Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
data integrity
biblio
Nodal Authentication of IoT Data Using Blockchain
Submitted by grigby1 on Fri, 04/10/2020 - 12:53pm
IoT data
Cloud Security
connected nodes
cryptocurrencies
cyber-attacks
data communication
data integrity security
GOST algorithm
home automation
cloud computing security
IoT field
nodal authentication
nodal verification
pervasive systems
self organizing networks
transmitted data
Pervasive Computing Security
Human Factors
data integrity
Internet of Things
industrial applications
security of data
authentication
Scalability
computer architecture
blockchain
Cloud Computing
Cryptography
pubcrawl
Metrics
Resiliency
resilience
Human behavior
IoT
agriculture applications
biblio
Towards Improved Trust in Threat Intelligence Sharing using Blockchain and Trusted Computing
Submitted by aekwall on Mon, 04/06/2020 - 10:15am
Human Factors
peer to peer security
trust enhancement framework -TITAN
Threat intelligence sharing
sharing effectiveness
sharing architectures
P2P reputation systems
open trust issues
decentralized sharing
decentralized blockchain
cybersecurity attacks
TEE
reputation
Cryptography
Scalability
cyber security
Distributed databases
blockchain
Metrics
Peer-to-peer computing
pubcrawl
Resiliency
Trusted Computing
data integrity
data privacy
Data Security
biblio
Secure and Scalable Trust Management Model for IoT P2P Network
Submitted by aekwall on Mon, 04/06/2020 - 10:14am
security issues
peer to peer security
P2P network
large-scale trust model
IoT trust management
IoT resources
IoT P2P network
IoT entities
Holochain
fog node approach
distributed trust management model
DHT
centralized models
blockchain-based trust management model
Trust management
security of data
Human Factors
Scalability
IoT security
Reliability
blockchain
Metrics
Peer-to-peer computing
component
pubcrawl
Resiliency
Data models
Trusted Computing
data integrity
Internet of Things
biblio
Privacy-Enabled Recommendations for Software Vulnerabilities
Submitted by aekwall on Mon, 03/23/2020 - 1:30pm
recommender systems
vulnerability profiles
vulnerability prioritization data
software vulnerabilities
software reliability
Software
slow process
SGX
security of data
security
Scalability
Resiliency
Complexity theory
recommender system
recommender
pubcrawl
privacy-enabled recommendations
privacy
Organizations
malicious operator
Human Factors
data privacy
data integrity
costly process
biblio
A Platform for Private and Controlled Spreadsheet Objects Sharing
Submitted by grigby1 on Wed, 03/18/2020 - 12:26pm
groupware
Secure File Sharing
resilience
Resiliency
pubcrawl
tabular data
spreadsheets collaborative authoring applications
Spreadsheets
Spreadsheet programs
spreadsheet objects sharing
spreadsheet file sharing
sensitive data sharing
Secure spreadsheet data sharing
privacy
office automation
Cryptography
Data visualization
data storage
data integrity
data analysis
confidential data exchange
Computer supported collaborative work
collaborative editing
collaborative analytics
business data processing
storage management
Protocols
data privacy
authorisation
biblio
Efficient Privacy Preserving and Dynamic Public Auditing for Storage Cloud
Submitted by aekwall on Mon, 03/09/2020 - 11:06am
Auditor
Security Audits
TPA
third party auditor
stored data
storage correctness
storage cloud
public auditing scheme
public auditing
privacy preserving auditing
dynamic public auditing
data dynamics operations
data dynamics
cloud storage service
Batch Auditing
Cloud Computing
auditing
storage management
Scalability
Merkle hash tree
cloud server
integrity
privacy
pubcrawl
Human behavior
Resiliency
data integrity
data privacy
storage server
Cryptography
biblio
A Systematic Review of the Third Party Auditing in Cloud Security: Security Analysis, Computation Overhead and Performance Evaluation
Submitted by aekwall on Mon, 03/09/2020 - 11:05am
computational overhead
Security Audits
TPA methods
third party auditing method
Third Party Auditing
systematic review
public auditing
Merkel hash tree method
Merkel hash tree
data integrity checking method
considerable efficiency
computation overhead
communication cost
storage management
security of data
Scalability
Cloud Security
performance evaluation
program verification
Security analysis
privacy
pubcrawl
Human behavior
Resiliency
data integrity
cloud storage
Data Security
Cloud Computing
biblio
Consortium Blockchain-Based Architecture for Cyber-Attack Signatures and Features Distribution
Submitted by grigby1 on Mon, 03/02/2020 - 1:31pm
IDS
Tamper resistance
Signatures
security
Scalability
pubcrawl
Permissionless
Metrics
malicious activities
latency
blockchain
Human Factors
Human behavior
features
data integrity
Data injection
data consistency
cyberattacks
cooperative intrusion detection
biblio
FIXER: Flow Integrity Extensions for Embedded RISC-V
Submitted by aekwall on Mon, 02/24/2020 - 11:01am
integrated Rocket Custom Coprocessor
program compilers
security framework
RISC-V
buffer overflow
Code injection
coprocessors
fine-grained control-flow integrity
FIXER
flow integrity extensions for embedded RISC-V
return oriented programming
low-power embedded devices
open source architecture
RISC-V architecture
RISC-V processor core
RISC-V SoC platform
RISC-V toolchains
Rockets
security extension
shadow stack
Buffer overflows
Scalability
Internet of Things
data integrity
Hardware
security
embedded systems
reduced instruction set computing
system-on-chip
computer architecture
security of data
Resiliency
pubcrawl
composability
software reusability
Software Architecture
Bars
Human Factors
code reuse attacks
ROP
biblio
Trust and Reputation in Vehicular Networks: A Smart Contract-Based Approach
Submitted by aekwall on Mon, 02/24/2020 - 10:57am
smart contracts
Repudiation
verifying party
vehicular networks
VANETs
trustworthy nodes
trusted centralized party
smart contract-based approach
reputable trusted node
IPFS
greedy authenticated nodes
computed reputation rating
reputation
MatLab simulation
File systems
digital signatures
traffic engineering computing
trust
Mathematical model
blockchain
Metrics
Peer-to-peer computing
Protocols
composability
pubcrawl
Human behavior
Resiliency
Trusted Computing
security
data integrity
data privacy
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »