Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Google
biblio
A Study on Analytical Visualization of Deep Web
Submitted by grigby1 on Fri, 01/15/2021 - 11:22am
analysis
Computer crime
crime information visual system
crime management
crime monitoring
Crime Trace
Cryptography
dark web
data visualisation
Data visualization
Databases
deep web
deep Web visualization
drugs
Google
Human behavior
Human Factors
internet
Java
pubcrawl
search engines
security
Tors encryption client
unknown dark channels
visualization
biblio
The privacy paradigm : An overview of privacy in Business Analytics and Big Data
Submitted by grigby1 on Mon, 12/28/2020 - 11:37am
privacy
data analysis
Data mining
business data processing
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
data privacy
information technology
Big Data
Companies
Data protection
Google
big data privacy
analytics
business analytics
dados
data mining technologies
GPDR
privacy paradigm
Technology management
biblio
iDaaS: Inter-Datacenter Network as a Service
Submitted by grigby1 on Tue, 12/01/2020 - 3:37pm
Bandwidth
bandwidth allocation
bandwidth guarantee
bandwidth price
bandwidth reservation algorithms
bandwidth trading market
Cloud Computing
collaboration
composability
computer centres
Distributed databases
efficient bandwidth pricing algorithm
game theory
Games
Google
Human behavior
Human Factors
iDaaS provider
Inter-datacenter network
Inter-Datacenter Network as a Service
internet
Internet giants
Internet-scale applications
Internet-scale Computing Security
lower bandwidth price
Metrics
multiple iDaaS providers
Policy Based Governance
predictable network performance
Pricing
private wide area networks
pubcrawl
resilience
Resiliency
Scalability
service-inter-datacenter network
Stackelberg game
telecommunication traffic
traditional application providers
unpredictable network performance
video streaming
WANs
wide area networks
wide area traffic
biblio
Search Prevention with Captcha Against Web Indexing: A Proof of Concept
Submitted by grigby1 on Fri, 09/11/2020 - 10:44am
security of data
security
pubcrawl
Human behavior
internet
composability
search engines
Web pages
Google
information retrieval
indexing
captchas
CAPTCHA
captcha version
containing sensitive words
Crawlers
Google search engine
malicious web crawlers
search engine
search engine bot
search engine database
search prevention
search prevention algorithm
Web crawler
web index
web indexing
web-based captcha conversion tool
webpages
biblio
A Survey of Research on CAPTCHA Designing and Breaking Techniques
Submitted by grigby1 on Fri, 09/11/2020 - 10:43am
security of data
security
pubcrawl
Human behavior
composability
computer science
Google
security mechanism
usability
captchas
CAPTCHA
attack methods
audio/video based
CAPTCHA breaking techniques
CAPTCHA categories
CAPTCHA designing techniques
Completely Automated Public Turing Test to Tell Computers and Humans Apart
image segmentation
image-based
Speech recognition
text-based
biblio
Detection of Near Field Communication (NFC) Relay Attack Anomalies in Electronic Payment Cases using Markov Chain
Submitted by aekwall on Tue, 09/08/2020 - 8:59am
security of data
Scalability
security
Data models
Resiliency
pubcrawl
Google
relay attack
Relays
embedded system security
Markov processes
Training data
Near Field Communication
attack anomalies
electronic payment cases
intrusive detection system
markov chain
near-field communication
target NFC network
Chained Attacks
biblio
A Combined Attack-Tree and Kill-Chain Approach to Designing Attack-Detection Strategies for Malicious Insiders in Cloud Computing
Submitted by grigby1 on Fri, 08/28/2020 - 11:02am
Chained Attacks
attack tree
attack trees
attack vector
Attack vectors
attack-detection strategies
Aviva Insurance
bank data processing
cloud cluster
Cloud Computing
cloud paradigms
cloud-computing environment
cloud-computing services
cloud-service environments
cloud-service providers
combined attack-tree
Companies
Computer crime
Google
Human behavior
Indirect Detection
indirect detection opportunities
insider attack
insider attacks
Kill Chain
kill-chain approach
kill-chain based method
malicious insider
malicious insiders
Measurement
multiple indirect detection measures
Packet Sniffing
pubcrawl
resilience
Resiliency
Scalability
security of data
Servers
SIM-card manufacturer Gemalto
Tesla
trees (mathematics)
Undetectable Attacks
virtual machines
Virtual machining
biblio
SlingShot - Automated Threat Detection and Incident Response in Multi Cloud Storage Systems
Submitted by aekwall on Mon, 08/24/2020 - 11:40am
security of data
Cloud Computing
security
real-time systems
Resiliency
pubcrawl
composability
Google
web services
cyber-attacks
Correlation
Automated Response Actions
security events
security issues
storage management
chaos
Guidelines
security risk assessment
threat detection
Amazon Web Services
Cloud-Security
Amazon S3
automated threat detection
cloud event log
cloud storage infrastructure
cloud storage security
cloud threat detection
contemporary cloud attacks
CSBAuditor
dynamic methods
dynamic snapshotting
Google cloud platform
Google cloud storage
Incident Response
incident response system
multicloud storage systems
recovery strategies
SlingShot
static methods
biblio
Overprivileged Permission Detection for Android Applications
Submitted by aekwall on Mon, 08/10/2020 - 9:32am
security of data
Scalability
encryption
data privacy
mobile computing
privacy leakage
Resiliency
Human behavior
pubcrawl
Google
privacy
tools
smart phones
Data mining
Cameras
Android (operating system)
Android applications
Metrics
smartphone
Android system
App protection technology
Droidtector
frequent item set mining
overprivileged permission detection
permission mechanism
android encryption
biblio
Same App, Different Countries: A Preliminary User Reviews Study on Most Downloaded iOS Apps
Submitted by grigby1 on Thu, 07/30/2020 - 1:33pm
security
Data mining
Forestry
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
software quality
mobile computing
Metrics
Compositionality
operating systems (computers)
Software algorithms
Google
iOS Security
15 most downloaded iOS apps
300 user reviews
643 user reviews
analyzing user reviews
App Store Analytics
differentiate reviews
mining
mobile app reviews
preliminary user reviews study on most downloaded iOS apps
requirement engineering
software evolution
software maintenance
Text Mining
US App Store
User Reviews Analysis
1
2
3
4
5
next ›
last »