Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
unauthorized access
biblio
Biometric System of Access to Information Resources
Submitted by aekwall on Tue, 03/09/2021 - 11:57am
biometric encryption
authoring languages
authorisation
biometric system
C language
developed complex
embedded scripts
fingerprint
Google Chrome extension
hardware complex
HTML hypertext markup language
hypermedia markup languages
Identification
information resource
information resources
information resourses
internet
Java
JavaScript
Metrics
online front-ends
personal data
PHP scripting language
phpMyAdmin database server
pubcrawl
Resiliency
Scalability
software and hardware complex
structural schematic diagram
unauthorized access
web resource
webhost web server
biblio
IoT-APIScanner: Detecting API Unauthorized Access Vulnerabilities of IoT Platform
Submitted by grigby1 on Wed, 01/20/2021 - 4:22pm
API
API test cases
API unauthorized access vulnerability detection
APIs
application program interfaces
application programming interface
authorisation
cloud API
Cloud Computing
cloud services
Compositionality
data privacy
formal verification
Internet of Things
IoT devices
IoT security
IoT-APIScanner
permission verification
program testing
pubcrawl
resilience
Resiliency
security
Smart homes
Task Analysis
timing
tools
unauthorized access
user privacy
Web API
biblio
Enhanced Honey Encryption Algorithm for Increasing Message Space against Brute Force Attack
Submitted by grigby1 on Fri, 09/04/2020 - 3:24pm
Cryptography
encryption
authorisation
unauthorized access
honey encryption
Data Security
probability
pubcrawl
collaboration
Decoding
Data protection
Force
Web sites
Databases
password
encoding
Human Factors
policy-based governance
Brute Force Attack
CDF
cumulative distribution function
discrete distribution function
Distribution functions
distribution probability theory
distribution transforming encoder
honey encryption algorithm
honeywords generation method
message space limitation
message space limitation problem
message transmission
user data protection algorithm
brute force attacks
biblio
Data Security Enhancement in Cloud Computing Using Multimodel Biometric System
Submitted by grigby1 on Fri, 08/28/2020 - 3:43pm
Ciphers
Cryptography
authorisation
pubcrawl
Metrics
Resiliency
Conferences
AES
Scalability
Cloud Computing
encoding
biometrics (access control)
Data Security
resilience
smart phones
confidential data
information retrieval
Smartphones
confidential information
biometric encryption
DNA
AES cipher
data centers
data hiding
data leak
data security enhancement
DNA cipher
DNA encryption
Encoding and Decoding
information storage
multimodal biometric system
multimodel biometric system
multiple security system
polymers
security authentication
unauthorized access
biblio
An Intrusion Detection System Based Secured Electronic Service Delivery Model
Submitted by aekwall on Mon, 02/24/2020 - 10:57am
intrusion detection system
Cloud Computing
Servers
authorisation
data privacy
Conferences
Resiliency
Human behavior
pubcrawl
composability
component
Computational modeling
Metrics
internet
Intrusion Detection
smart cards
unauthorized access
bank data processing
digital communication
government data processing
Banking
Cloud Banking
cloud banking transaction
cloud service model
ICT
identification number
information-and-communication technology
message communication
multifaceted electronic services
open channel
PINA
privacy-integrity-nonrepudiation-and-authentication information
secured electronic service delivery model
security lapses
single window based cloud service delivery model
Smart card
Repudiation
biblio
IoT Data Management and Lineage Traceability: A Blockchain-based Solution
Submitted by aekwall on Mon, 11/25/2019 - 2:12pm
Outsourced Database Integrity
Metrics
composability
Resiliency
authorization
blockchain
blockchain-based data management
Cloud Computing
Cryptography
data integrity
data management
data privacy
data provenance
Distributed databases
edge clouds
fog nodes
Internet of Things
Internet of Things (IoT)
interoperability
IoT data management
lineage traceability
open systems
privacy
Privacy Threats
program diagnostics
pubcrawl
security threats
Servers
smart contracts
Trusted Computing
unauthorized access
untrusted IoT devices
biblio
Detection of Temporal Data Ex-Filtration Threats to Relational Databases
Submitted by aekwall on Mon, 11/04/2019 - 11:23am
Inspection
Monitoring
authorisation
real-time systems
feature extraction
Resiliency
Human behavior
pubcrawl
composability
Metrics
query processing
Training
Anomaly Detection
data theft
relational databases
unauthorized access
relational database security
anomalous access detection
anomaly detection techniques
Data Analytics for Security
Insider Threats
Temporal Attacks
temporal data ex-filtration threat detection
biblio
Enhanced Secure Mechanism for Virtual Machine Migration in Clouds
Submitted by grigby1 on Tue, 10/15/2019 - 2:44pm
authentication
authorisation
authorization
AVISPA tool
Cloud Computing
Cloud federations
composability
Computational modeling
computer viruses
data confidentiality
data integrity
DDoS Attacks
enhanced secure mechanism
Human behavior
live migration
live VM migration
malicious viruses
Metrics
mutual authentication
pubcrawl
replay protection
Repudiation
resilience
Resiliency
Software as a service
source nonrepudiation
unauthorized access
Virtualization
virtual machine migration
Virtual machine monitors
virtual machines
VM disk images
vulnerabilities
biblio
A method to detect Internet of Things botnets
Submitted by aekwall on Mon, 05/20/2019 - 10:00am
authorisation
botnet
Botnet detection
botnets
common characteristics
composability
computer network security
Cybersecurity
Human behavior
Internet of Things
invasive software
IoT
IoT devices
IoT Security 2018
logistic regression
Logistics
main security problems
malware
Metrics
performance evaluation
Protocols
pubcrawl
Resiliency
security
security of data
unauthorized access
widespread botnets
biblio
Modeling of quantum channel parameters impact on information exchange security
Submitted by grigby1 on Mon, 01/21/2019 - 12:39pm
adversary
Adversary Models
attack on the protocol
attenuation
authorisation
C++ language
cryptanalysis
cryptographic security
Cryptography
Human behavior
information exchange security
information security
Metrics
Photonics
photons
Polarization
Protocols
pubcrawl
Qt Creator C++ program package
quantum channel imperfections
quantum channel parameters impact modeling
quantum communication channel
quantum computer
quantum computing
quantum computing security
quantum information exchange computer emulator
Quantum Key Distribution
Resiliency
Scalability
software packages
unauthorized access
1
2
next ›
last »