Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cloudlet
biblio
Cybersecurity and Data Privacy in the Cloudlet for Preliminary Healthcare Big Data Analytics
Submitted by grigby1 on Tue, 04/27/2021 - 1:46pm
Industries
wireless body area network
wireless biosensor network
security
pubcrawl
Mobile handsets
mobile edge cloud
Medical services
medical big data analytics
Big Data
data privacy
cybersecurity and data privacy
computer security
cloudlet
Cloud Computing
cloud
big data security in the cloud
biblio
Computational Intelligence Towards Trusted Cloudlet Based Fog Computing
Submitted by grigby1 on Tue, 03/09/2021 - 2:06pm
Scalability
optimisation
popular trust
pubcrawl
quality of service
Reliability
reputation
required trusted platform module
resilience
Resiliency
multiple cloudlets
security
security of data
tpm
trust
trust value
trust-based reputation
trusted cloudlet-based fog platform
uncertainty
Fog computing
BIOS
Cloud Computing
cloud-based services
cloudlet
cloudlet trustworthy
cloudlet-based fog computing
computational intelligence
computationally intelligent approaches
edge computing
Bio-inspired Intelligent
Fuzzy logic
fuzzy logic-based inference
Human behavior
Internet of Things
IoT user
Mathematical model
Metrics
mobile computing
biblio
A Scalable and Privacy-Aware IoT Service for Live Video Analytics
Submitted by grigby1 on Thu, 02/15/2018 - 10:39am
Metrics
user privacy in the cloud
User behavior
Scalability
Resiliency
resilience
pubcrawl
privacy protection
Privacy Mediator
privacy
AI
Human Factors
human factor
Human behavior
face recognition
edge computing
cloudlet
Cloud Computing
Artificial Intelligence
biblio
Data security protocol for cloudlet based architecture
Submitted by BrandonB on Thu, 04/30/2015 - 1:20pm
encryption
unauthorized user
security
resource-rich computer
mobile devices
mobile computing
Mobile communication
mobile cloud computing technology
mobile cloud computing
internet
Cloud Computing
distributed cloud architecture
data security protocol
Cryptographic Protocols
Computers
computer architecture
cloudlet based architecture
cloudlet
cloud storage