Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
database
biblio
On Providing Information Security for Decentralized Databases
Submitted by grigby1 on Mon, 10/04/2021 - 3:03pm
database
role-based access control method
Public key
Permission
Object recognition
Information systems
information security
graph-oriented model
decentralized storage
object oriented security
Data models
consensus for accepting changes
blockchain
Access Control
pubcrawl
Metrics
composability
Resiliency
biblio
CP-SAM: Cyber-Power Security Assessment and Resiliency Analysis Tool for Distribution System
Submitted by grigby1 on Thu, 09/16/2021 - 11:50am
cyber-attacks
Cyber-security
database
Data models
Data visualization
distribution grid resiliency
Load modeling
Microgrids
open-source
power grids
pubcrawl
resilience
Resiliency
security
tools
visualization
biblio
An Anomaly Detection System for the Protection of Relational Database Systems against Data Leakage by Application Programs
Submitted by grigby1 on Tue, 08/31/2021 - 11:04am
insider attacks
static analysis
Resiliency
resilience
relational database security
pubcrawl
Performance analysis
Monitoring
Metrics
Anomaly Detection
Human behavior
Hidden Markov models
Databases
database
data leakage
composability
application profile
biblio
Detection of Phishing Websites using Machine Learning
Submitted by grigby1 on Thu, 05/20/2021 - 12:32pm
pubcrawl
Web Browser Security
Videos
Uniform resource locators
social networking (online)
Semantics
Semantic analysis methods
Resiliency
resilience
Browsers
phishing attack
Phishing
Metrics
machine learning
Human behavior
Electronic mail
database
Compositionality
biblio
A Mobile Edge Mitigation Model for Insider Threats: A Knowledgebase Approach
Submitted by grigby1 on Thu, 04/08/2021 - 4:55pm
Cloud Security
Organizations
mobile edge mitigation model
mobile edge computing mitigation model
Mobile Edge
knowledgebase approach
insider threat problem
dependency
database
cloud users
cloud internal users
insider threat
malicious insiders
malicious outsiders
cloud
security of data
Metrics
knowledge based systems
mobile computing
Cloud Computing
private data
data privacy
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
Insider Threats
Knowledgebase
biblio
Mathematical Formulation and Implementation of Query Inversion Techniques in RDBMS for Tracking Data Provenance
Submitted by aekwall on Mon, 03/30/2020 - 11:32am
RDBMS
unexpected results
Springs
relational database management system
relational algebra operations
relational algebra
query inversion techniques
Physics
mathematical formulations
mathematical formulation
inversion queries
inverse queries
Data-Intensive Applications
data provenance tracking
data provenance finding
data origin
History
data provenance
Provenance
Flowcharts
relational databases
finance
Databases
database
query processing
Metrics
biology
composability
pubcrawl
Human behavior
Resiliency
biblio
Blockchain Based Fine-Grained and Scalable Access Control for IoT Security and Privacy
Submitted by aekwall on Mon, 02/10/2020 - 11:43am
contracts
Microelectronics Security
transaction
scalable access control
Permission
multiindex table struct
fine-grained access control strategies
decentralized IoT system
access records
access control issue
smart contract
Predictive Metrics
Logic gates
IoT
IoT security
cryptocurrencies
database
blockchain
composability
pubcrawl
Resiliency
Internet of Things
data privacy
authorisation
Access Control
computer network security
biblio
Container Cluster Model Development for Legacy Applications Integration in Scientific Software System
Submitted by aekwall on Mon, 10/28/2019 - 10:38am
MD - SLAG – MELT
computing applications
container
container cluster model development
containerization systems
distributed computer simulation
high-efficiency computing
high-performance computing
intellectual processing
legacy applications integration
mathematical analysis
computer software
MD-SLAG-MELT system
modern scientific information systems
molecular dynamic Modeling
nonstandardized interfaces
programming languages
scientific software system
system MD-SLAG-MELT
ubiquitous computing
Scientific Computing Security
Load modeling
Big Data
computer architecture
Resiliency
pubcrawl
Computational modeling
database
Databases
Software systems
software maintenance
Containers
Servers
pattern clustering
business data processing
visualization
Predictive Metrics
scientific information systems
Compositionality
cluster
computer experiments results
computer simulation systems
biblio
Detection of SQL injection attacks by removing the parameter values of SQL query
Submitted by aekwall on Mon, 02/25/2019 - 11:39am
privacy
web services
web applications
tools
Structured Query Language
SQL query
SQL Injection attacks
SQL injection attackers
SQL injection attack detection method
SQL injection
SQL
Runtime
Resiliency
query processing
pubcrawl
backend database
policy-based-governance
parameter values
mobile web applications
mobile computing
Metrics
Internet users
internet
Human behavior
desktop web application
Databases
database
confidential information
Conferences
Computer crime
biblio
Seeing is Believing: A Client-Centric Specification of Database Isolation
Submitted by grigby1 on Thu, 08/23/2018 - 11:52am
distributed storage
weak consistency
transactions
serializability
resilience
pubcrawl
isolation
eventual consistency
distributed systems
Control Theory
database
consistency
concurrency control
Computing Theory
cloud storage
acid
Resiliency
1
2
next ›
last »