Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Indexes
biblio
Encrypted Keyword Search in Cloud Computing using Fuzzy Logic
Submitted by aekwall on Mon, 01/18/2021 - 11:34am
Fuzzy Keyword Sets
information management
search engines
sensitive information
vital information
cloud service providers
complex Boolean queries
encrypted keyword search
fuzzy keyword search
Indexes
information management professionals
keyword privacy
keyword safety
N-grams
Privacy Preserving Fuzzy Search
user document protection
Fuzzy Cryptography
Cloud Computing
fuzzy set theory
Fuzzy logic
Data protection
query processing
Metrics
pubcrawl
Resiliency
data encryption
encryption
data confidentiality
Cryptography
authorisation
Keyword search
Servers
Scalability
biblio
Additive and Subtractive Cuckoo Filters
Submitted by aekwall on Mon, 01/11/2021 - 1:32pm
ASCF
data deletion
subtractive cuckoo filter
subtraction operations
space-efficient data structures
space inflation
space efficiency
space cost
set membership queries
high-speed lookups
exclusive-OR operation
cuckoo hashing
cuckoo filters
bucket indexes
Bloom filters
Scalability
additive cuckoo filter
addition operations
Table lookup
Additives
Throughput
Fingerprint recognition
quality of service
Indexes
privacy
data structures
query processing
standards
pubcrawl
biblio
Trustworthiness in Sensor Networks A Reputation-Based Method for Weather Stations
Submitted by aekwall on Mon, 12/21/2020 - 1:35pm
reputation
weather stations
trustworthiness approach
soft-security feature
self-data trust
reputation-based method
reputation indicators
peer-data trust
Pearson correlation
Meteorology Data
Meteorology
geophysics computing
Gaussian overlap
correlation theory
Autonomous Sensors
Time series analysis
IoT
sensor networks
Gaussian processes
Temperature measurement
sensor fusion
Indexes
trustworthiness
Data mining
Correlation
Peer-to-peer computing
composability
pubcrawl
Trusted Computing
data integrity
security of data
biblio
An Augmented Bayesian Reputation Metric for Trustworthiness Evaluation in Consensus-based Distributed Microgrid Energy Management Systems with Energy Storage
Submitted by aekwall on Mon, 12/21/2020 - 1:34pm
trust evaluation
Energy storage
control engineering computing
estimation
resilience
distributed control
Consensus
cyber-physical system
microgrid
energy management
agent trustworthiness
augmentation method
augmented Bayesian reputation metric
consensus-based distributed microgrid energy management systems
difficult-to-detect attack patterns
Energy Management System
real-time HIL microgrid testbed
Trustworthiness Evaluation
Measurement
Trusted Computing
Bayes methods
pubcrawl
composability
batteries
multi-agent system
multi-agent systems
Cybersecurity
Cryptography
trustworthiness
power engineering computing
power system security
Indexes
distributed power generation
energy management systems
Microgrids
Attack detection
biblio
Fair Transfer of Multiple Style Attributes in Text
Submitted by grigby1 on Fri, 12/11/2020 - 2:52pm
one-style transfer
Yelp dataset
written text
Writing
Training
text style transfer
text generation
text analysis
target text
style attributes
single-style transfers
Scalability
Resiliency
resilience
pubcrawl
communication style
neural style transfer
Neural networks
neural network architecture
neural net architecture
natural language processing
multi-style transfer
Metrics
machine learning
Indexes
Focusing
fair transfer
deep learning
Decoding
biblio
Exploring Human-Robot Trust During Teaming in a Real-World Testbed
Submitted by grigby1 on Tue, 12/01/2020 - 1:23pm
Pressing
Underwater vehicles
robust trust
robots
Robot Trust
robot competitions
Rivers
Resiliency
resilience
remotely operated vehicles
real-world testbed
pubcrawl
project aquaticus
autonomous surface vehicles
mobile robots
Mechanical Engineering
Indexes
human-robot trust
human-robot teaming competition
human-robot teaming
human-robot interaction
human operated motorized kayaks
Human Factors
Human behavior
Games
collision avoidance
biblio
Privacy-Preserving Keyword Search Schemes over Encrypted Cloud Data: An Extensive Analysis
Submitted by aekwall on Mon, 11/23/2020 - 11:21am
Intelligent Data Security
verifiability
storage management
Servers
security
Scalability
Resiliency
remote servers
pubcrawl
privacy-preserving keyword search schemes
privacy issue
privacy
keyword search functions
Keyword search
Big Data
Intelligent Data and Security
Information Leakage
Indexes
encryption
encrypted cloud data
efficiency
data privacy
Cryptography
Compositionality
cloud storage services
cloud storage
Cloud Computing
biblio
A Reliable Ring Analysis Engine for Establishment of Multi-Level Security Management in Clouds
Submitted by grigby1 on Fri, 11/20/2020 - 2:14pm
ring analysis engine
trust boundaries
syntactic analysis
structural index
service provider
Semantics
Semantic Mapping
semantic analysis
security requirements
Security Policies Analysis
security of data
security mechanism
security management
security levels
security
Cloud Computing
Reliability
pubcrawl
Protocols
policy-based governance
policy management framework
Policy Management
multilevel security management
mapping process
indexing
Indexes
index-based engine
Engines
collaboration
cloud customers
biblio
A Secure and Efficient Renewable Energy Trading Scheme Based on Blockchain in Smart Grid
Submitted by grigby1 on Fri, 11/20/2020 - 2:05pm
distributed energy trading schemes
composability
green computing
Smart Grids
Security analysis
power system interconnection
renewable energy sources
power markets
credibility-based equity proof mechanism
distributed energy sources
Distributed energy trading
smart power grids
efficient energy renewable trading scheme
electricity market trading model
energy internet
Energy storage
Energy systems
energy trading market
privacy protection
secure energy renewable trading scheme
smart grid consumer privacy
Resiliency
privacy
security
blockchain
Distributed databases
pubcrawl
Human behavior
Metrics
policy-based governance
collaboration
resilience
Cryptography
Indexes
data privacy
Scalability
internet
Computational modeling
distributed power generation
power engineering computing
power system security
Smart Grid
biblio
Towards Modeling Attacker’s Opportunity for Improving Cyber Resilience in Energy Delivery Systems
Submitted by aekwall on Mon, 11/16/2020 - 2:51pm
criticality metric
Resilient Security Architectures
secure cyber infrastructure
resilient cyber infrastructure
model attacker
metric measure
lateral propagation
information flow dependency
host criticality
graph spectral matrices
EDS cyber infrastructure
defense-in-depth architecture
Cyber Resiliency
security of data
Resiliency
Energy Delivery Systems
system design
Firewalls (computing)
resilience
Indexes
Measurement
Workstations
Mathematical model
graph theory
pubcrawl
Servers
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »