric approaches
biometric-based authentication systems
CNN-based soft biometrics detection
computer vision tasks
daily life consumer electronics
Gender
keystroke dynamics
subject ethnicity
unwanted soft biometrics-based identification
Expert Systems and Privacy
biblio
Automated Repair of Cross-Site Scripting Vulnerabilities through Unit Testing
Submitted by
aekwall
on Mon, 09/28/2020 - 11:33am
security of data
Scalability
Resiliency
Human behavior
pubcrawl
internet
web applications
Web sites
program testing
program analysis
software maintenance
program diagnostics
software reliability
online front-ends
Web pages
sensitive information
fraud
static program analysis
application vulnerable
commit frauds
common programming error
Cross Site Scripting attacks
cross site scripting(XSS)
cross-site scripting vulnerabilities
detecting vulnerable web pages
dynamic program analysis
injection attacks
open source medical record application
software debugging
suggested encoder
Unit testing
untrusted data
untrusted dynamic content
vulnerability repair
vulnerable codes
XSS vulnerability
Cross Site Scripting
biblio
Analyzing the Security of Bluetooth Low Energy
Submitted by
grigby1
on Fri, 09/04/2020 - 3:26pm
encryption
Internet of Things
security
security of data
Protocols
Hardware
standards
pubcrawl
composability
Resiliency
resilience
Human behavior
IoT
sensitive information
Software
cyber physical systems
security standards
Internet of Things devices
Bluetooth
BLE devices
bluetooth low energy
malicious actors
Ubertooth
Cyber Physical System
bluetooth security
biblio
Bridging The Gap: Data Exfiltration In Highly Secured Environments Using Bluetooth IoTs
Submitted by
grigby1
on Fri, 09/04/2020 - 3:25pm
Cryptography
Internet of Things
security
computer network security
invasive software
pubcrawl
composability
Resiliency
resilience
Human behavior
IoT devices
sensitive information
Software
cyber physical systems
Payloads
Browsers
botnets
air gapped network
Bluetooth
Bluetooth IoT
Bluetooth smart bulb
Chromium
covert
data
Data Exfiltration
exfiltration
free-space optical communication
highly secured network
home networks
Image color analysis
insecure IoT
IoT
malicious actor
professional networks
security measures
security standard
sensitive environments
smart bulb
strict security policies
unprecedented threats
web bluetooth api
Cyber Physical System
bluetooth security
biblio
Extreme SDN Framework for IoT and Mobile Applications Flexible Privacy at the Edge
Submitted by
aekwall
on Mon, 08/10/2020 - 9:33am
IoT
Scalability
telecommunication traffic
Internet of Things
software defined networking
Resiliency
Human behavior
pubcrawl
privacy
Cryptography
smart phones
Mobile Applications
wireless LAN
Wireless fidelity
Software Defined Network
Wireless communication
mobile device
sensitive information
edge
Mobile communication
WLAN
Metrics
Android devices
application usage information
encrypted wireless traffic
Internet gateways
lightweight programmable privacy framework
PrivacyGuard framework
prominent network interface
software defined network-like paradigm
traffic shaping
WiFi encryption
WiFi links
WiFi networks
wireless network edge
wireless traffics
android encryption
biblio
Bridging The Gap: Data Exfiltration In Highly Secured Environments Using Bluetooth IoTs
Submitted by
grigby1
on Fri, 08/07/2020 - 2:38pm
air gapped network
Bluetooth
Bluetooth IoT
Bluetooth smart bulb
botnets
Browsers
computer network security
Cryptography
Data Exfiltration
free-space optical communication
highly secured network
home networks
Image color analysis
insecure IoT
Internet of Things
invasive software
IoT
IoT devices
malicious actor
Payloads
professional networks
pubcrawl
Science of Security
security
security measures
security standard
sensitive environments
sensitive information
Software
strict security policies
unprecedented threats
1
2
3
4
next ›
last »