Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
security requirements
biblio
Security Requirements for Cloud-based C4I Security Architecture
Submitted by grigby1 on Fri, 11/20/2020 - 1:25pm
Cloud Computing
cloud computing system
cloud computing technology
cloud-based C4I security architecture
Cloud-based C4I Security Requirements
command and control systems
computer security
Information systems
Korea Military
Korea national defense information system
military computing
national defense command control system
national innovation
policy-based governance
pubcrawl
public sector
secure security architecture
security of data
Security Policies Analysis
security requirements
security vulnerabilities
Servers
Task Analysis
US military
biblio
A Reliable Ring Analysis Engine for Establishment of Multi-Level Security Management in Clouds
Submitted by grigby1 on Fri, 11/20/2020 - 1:14pm
security of data
Cloud Computing
Engines
security
pubcrawl
policy-based governance
collaboration
Indexes
service provider
security levels
Protocols
security requirements
Reliability
Policy Management
Semantics
indexing
security mechanism
cloud customers
index-based engine
mapping process
multilevel security management
policy management framework
ring analysis engine
security management
semantic analysis
Semantic Mapping
structural index
syntactic analysis
trust boundaries
Security Policies Analysis
biblio
OWASP Risk Analysis Driven Security Requirements Specification for Secure Android Mobile Software Development
Submitted by grigby1 on Tue, 11/17/2020 - 1:41pm
security of data
security
pubcrawl
Metrics
Resiliency
data integrity
security threats
composability
mobile computing
smart phones
malware
software development management
software engineering
security vulnerabilities
SDLC
risk analysis
resilience
testing
Detectors
Mobile Applications
Banking
Android (operating system)
security holes
information confidentiality
access sensitive information
Android development
data leaks
defensive requirements analysis
development lifecycle
development stage
guided security requirement analysis
Mobile Apps
mobile apps flaws
mobile software engineers
necessary security knowledge
OWASP
OWASP mobile top ten risks
OWASP risk analysis driven security requirements specification
secure Android mobile software development
secure mobile SDLC
secure mobile software development education
security defects open doors
security requirements
software developers
useful mobile security guidelines
Operating systems security
biblio
Challenges and prospects of communication security in real-time ethernet automation systems
Submitted by aekwall on Mon, 11/09/2020 - 12:13pm
computer network security
security
Protocols
real-time systems
Industrial Control Systems
Resiliency
pubcrawl
standards
automation
security architecture
Local area networks
industrial control
information technology
security requirements
Compositionality
communication security
operational technology
automation-friendly security solution
open systems
PROFINET
real-time Ethernet automation systems
Information Reuse and Security
biblio
Cognitive Internet of Vehicles: Motivation, Layered Architecture and Security Issues
Submitted by aekwall on Mon, 10/19/2020 - 10:46am
security of data
Cloud Computing
data privacy
security
computer architecture
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
Metrics
internet
Data processing
Transportation
sensors
layered architecture
edge computing
next generation networks
Human Factors
security issues
security requirements
Artificial Intelligence
ubiquitous computing
privacy issues
vehicles
Internet of Vehicles
cyber physical systems
technological advancements
cyber-physical impact
automobile scenario
automotive
automotive ecosystem
CIoV
cloud-based artificial intelligence
Cognitive Internet of Vehicles
communication field
cutting-edge technologies
industrial revolution
industrial revolution 4.0
Intelligent Transportation System
Intelligent Transportation System concept
layer abstractions
local network
prime security
smart decision
technological evolution
ubiquitous 5G mobile network
biblio
Inclusive Security Models To Building E-Government Trust
Submitted by grigby1 on Fri, 10/16/2020 - 10:14am
Access Control
authentication
authorisation
authorization
collaboration
Cybersecurity
data privacy
e-gov
E-Government
e-government trust
government data processing
Human behavior
inclusive security
inclusive security model
internet
message authentication
nonrepudiation properties
policy-based governance
privacy
privacy properties
privacy relationships
Privacy Requirements
pubcrawl
resilience
Resiliency
security perspective
security requirements
security threats
trust
trust of government
Trusted Computing
trusted security solution
biblio
An Evaluation of Information Connection in Augmented Reality for 3D Scenes with Occlusion
Submitted by grigby1 on Fri, 08/28/2020 - 11:31am
privacy
pubcrawl
Human behavior
Scalability
security requirements
Information systems
encoding
maintenance engineering
resilience
visualization
augmented reality
Three-dimensional displays
3D scenes
anchors
Color
Context
data visualisation
Engines
industrial augmented reality applications
information connection evaluation
occlusion
partial occlusion connection lines
perception
proximity
spatial overlays
virtual information display
visual interruptions
biblio
SE-Enc: A Secure and Efficient Encoding Scheme Using Elliptic Curve Cryptography
Submitted by aekwall on Mon, 08/10/2020 - 9:50am
encryption
Internet of Things
Trusted Computing
Resiliency
Human behavior
pubcrawl
Metrics
message authentication
public key cryptography
Heuristic algorithms
Elliptic curve cryptography
Elliptic curves
ECC
security requirements
encoding
authenticated encryption
Compositionality
Internet of Things devices
signature
Asymmetric Encryption
asymmetric cryptography
encoding scheme
SE-Enc
trusted scheme
biblio
Securing smart grid data under key exposure and revocation in cloud computing
Submitted by grigby1 on Fri, 07/24/2020 - 11:50am
Ciphers
Cryptography
encryption
Internet of Things
authorisation
Cloud Computing
data privacy
Servers
Scalability
power engineering computing
power system security
Smart Grids
smart power grids
data owner
cloud server
pubcrawl
policy-based governance
CP-ABE
revocation
Data collection
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
advanced cipher text policy attribute
and smart grid
cloud supported IoT
encrypted key
encryption key
encryption process
enhancing system ability
key exposure
obtaining security
security requirements
smart grid data security method
smart grid systems data
smart IoT devices
system failures
transmission process
collaboration
biblio
Consideration of Security Attacks in the Design Space Exploration of Embedded Systems
Submitted by aekwall on Mon, 06/15/2020 - 9:55am
security of data
Computer crime
Internet of Things
Task Analysis
embedded systems
Bayes methods
cyber security
Resiliency
pubcrawl
composability
security attacks
Metrics
internet
tools
security measures
power consumption
security requirements
Space exploration
Power demand
IoT system
architectural security attack description
behavioral security attack description
Design Process
door access system use case
Embedded System Design
Mixed Criticality Design Space Exploration
optimal design
Secure IoT Systems
secure system designing
security aware design space exploration framework
1
2
3
4
5
next ›
last »