Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Google
biblio
A Dynamic Analysis Security Testing Infrastructure for Internet of Things
Submitted by grigby1 on Tue, 02/16/2021 - 12:46pm
Internet of Things
security
data analysis
Monitoring
IoT
pubcrawl
Metrics
resilience
Resiliency
computer network security
IoT devices
data privacy
telecommunication traffic
composability
network traffic
Reliability
security controls
testing
Google
dynamic analysis
Amazon Echo
security testing
Amazon devices
dynamic analysis security testing infrastructure
Google devices
Google Home
live traffic monitoring
offline data analysis
software analysis
dynamic networks
biblio
Profiling Vulnerabilities Threatening Dual Persona in Android Framework
Submitted by grigby1 on Thu, 01/28/2021 - 1:31pm
android encryption
Android (operating system)
Android 5
Android for Work
Android Lollipop release
Android platform
Android security model
Android smartphones
Android vulnerabilities
Android vulnerability Website
Androids
BYOP
certificate forging
checksum collisions
crafted MMS
CYOD
dual persona
EMM
encryption
FUM score
Google
GSuite
Human behavior
inter-process communication
IPC
Kernel
malware
managed profiles
Market research
Metrics
mobile computing
National Vulnerability Database NVD
Pingroot
profiling vulnerabilities threatening dual persona
pubcrawl
Quadroot
resilience
Resiliency
Scalability
security of data
security threat analysis
smart phones
smartphone
Stagefright
unrestricted access
vulnerable Android versions
biblio
A Study on Analytical Visualization of Deep Web
Submitted by grigby1 on Fri, 01/15/2021 - 12:22pm
analysis
Computer crime
crime information visual system
crime management
crime monitoring
Crime Trace
Cryptography
dark web
data visualisation
Data visualization
Databases
deep web
deep Web visualization
drugs
Google
Human behavior
Human Factors
internet
Java
pubcrawl
search engines
security
Tors encryption client
unknown dark channels
visualization
biblio
The privacy paradigm : An overview of privacy in Business Analytics and Big Data
Submitted by grigby1 on Mon, 12/28/2020 - 12:37pm
privacy
data analysis
Data mining
business data processing
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
data privacy
information technology
Big Data
Companies
Data protection
Google
big data privacy
analytics
business analytics
dados
data mining technologies
GPDR
privacy paradigm
Technology management
biblio
iDaaS: Inter-Datacenter Network as a Service
Submitted by grigby1 on Tue, 12/01/2020 - 4:37pm
Bandwidth
bandwidth allocation
bandwidth guarantee
bandwidth price
bandwidth reservation algorithms
bandwidth trading market
Cloud Computing
collaboration
composability
computer centres
Distributed databases
efficient bandwidth pricing algorithm
game theory
Games
Google
Human behavior
Human Factors
iDaaS provider
Inter-datacenter network
Inter-Datacenter Network as a Service
internet
Internet giants
Internet-scale applications
Internet-scale Computing Security
lower bandwidth price
Metrics
multiple iDaaS providers
Policy Based Governance
predictable network performance
Pricing
private wide area networks
pubcrawl
resilience
Resiliency
Scalability
service-inter-datacenter network
Stackelberg game
telecommunication traffic
traditional application providers
unpredictable network performance
video streaming
WANs
wide area networks
wide area traffic
biblio
Search Prevention with Captcha Against Web Indexing: A Proof of Concept
Submitted by grigby1 on Fri, 09/11/2020 - 11:44am
security of data
security
pubcrawl
Human behavior
internet
composability
search engines
Web pages
Google
information retrieval
indexing
captchas
CAPTCHA
captcha version
containing sensitive words
Crawlers
Google search engine
malicious web crawlers
search engine
search engine bot
search engine database
search prevention
search prevention algorithm
Web crawler
web index
web indexing
web-based captcha conversion tool
webpages
biblio
A Survey of Research on CAPTCHA Designing and Breaking Techniques
Submitted by grigby1 on Fri, 09/11/2020 - 11:43am
security of data
security
pubcrawl
Human behavior
composability
computer science
Google
security mechanism
usability
captchas
CAPTCHA
attack methods
audio/video based
CAPTCHA breaking techniques
CAPTCHA categories
CAPTCHA designing techniques
Completely Automated Public Turing Test to Tell Computers and Humans Apart
image segmentation
image-based
Speech recognition
text-based
biblio
Detection of Near Field Communication (NFC) Relay Attack Anomalies in Electronic Payment Cases using Markov Chain
Submitted by aekwall on Tue, 09/08/2020 - 9:59am
security of data
Scalability
security
Data models
Resiliency
pubcrawl
Google
relay attack
Relays
embedded system security
Markov processes
Training data
Near Field Communication
attack anomalies
electronic payment cases
intrusive detection system
markov chain
near-field communication
target NFC network
Chained Attacks
biblio
A Combined Attack-Tree and Kill-Chain Approach to Designing Attack-Detection Strategies for Malicious Insiders in Cloud Computing
Submitted by grigby1 on Fri, 08/28/2020 - 12:02pm
Chained Attacks
attack tree
attack trees
attack vector
Attack vectors
attack-detection strategies
Aviva Insurance
bank data processing
cloud cluster
Cloud Computing
cloud paradigms
cloud-computing environment
cloud-computing services
cloud-service environments
cloud-service providers
combined attack-tree
Companies
Computer crime
Google
Human behavior
Indirect Detection
indirect detection opportunities
insider attack
insider attacks
Kill Chain
kill-chain approach
kill-chain based method
malicious insider
malicious insiders
Measurement
multiple indirect detection measures
Packet Sniffing
pubcrawl
resilience
Resiliency
Scalability
security of data
Servers
SIM-card manufacturer Gemalto
Tesla
trees (mathematics)
Undetectable Attacks
virtual machines
Virtual machining
biblio
SlingShot - Automated Threat Detection and Incident Response in Multi Cloud Storage Systems
Submitted by aekwall on Mon, 08/24/2020 - 12:40pm
security of data
Cloud Computing
security
real-time systems
Resiliency
pubcrawl
composability
Google
web services
cyber-attacks
Correlation
Automated Response Actions
security events
security issues
storage management
chaos
Guidelines
security risk assessment
threat detection
Amazon Web Services
Cloud-Security
Amazon S3
automated threat detection
cloud event log
cloud storage infrastructure
cloud storage security
cloud threat detection
contemporary cloud attacks
CSBAuditor
dynamic methods
dynamic snapshotting
Google cloud platform
Google cloud storage
Incident Response
incident response system
multicloud storage systems
recovery strategies
SlingShot
static methods
1
2
3
4
5
next ›
last »