Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
server
biblio
HTTP security headers analysis of top one million websites
Submitted by grigby1 on Fri, 11/20/2020 - 1:15pm
tools
security of data
security
pubcrawl
policy-based governance
collaboration
internet
Protocols
Databases
World Wide Web
Web sites
HTTPs
websites
Uniform resource locators
transport protocols
X.509 Certificate
Alexa top one million list
Charge coupled devices
content security policy
content-security-policy
HTTP headers
HTTP response headers analysis
HTTP security headers analysis
HTTP strict transport security
HTTP/2
HTTPS requests
hypermedia
redirections
referrer-policy
server
set-cookie
strict- transport-security
top one million websites survey
web security
web security policies
www subdomain
X-content-type
X-frame-options
X-XSS-protection
Security Policies Analysis
biblio
IoT Server Availability Considering DDoS-Attacks: Analysis of Prevention Methods and Markov Model
Submitted by grigby1 on Wed, 12/18/2019 - 1:47pm
authentication
composability
computer network security
Databases
DDoS Attack Prevention
DDoS-attack
DDoS-attacks
dependability
encryption
Human behavior
Industrial Internet of Things
Internet of Things
IoT server availability
Markov model
Markov processes
Metrics
network servers
prevention methods
pubcrawl
Random access memory
resilience
Resiliency
SBC network
SBC server protection
server
Servers
smart business center diagnostics
Software
storage management
technical diagnostics
biblio
Secured aerial photography using Homomorphic Encryption
Submitted by grigby1 on Mon, 12/04/2017 - 11:58am
aerial photography
aerial photography security
Amazon EC2 cloud server
cloud
Cloud Computing
Compositionality
concatenation
Drone
drones
encryption
Homomorphic encryption
image capture
image encryption
Image quality
Metrics
multiagent system
NTRU
photography
pubcrawl
public key cryptography
public key cryptosystem
Resiliency
Scientific Computing Security
server
Servers
biblio
A survey of distributed denial of service attack
Submitted by grigby1 on Mon, 11/20/2017 - 11:05am
botnets
Cloud Computing
Computer crime
computer network security
DDoS
DDoS attack detection strategies
distributed denial of service attack
Floods
Human behavior
Human Factors
information security
Interconnected Systems
IP networks
Metrics
Protocols
pubcrawl
Resiliency
resources
server
Servers
TCP
UDP
video surveillance
biblio
Design and Implementation of Kerberos Using DES Algorithm
Submitted by grigby1 on Thu, 05/18/2017 - 1:19pm
client
DES (Data Encryption Standard)
Human behavior
KDC (Key Distribution Center)
Kerberos
Metrics
pubcrawl
Resiliency
server
biblio
Towards robust, scalable and secure network storage in Cloud Computing
Submitted by BrandonB on Wed, 05/06/2015 - 1:11pm
adaptive security
authentication
Availability
built in security
client overhead
Cloud Computing
cloud computing environment
cloud service provider
Compliance
computer architecture
confidentiality
data integrity
data privacy
Data Security
data sharing
data storage
Distributed databases
information centric security
integrity
internet
middleware
network storage architecture
networking
on-demand access
operating system
pay per use model
privacy
proactive security
RAID
remote application access
remote service access
robust scalable secure network storage
security of data
server
Servers
service availability
service outsourcing
storage management
ubiquitous computing
ubiquitous next generation information technology architecture
virtualisation
Virtualization
biblio
A survey of Black hole attack detection in Manet
Submitted by BrandonB on Wed, 05/06/2015 - 7:56am
academic purpose
Ad-HOC
AODV protocol
Black hole attack
black hole attack detection
client
client-server systems
decentralised network
emergency communication
Europe
MANET
military communication
mobile ad hoc networks
mobile ad-hoc network
Mobile communication
mobile conferencing
network servers
Peer-to-peer computing
peer-to-peer network
radiowave propagation
received RREQ
route discovery
Routing protocols
RREP
RREQ
security
server
telecommunication security
biblio
Towards robust, scalable and secure network storage in Cloud Computing
Submitted by BrandonB on Thu, 04/30/2015 - 1:38pm
adaptive security
authentication
Availability
built in security
client overhead
Cloud Computing
cloud computing environment
cloud service provider
Compliance
computer architecture
confidentiality
data integrity
data privacy
Data Security
data sharing
data storage
Distributed databases
information centric security
integrity
internet
middleware
network storage architecture
networking
on-demand access
operating system
pay per use model
privacy
proactive security
RAID
remote application access
remote service access
robust scalable secure network storage
security of data
server
Servers
service availability
service outsourcing
storage management
ubiquitous computing
ubiquitous next generation information technology architecture
virtualisation
Virtualization
file
Building the Security Behavior Observatory: An Infrastructure for Long-term Monitoring of Client Machines (slides)
Submitted by Acquisti Alessandro on Wed, 06/04/2014 - 8:44am. Contributors:
Alain Forget
Saranga Komanduri
Alessandro Acquisti
Nicolas Christin
Lorrie Faith Cranor
Rahul Telang
Data collection
field study
Infrastructure
observation
server
users
HotSoS 2014
Academia
Poster
Poster Slides
Poster Slides
file
Building the Security Behavior Observatory: An Infrastructure for Long-term Monitoring of Client Machines (poster)
Submitted by Acquisti Alessandro on Wed, 06/04/2014 - 8:43am. Contributors:
Alain Forget
Saranga Komanduri
Alessandro Acquisti
Nicolas Christin
Lorrie Faith Cranor
Rahul Telang
Slides of the poster are available
here
.
Data collection
field study
observation
server
users
HotSoS 2014
Academia
Poster
Posters
Posters