Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Proposals
biblio
Anonymous Privacy-Preserving Scheme for Big Data Over the Cloud
Submitted by aekwall on Mon, 08/24/2020 - 12:51pm
MapReduce
big data privacy
secure hash algorithm
network operating systems
MapReduce framework
data decryption
anonymous privacy-preserving scheme
Hadoop distributed file system
Human Factors
cloud
Proposals
parallel processing
security
Metrics
privacy
pubcrawl
Resiliency
data encryption
data privacy
Big Data
encryption
Cryptography
Scalability
Cloud Computing
biblio
Making the Pedigree to Your Big Data Repository: Innovative Methods, Solutions, and Algorithms for Supporting Big Data Privacy in Distributed Settings via Data-Driven Paradigms
Submitted by aekwall on Mon, 08/24/2020 - 12:50pm
data analysis
big data privacy
security-inspired protocols
protocol checking
privacy-of-big-data
DRIPROM framework
distributed-big-data
distributed settings
data-driven aggregate-provenance privacy-preserving big multidimensional data
cloud settings
Human Factors
Proposals
security of data
Distributed databases
Metrics
data aggregation
pubcrawl
Resiliency
Data models
Protocols
data privacy
Big Data
Scalability
Cloud Computing
biblio
AI Based Automatic Robbery/Theft Detection using Smart Surveillance in Banks
Submitted by grigby1 on Fri, 07/03/2020 - 12:16pm
smart surveillance
Proposals
pubcrawl
real-time analysis
real-time systems
resilience
Resiliency
Scalability
security
object detection
surveillance
surveillance systems
theft-detection
video signal processing
video surveillance
video-analysis
Videos
Weapons
deep learning
artificial-intelligence
Banking
CCTV based theft detection
CCTV footage
closed circuit television
computer vision
computer-vision
Conferences
Artificial Intelligence
deep video
deeplearning
dramatic efficiency gains
human supervision
learning (artificial intelligence)
Metrics
multimedia content analysis
neural nets
biblio
Trustworthy configuration management for networked devices using distributed ledgers
Submitted by aekwall on Mon, 05/11/2020 - 10:28am
distributed execution environment
network accountability
blockchain-based distributed ledger
Building automation
Byzantine fault tolerant configuration management system
CMS
Configuration Management
configuration management process
critical configurations
data leaks
distributed ledgers
individual malicious administrators
industrial sites
IT systems
multiparty authorization
networked devices
process control
strong connection
targeted devices
trustworthy configuration management
fault tolerant computing
authorisation
authorization
Organizations
Internet of Things
IoT applications
Resiliency
pubcrawl
composability
Metrics
security of data
message authentication
security threats
Proposals
control engineering computing
fault tolerance
Traceability
physical world
Fabrics
biblio
Drone Detection in Long-Range Surveillance Videos
Submitted by aekwall on Mon, 04/13/2020 - 9:27am
learning (artificial intelligence)
Videos
video surveillance
Training
tracking surveillance
Terrorism
SSD
single shot detector
security of data
security breaches
Resiliency
pubcrawl
Proposals
object detection
Metrics
long-range surveillance videos
deep video
Human behavior
high-security risks
Faster-RCNN
Faster R-CNN
drones
drone detection
Detectors
detection methods
deep learning-based object detection
deep learning
convolutional neural nets
CNN-based architectures
Birds
autonomous aerial vehicles
biblio
Exploration and Exploitation of Off-path Cached Content in Network Coding Enabled Named Data Networking
Submitted by grigby1 on Mon, 04/06/2020 - 1:22pm
Proposals
network node
O2CEMF
off-path cache exploration
off-path cached content
off-path cached copies
off-path caches
On-demand exploration
original content publisher
network coding
pubcrawl
reachability information
Receivers
resilience
Resiliency
Routing
telecommunication network routing
cache storage
NC-NDN
named data networking
multiple on-path routes
multipath forwarding strategy
multipath forwarding
Metrics
internet
in-network caching
in-network caches
cyber physical systems
content delivery performance
computer networks
computer network security
composability
Complexity theory
biblio
Locking Secret Data in the Vault Leveraging Fuzzy PUFs
Submitted by aekwall on Mon, 04/06/2020 - 9:05am
physical unclonable functions
Human behavior
inherent sensitivity
locking secret data
low-cost security anchor
manufacturing variations
nanoscale variations
pattern locks
Phase measurement
helper data algorithm
prominent intrinsic PUF
Proposals
pubcrawl
Random access memory
Reliability
secret important data
secure environment
security scheme
enrollment phase
Resiliency
Metrics
Fuzzy Cryptography
aging sensitivity
Cryptography
data algorithms
DRAM chips
DRAM PUF
Scalability
error correction
error-correction algorithm
error-tolerant
fuzzy pattern
fuzzy PUF
fuzzy set theory
Hardware
biblio
Privacy Policies Model in Access Control
Submitted by grigby1 on Fri, 04/03/2020 - 11:32am
access control management
Privacy Policies
user identification
Task Analysis
Proposals
privacy policy strategy
privacy policy model
privacy policies model
personal data privacy
Internet services
data exchange
privacy
access control language
cloud environments
information security
authorization
Scalability
data privacy
Human behavior
pubcrawl
Cloud Computing
authorisation
biblio
Hybrid Logical Clocks for Database Forensics: Filling the Gap between Chain of Custody and Database Auditing
Submitted by aekwall on Mon, 03/09/2020 - 10:05am
Database Security
causality
centralised vector-clock architecture
chain of custody
chain of custody properties
CoC properties
commercial database systems
database audit
database audit records
auditing capabilities
digital evidence
forensically-aware distributed database architecture
hybrid logical clocks
role segregation
third-party verification
transactional databases
user transactions
Security Audits
Provenance
computer architecture
Resiliency
Human behavior
pubcrawl
Distributed databases
Forensics
Digital Forensics
Data mining
security
Proposals
database forensics
database management systems
Scalability
Clocks
auditing
action accountability
admissible audit records
biblio
Social Analysis of Game Agents: How Trust and Reputation can Improve Player Experience
Submitted by aekwall on Mon, 02/10/2020 - 11:08am
computer games
Social Agents
video games
social interactions
Social Behavior
social analysis
Settlers of Catan
reputation models
reputation
NPC agents
nonplayer character behavior
multiplayer games
interactive games
Intelligent Agents
gaming experience
game agents
Scalability
autonomous agents
artificial intelligence techniques
Artificial Intelligence
Buildings
Human Factors
human computer interaction
Urban areas
Proposals
Games
bots
trust
Mathematical model
multi-agent systems
Roads
pubcrawl
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »