Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authorisation
biblio
Towards Access Control for Network Coding-Based Named Data Networking
Submitted by grigby1 on Mon, 06/11/2018 - 2:34pm
network coding-based named data networking
linear all-or-nothing transform
linear AONT
matrix algebra
Metrics
Mobile Application
mobile computing
ndnSIM
network coding
internet
network coding-based NDN
pubcrawl
resilience
Resiliency
Security analysis
telecommunication network routing
Transforms
content producer
authorisation
authorization
authorization key
composability
computational overhead
computer network security
content delivery
content delivery effectiveness
Access Control solution
content-oriented future Internet architecture
Cryptography
encoding
encoding matrix
encryption
in-network caching
information-intensive application
biblio
Protect Sensitive Information against Channel State Information Based Attacks
Submitted by grigby1 on Thu, 06/07/2018 - 1:58pm
sensitive on-screen gestures
pubcrawl
public WiFi environments
Receivers
resilience
Resiliency
Scalability
security attacks
sensitive information protection
privacy protection
text-based passwords
Transmitters
WiFi channel interference
WiGuard
Wireless communication
Wireless fidelity
wireless LAN
authorisation
privacy
Portable computers
pattern locks
mobile devices
locking patterns
Interference
Human behavior
gesture recognition
finger motions
Data protection
CSI-based attacks
CSI-based attack
computer network security
channel state information based attacks
channel interference
biblio
Towards accessible mobile pattern authentication for persons with visual impairments
Submitted by grigby1 on Thu, 06/07/2018 - 1:58pm
smart phones
pattern locks
pressure gradient input
pubcrawl
resilience
Resiliency
Scalability
security
security applications
pattern lock
smartphone
Smartphones
touch sensitivity
usage scenario
user interface related issues
user preferred color combination
visual impairments
Visually Impaired
graphical user interfaces
accessible mobile pattern authentication
accessible security application
Android users
authentication
authentication strength
authorisation
color blind users
complex design
access barrier
handicapped aids
Human behavior
Image color analysis
inaccessible design
Mobile communication
mobile computing
mobile locks
password
biblio
PACMAN: Personal Agent for Access Control in Social Media
Submitted by grigby1 on Wed, 05/30/2018 - 3:11pm
personal agent
standards
social networking (online)
social media
social context
Social Agents
Scalability
recommender systems
pubcrawl
privacy
personalized access control decisions
personal assistant agent
personal agent for access control
Access Control
PACMAN
multi-agent systems
Media
machine learning
Internet/Web technologies
internet
Human Factors
Human behavior
friend network
Facebook
authorisation
appropriate audience selection
biblio
A Data Aggregation Scheme with Fine-Grained Access Control for the Smart Grid
Submitted by grigby1 on Wed, 05/30/2018 - 3:08pm
energy consumers
smart power grids
smart meters
Smart Grids
smart grid consumer privacy
Smart Grid
real-time usage data
pubcrawl
privacy
power engineering computing
Human Factors
fine-grained access control
fine- grained data access control
Access Control
encryption
Decision trees
data utility
data privacy preservation
data privacy
data integrity
data aggregation scheme
data aggregation
control center
authorisation
attribute decision tree
biblio
Controlling Cloud Data Access Privilege: Cryptanalysis and Security Enhancement
Submitted by grigby1 on Wed, 05/30/2018 - 3:01pm
Gold
user collusion attacks
user authorization
user anonymity protection
user anonymity
security weaknesses
security enhancement
Resiliency
resilience
pubcrawl
policy-based governance
Outsourcing Decryption
Metrics
identity privacy
Human Factors
Human behavior
Access Control
finegrained access control
encryption
data privacy
data access privilege scheme
Cryptography
cryptanalysis
Computational modeling
collaboration
cloud data access privilege
Cloud Computing
authority collusion attacks
authorities collusion attack
authorisation
attribute-based encryption
biblio
A Cloud-Based Trust Evaluation Scheme Using a Vehicular Social Network Environment
Submitted by grigby1 on Wed, 05/30/2018 - 2:54pm
Resiliency
wireless communication networks
VSN
vehicular social network environment
vehicular network environment
Vehicular cloud
vehicular ad hoc networks
user identity authentication
Trusted Computing
Trust management
traffic engineering computing
three-layer VSN model
software engineering
social networking (online)
Scalability
authorisation
pubcrawl
PKI Trust Models
performance evaluation
mobile computing
mobile communication networks
Metrics
large-scale data sharing
Internet of Things
Human Factors
Human behavior
cloud-based VSN architecture
cloud-based trust evaluation scheme
Cloud Computing
biblio
Patient Infusion Pattern based Access Control Schemes for Wireless Insulin Pump System
Submitted by el_wehby on Fri, 05/25/2018 - 2:49pm
learning (artificial intelligence)
wireless sensor networks
wireless insulin pump system
Wireless insulin pump
Wireless communication
Universal Serial Bus
supervised learning approaches
single acute overdose
security mechanisms
regression models
regression analysis
PIPAC
patient safety
patient infusion pattern based access control schemes
Access Control
Insulin
infusion pattern
implantable medical devices
hospitals
home healthcare systems
health care
Diabetes
Communication system security
chronic overdose
bolus abnormal dosage detection
basal abnormal rate detection
authorisation
1536086
biblio
A Trust Management Framework for Network Applications within an SDN Environment
Submitted by grigby1 on Wed, 05/09/2018 - 2:02pm
pubcrawl
Trusted Computing
Trust management
trust
software defined networking
security
SDN environment
SDN
Router Systems Security
Router Systems
Resiliency
resilience
Reliability
Aerospace electronics
Ports (Computers)
network resources
network behaviour
network applications
Metrics
control systems
computer network security
authorization
authorisation permissions
authorisation
authentication
biblio
A security aware scheduling in fog computing by hyper heuristic algorithm
Submitted by K_Hooper on Wed, 05/09/2018 - 10:03am
scheduling
Internet of Things
job scheduling
latency
Processor scheduling
pubcrawl
Resiliency
resource allocation
Scalability
integrity parameter
security
security aware scheduling
Security Heuristics
security of data
security overhead
sensor nodes
Task Analysis
data mining technique
authorisation
average energy consumption
Cloud Computing
computational overhead
confidentiality parameter
CPU utilization
data integrity
Data mining
authentication parameter
edge computing
Fog computing
fog devices
heterogeneous distributed environment
heuristic algorithm
Heuristic algorithms
hyper heuristic algorithm
« first
‹ previous
…
26
27
28
29
30
31
32
33
34
…
next ›
last »