Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Buildings
biblio
Attribute-Based Access Control in Service Mesh
Submitted by aekwall on Mon, 08/17/2020 - 10:41am
authentication
software infrastructure layer
service mesh mechanisms
Service Mesh
modern cloud applications
interservice interaction
highly dynamic environment
Attribute-based encryption methods
service discovery
Temperature sensors
fine-grained access control
Buildings
Cloud Computing
policy-based governance
pubcrawl
Human behavior
Protocols
attribute-based encryption
encryption
Cryptography
authorisation
Access Control
Scalability
biblio
Server-Side Fingerprint-Based Indoor Localization Using Encrypted Sorting
Submitted by aekwall on Mon, 08/10/2020 - 9:33am
malicious individuals
localization
indoor radio
Android app
Buildings
Columbia University dormitory
Fingerprinting
GPS signals
homo-morphic cryptographic schemes
Indoor environments
Metrics
server computation capabilities
server-side fingerprint-based indoor localization
socialist millionaire problem
unique encrypted sorting capability
Wi-Fi
Wi-Fi access points
wireless signals
android encryption
pubcrawl
Servers
Cryptography
encryption
data privacy
telecommunication security
Protocols
mobile computing
Resiliency
Human behavior
Scalability
privacy
Databases
smart phones
wireless LAN
Wireless fidelity
Homomorphic encryption
efficiency
fingerprint identification
biblio
A Modeling Attack Resistant Deception Technique for Securing PUF based Authentication
Submitted by grigby1 on Fri, 06/19/2020 - 10:49am
mutual authentication
Servers
Scalability
resource-rich server authentication
Resistance
Resiliency
resilience
replay attacks
Registers
PUF-based authentication method
pubcrawl
Protocols
Policy-Governed Secure Collaboration
policy-based governance
physical unclonable function-based authentication protocol
physical unclonable function (PUF)
active deception protocol
Multiplexing
ML attack
machine learning attacks
learning (artificial intelligence)
Generators
false trust
false PUF multiplexing
Cryptographic Protocols
challenge response pairs
Buildings
binary channel
authentication protocol
authentication
authentic CRP
attack resistant deception technique
biblio
Security Analysis of Intelligent Transportation Systems Based on Simulation Data
Submitted by grigby1 on Fri, 05/08/2020 - 3:40pm
threat model
resilience
road safety
road traffic
roadside infrastructure units
security
Security analysis
security model
security of data
pubcrawl
traffic control
traffic engineering computing
Transportation
transportation efficiency
transportation security
vehicle ad hoc networks
Veins
Information systems
Intelligent Data Security
Compositionality
Resiliency
Scalability
Analytical models
Buildings
composability
information security
Intelligent Data and Security
Intelligent Transportation Systems
ITS
ITS system
layered network security model
malicious node threat
Metrics
Networked Control Systems Security
biblio
Need of Private and Public Sector Information Security
Submitted by grigby1 on Fri, 04/03/2020 - 11:03am
private buildings
Intel
Intelligent systems
Internet of Things
knowledge based systems
man in middle
Organizations
personnel security
Policy Based Governance
Portable computers
information technicians
private sector information security
pubcrawl
public sector information security
sensitive information
sentinel systems
smart information security Intel processes
Standards organizations
virtual data tables
Data protection
Airports
AS-IS office system
authorisation
biometric
biometrics (access control)
Buildings
collaboration
conveyor belts
data entry-exit log
airport like security with digital boxes
digital bar-coded air port
digital bar-coded conveyor boxes
evaes-dropping
government buildings
government data processing
government offices
information security
information stealing
biblio
The Privacy Case: Matching Privacy-Protection Goals to Human and Organizational Privacy Concerns
Submitted by grigby1 on Mon, 03/09/2020 - 1:57pm
Smart Grid
privacy goals
privacy protection
privacy-protection goals
privacy-related risks
pubcrawl
resilience
Resiliency
Safety
Scalability
privacy
smart grid data processing
Smart Grid Privacy
smart grid stakeholder
smart grid stakeholders
Smart Grids
smart power grids
Software Architecture
Stakeholders
goals structuring notation
Aspern Smart City Research project
automotive domain
Automotive engineering
Buildings
collaboration
composability
data privacy
goal structuring notation
argumentation thread
Human behavior
Human Factors
human privacy concern
Metrics
organizational privacy concern
policy-based governance
power engineering computing
Power system protection
biblio
Ship-to-Grid Integration: Environmental Mitigation and Critical Infrastructure Resilience
Submitted by grigby1 on Wed, 02/26/2020 - 3:44pm
reverse cold ironing
marine power systems
Metrics
natural disasters
offshore installations
pollutant mitigation
Port of Kyllini
pubcrawl
resilience
Resiliency
Logistics
ship-to-grid
ship-to-grid integration
ship-to-shore interconnection
ships
Smart Grids
smart power grids
Technological innovation
threat mitigation
United States
Europe
alternative maritime power
architecture
Buildings
cold ironing
critical infrastructure resilience
critical infrastructures
diesel engines
disasters
environmental pollutants mitigation
air pollution control
European Union
Greece
grid-to-ship
GridLAB-D
GridLAB-D software
Human behavior
Human Factors
humanitarian relief
biblio
Social Analysis of Game Agents: How Trust and Reputation can Improve Player Experience
Submitted by aekwall on Mon, 02/10/2020 - 11:08am
computer games
Social Agents
video games
social interactions
Social Behavior
social analysis
Settlers of Catan
reputation models
reputation
NPC agents
nonplayer character behavior
multiplayer games
interactive games
Intelligent Agents
gaming experience
game agents
Scalability
autonomous agents
artificial intelligence techniques
Artificial Intelligence
Buildings
Human Factors
human computer interaction
Urban areas
Proposals
Games
bots
trust
Mathematical model
multi-agent systems
Roads
pubcrawl
biblio
Hybrid AC/DC Microgrid Configurations for a Net-Zero Energy Community
Submitted by aekwall on Mon, 01/20/2020 - 10:47am
interface converters
system reliability
Resiliency
Reliability
pubcrawl
power sharing issues
power generation reliability
Power demand
power convertors
net-zero energy community
Microgrids
Medium voltage
load shedding
alternating current microgrids
Integrated circuit interconnections
Hybrid AC/DC microgrid
hybrid AC-DC microgrid
expandability
distributed power generation
direct current microgrids
costly medium-voltage components
Configurations
composability
circuit breakers
Buildings
biblio
A preliminary approach towards the trust issue in cloud manufacturing using grounded theory: Defining the problem domain
Submitted by aekwall on Mon, 12/09/2019 - 11:23am
information management
Trusted Computing
trust topic
trust issue
trust
supply chains
structured literature review
pubcrawl
production engineering computing
noncommittal phase
manufacturing
integrative phase
Bibliographies
grounded theory method approach
grounded theory
Computing Theory and Trust
Compositionality
composability
collaboration
cloud manufacturing trust
cloud manufacturing
Cloud Computing
Buildings
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »