Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Analytical models
biblio
Safety and Security Architecture Analyses Framework for the Internet of Things of Medical Devices
Submitted by aekwall on Mon, 05/04/2020 - 10:07am
medical computing
security architecture analysis framework
security analysis approach
safety and security
safety analysis framework
IoT architectures
health care sensors
architecture analyses
Network Security Architecture
medical devices
medical data
Safety
health care
Smart homes
Analytical models
pubcrawl
Resiliency
computer architecture
security
Internet of Things
Medical services
security of data
biblio
PriDe: A Quantitative Measure of Privacy-Loss in Interactive Querying Settings
Submitted by aekwall on Mon, 04/20/2020 - 9:31am
Loss measurement
privacy models and measurement
relational database management systems
querying behaviour
quantitative measure
privacy-loss score
PriDe measure
N-gram model
interactive querying settings
Electronic Privacy
behavioural profiles
data privacy
Urban areas
Analytical models
SQL query
SQL
Databases
query processing
Metrics
privacy
pubcrawl
Data models
biblio
Privacy-Preserving Online Task Assignment in Spatial Crowdsourcing with Untrusted Server
Submitted by aekwall on Mon, 04/20/2020 - 9:24am
location based services
privacy models and measurement
worker-task pair reachability
worker travel distance
worker locations
task locations
system overhead
spatiotemporal tasks
spatial crowdsourcing
privacy-preserving online task assignment
perturbed locations
geo indistinguishability
Servers
Personnel
probability
Measurement
Analytical models
Metrics
privacy
location privacy
crowdsourcing
pubcrawl
Task Analysis
data privacy
biblio
Privacy-Preserving Online Task Assignment in Spatial Crowdsourcing with Untrusted Server
Submitted by aekwall on Mon, 04/20/2020 - 9:24am
location based services
privacy models and measurement
worker-task pair reachability
worker travel distance
worker locations
task locations
system overhead
spatiotemporal tasks
spatial crowdsourcing
privacy-preserving online task assignment
perturbed locations
geo indistinguishability
Servers
Personnel
probability
Measurement
Analytical models
Metrics
privacy
location privacy
crowdsourcing
pubcrawl
Task Analysis
data privacy
biblio
Research on Network Malicious Code Detection and Provenance Tracking in Future Network
Submitted by aekwall on Mon, 04/06/2020 - 8:56am
malicious code detection
classification algorithm
Predictive Metrics
cyber physical systems
network coding
Behavior features
detection method
feature selection methods
host node
software defined networking
malware detection system
matching classification method
Mobile communication
network controller
network malicious code detection
optimal feature subset
propagation model
switch node
Feature Selection
malware
security
invasive software
Classification algorithms
machine learning algorithms
SDN network
network security
feature extraction
computer network security
Resiliency
pubcrawl
composability
Computational modeling
pattern classification
Analytical models
mobile network
biblio
Resource-Bounded Intruders in Denial of Service Attacks
Submitted by grigby1 on Fri, 04/03/2020 - 11:43am
refined intruder model
powerful intruders
privacy
protocol execution
protocol theories
protocol verification
Protocols
PSPACE-complete
pubcrawl
reachability analysis
real-time systems
policy-based governance
resource-bounded intruders
rewriting modulo SMT
rewriting systems
serious security concern
Servers
service resource usage
service unavailable
tools
unlimited resources
Denial of Service attacks
Analytical models
Bandwidth
collaboration
complexity
composability
Compositionality
computational complexity
Computer crime
computer network security
DDoS
amplification DoS attacks
Dolev-Yao intruder
DoS problem
existing resource-conscious protocol verification models
formal methods
formal protocol verification
Formal Specification
formal verification
formal verification model
Policy Based Governance
biblio
Evaluating Scientific Workflow Engines for Data and Compute Intensive Discoveries
Submitted by aekwall on Mon, 03/16/2020 - 9:41am
Predictive Metrics
Workflow Engines
scientific workflows
Scientific Experiments
End-to-End Workflows
Data Intensive Discoveries
Converged Workloads
Scientific Computing Security
Compositionality
Software
resilience
Engines
Analytical models
tools
Computational modeling
pubcrawl
Data models
Task Analysis
biblio
Privacy Risk Assessment for Data Subject-Aware Threat Modeling
Submitted by aekwall on Mon, 03/09/2020 - 10:16am
data subject-aware threat modeling
Privacy Risk
privacy by design
Monte Carlo methods
GDPR
Context modeling
data flow diagram system models
data protection by design
data subject-aware privacy risk assessment model
Human Factors
General Data Protection Regulation
Monte Carlo simulations
privacy risk assessment
privacy threat modeling activities
risk estimation approach
threat modeling tool prototype
Security Risk Estimation
Threat Modeling
risk analysis
data privacy
risk assessment
risk management
Analytical models
Data protection
data flow analysis
Metrics
privacy
pubcrawl
Resiliency
Data models
security
Scalability
security of data
biblio
Evaluating Fault Resiliency of Compressed Deep Neural Networks
Submitted by grigby1 on Wed, 02/26/2020 - 3:48pm
Hardware
VGG16
storage faults
software mitigation techniques
Resiliency
resilience
Quantization (signal)
pubcrawl
Predictive models
neural nets
LeNet-5
learning (artificial intelligence)
inference mechanisms
hardware mitigation techniques
Analytical models
fault tolerant computing
fault tolerance
Fault resiliency
Fault Resilience
Fault Attacks
Efficient and secure inference engines
Deep neural network model compression
deep learning
Data models
data compression
Computational modeling
compressed DNN models
compressed deep neural networks
biblio
Enforcing Optimal Moving Target Defense Policies
Submitted by grigby1 on Tue, 02/18/2020 - 11:06am
MDP model
value iteration
security
Scalability
Resiliency
resilience
pubcrawl
optimal security policies
optimal policy selection
optimal moving target defense policies
moving target defense
Metrics
Analytical models
Mathematical model
Markov processes
Markov Decision Process
Markov Decision
Iterative methods
Games
Decision Making
Control Theory
computer science
Bellman optimality equation
« first
‹ previous
…
27
28
29
30
31
32
33
34
35
…
next ›
last »