Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Medical services
biblio
Detecting Cyber-Attacks in Modern Power Systems Using an Unsupervised Monitoring Technique
Submitted by aekwall on Tue, 02/22/2022 - 2:17pm
Measurement and Metrics Testing
sustainable development
statistical monitoring charts
smoothing methods
power transmission
modern power system
kNN algorithm
Time-frequency Analysis
cyber-attacks
Training data
Metrics
pubcrawl
Medical services
Intrusion Detection
Measurement
biblio
Implementation of a Peer-to-Peer Network Using Blockchain to Manage and Secure Electronic Medical Records
Submitted by grigby1 on Tue, 02/22/2022 - 1:24pm
Peer-to-peer computing
Synchronization
smart contracts
Scalability
Resiliency
resilience
real-time systems
pubcrawl
privacy
peer-to-peer security
peer to peer security
Peer-To-Peer
Metrics
Medical services
medical records
Human Factors
healthcare data gateways
ethereum
blockchains
blockchain
biblio
Efficient Privacy-Preserving Similarity Range Query based on Pre-Computed Distances in eHealthcare
Submitted by grigby1 on Thu, 02/10/2022 - 3:19pm
Servers
Medical services
Euclidean distance
encryption
Databases
data privacy
Cloud Computing
biblio
Privacy-Preserving Framework to Facilitate Shared Data Access for Wearable Devices
Submitted by grigby1 on Mon, 01/31/2022 - 3:49pm
Scalability
Health data sharing
wearables security
Wearable Device
wearable computers
Big Data
Protocols
Medical services
data privacy
privacy
Conferences
Resiliency
resilience
Human behavior
pubcrawl
blockchain
security
Adaptation models
biblio
A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data
Submitted by grigby1 on Mon, 01/31/2022 - 3:47pm
privacy
blockchain
pubcrawl
Human behavior
resilience
Resiliency
Scalability
authentication
Access Control
Medical services
Prototypes
Internet-of-Things
Pandemics
wearable computers
wearables security
Medical wearable devices
biblio
Artificial Intelligence Enabled Cyber Security
Submitted by grigby1 on Mon, 01/10/2022 - 4:57pm
Manuals
signal processing
robots
Resiliency
resilience
pubcrawl
Organizations
Metrics
Medical services
Advantages of AI
Human behavior
cyber security
Cyber Attacks
Computer hacking
composability
CIA triad
artificial intelligence security
Artificial Intelligence
biblio
Actionable XAI for the Fuzzy Integral
Submitted by grigby1 on Wed, 12/22/2021 - 12:52pm
Agriculture
Artificial Intelligence
Choquet integral
Conferences
explainable AI
Fuzzy integral
linguistic summarization
Linguistics
Medical services
pubcrawl
resilience
Resiliency
Scalability
security
Task Analysis
xai
biblio
A Context-Policy-Based Approach to Access Control for Healthcare Data Protection
Submitted by grigby1 on Mon, 11/29/2021 - 2:49pm
Medical services
Tamper-Resistance
Tamper resistance
Sensor Systems
sensors
Scalability
pubcrawl
Protocols
Metrics
Access Control
Identification
Human Factors
Human behavior
Context modeling
computer security
authorization
authentication
biblio
A Stochastic Approach for an Enhanced Trust Management in a Decentralized Healthcare Environment
Submitted by grigby1 on Mon, 11/08/2021 - 1:45pm
Probabilistic logic
trusted platform modules
Trusted Platform Module
trust
Stochastic processes
smart contract
security
Resiliency
resilience
pubcrawl
Stochastic Computing Security
Permission
on-off attack
Medical services
markov chain
cyber physical systems
cyber physical security
composability
blockchain
authorization
biblio
Towards an Approach of Risk Analysis in Access Control
Submitted by grigby1 on Tue, 10/12/2021 - 4:22pm
Access Control
Cloud Computing
Human behavior
information security
Measurement
Medical services
Metrics
privacy
Privacy Policies
probability
pubcrawl
risk analysis
Scalability
security
taxonomy
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »