Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Data protection
biblio
Analysis of the Most Common Software and Hardware Vulnerabilities in Microprocessor Systems
Submitted by grigby1 on Thu, 03/04/2021 - 1:45pm
Windows operating system
security
authorisation
composability
Computer crime
computer viruses
Computers
Cryptography
Data protection
encryption program
File systems
Hardware
hardware algorithm protection
hardware vulnerabilities
hardware vulnerability
information protection
information security
invasive software
local computer calculation network
Metrics
microcomputers
microprocessor systems
Microsoft Windows (operating systems)
network access
Production
Program processors
pubcrawl
remote attack
resilience
Resiliency
Server Message Block service
Silicon
Software Vulnerability
Transistors
WannaCry trojan encoder
Windows Operating System Security
Windows OS
biblio
Introducing Code Assets of a New White-Box Security Modeling Language
Submitted by grigby1 on Thu, 03/04/2021 - 1:35pm
White Box Security
white box
security
Analytical models
attacker
binary code
Binary codes
code assets
code security
composability
Computational modeling
Computer crime
Conferences
Data protection
i-WBS
Metrics
pubcrawl
resilience
Resiliency
reverse engineer
Security modeling language
Software
software protection solutions
software protection technologies
source code (software)
specification languages
testing
WB security analysis
White-box security
white-box security modeling language
biblio
Enhanced Privacy and Data Protection using Natural Language Processing and Artificial Intelligence
Submitted by aekwall on Mon, 02/22/2021 - 12:39pm
Artificial Intelligence
artificial intelligence systems
artificial intelligence training
data obfuscation procedures
data privacy
Data protection
digital documents
Human behavior
knowledge transfer
machine learning
Medical services
natural language processing
physical documents
privacy
privacy preservation
pubcrawl
Resiliency
Scalability
Sensitive Data Extraction
sensitive information
specific-domain knowledge data sets
Task Analysis
text analysis
unlabeled domain-specific documents corpora
unsupervised machine learning
biblio
Cookies in a Cross-site scripting: Type, Utilization, Detection, Protection and Remediation
Submitted by grigby1 on Wed, 02/10/2021 - 12:20pm
Cryptography
encryption
security of data
pubcrawl
Human behavior
resilience
Resiliency
Scalability
internet
Data protection
security vulnerabilities
Artificial Intelligence
Browsers
web applications
classification
cross-site scripting
artificial intelligence techniques
Cisco 2018
cookies
mitigation
protection
spyware
XSS
Cross Site Scripting
biblio
A Descriptive Study on Homomorphic Encryption Schemes for Enhancing Security in Fog Computing
Submitted by aekwall on Mon, 02/01/2021 - 10:33am
Cloud Computing
Scalability
Servers
Data Security
encryption
data integrity
data encryption
Resiliency
pubcrawl
privacy
Metrics
Data protection
public key cryptography
False Data Injection
security threats
edge computing
RSA
Human Factors
Fog computing
Homomorphic encryption
Application of Homomorphic Encryption
Brakerski-Gentry-Vaikuntanathan model
crypto-algorithms
ElGamal based algebric homomorphic encryption
homomorphic cryptosystem
homomorphic encryption schemes
in-direct rapid homomorphic encryption
Pailier
public key cryptosystem
public key cryptosystems
Terminology
work flow
biblio
Data Anonymization: K-anonymity Sensitivity Analysis
Submitted by grigby1 on Thu, 01/28/2021 - 1:01pm
anonymity
ARX
ARX k-anonymization
Brazilian higher education evaluation system
central governments
composability
data anonimization
data anonymization
data privacy
Data protection
data usability
digitization process
education
European General Data Protection Regulation
further education
GDPR
government data processing
Human behavior
k-anonymity
k-anonymity sensitivity analysis
local authorities
Metrics
open government data
personal data privacy
personal data protection
pubcrawl
resilience
Resiliency
sensitivity analysis
Social Justice
Sociology
Statistics
tools
biblio
Differential Privacy Algorithm Based on Personalized Anonymity
Submitted by grigby1 on Thu, 01/28/2021 - 12:58pm
anonymity
Classification algorithms
Clustering algorithms
composability
Data models
Data protection
differential privacy
differential privacy data publishing algorithm
existing anonymized differential privacy
Human behavior
Metrics
pattern classification
personalized anonymity
personalized k-anonymity model
privacy
privacy protection relevance
pubcrawl
Publishing
quasiidentifier attribute
resilience
Resiliency
security of data
tuple personality factor classification value
biblio
An Empirical Evaluation of GDPR Compliance Violations in Android mHealth Apps
Submitted by grigby1 on Thu, 01/28/2021 - 12:33pm
android encryption
Android apps
Android mHealth
app code
app implementations
app privacy policy
app users
data collections
data flow
data practices
data privacy
Data protection
Data Transmission
GDPR
GDPR compliance violations
GDPR lists general rules
General Data Protection Regulation
GUI
Human behavior
medical computing
medical information systems
Metrics
mHealth apps
mobile computing
patient monitoring
personal data
privacy
Privacy Policies
Privacy Policy
privacy protection
pubcrawl
resilience
Resiliency
Scalability
security
security of data
Semantics
sensitive data
severe privacy issues
severe privacy threats
software reliability
step-by-step guidelines
Systematics
biblio
A Novel Anti-Collusion Audio Fingerprinting Scheme Based on Fourier Coefficients Reversing
Submitted by grigby1 on Wed, 01/20/2021 - 3:09pm
Acoustic Fingerprints
Acoustic signal processing
Anti-collusion
anticollusion audio fingerprinting
audio coding
audio copyright protection
audio fingerprint
audio quality
audio signal
colluded audio
composability
computer security
copyright
data encapsulation
data hiding
Data protection
Data Security
Fingerprint recognition
Fourier coefficients
Fourier transform
Fourier transforms
frequency-domain analysis
Human behavior
illegal redistributed audio copies
illegal redistribution
Media
multimedia computing
multimedia fingerprinting coding
pubcrawl
resilience
Resiliency
Resists
security of data
biblio
Encrypted Keyword Search in Cloud Computing using Fuzzy Logic
Submitted by aekwall on Mon, 01/18/2021 - 10:34am
Cloud Computing
Scalability
Servers
Keyword search
authorisation
Cryptography
data confidentiality
encryption
data encryption
Resiliency
pubcrawl
Metrics
query processing
Data protection
Fuzzy logic
fuzzy set theory
Indexes
information management
search engines
sensitive information
vital information
cloud service providers
complex Boolean queries
encrypted keyword search
fuzzy keyword search
Fuzzy Keyword Sets
information management professionals
keyword privacy
keyword safety
N-grams
Privacy Preserving Fuzzy Search
user document protection
Fuzzy Cryptography
1
2
3
4
5
6
7
8
9
…
next ›
last »