Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data availability
biblio
Formalized Models and Methods for Building Efficient Digital Information Funds of Intellectual Property
Submitted by grigby1 on Thu, 09/07/2023 - 3:57pm
Distributed databases
thematic database
the fullness of DIFIP
reliability of DIFIP data
patent database
distributed information management structure of the DIFIP
Digital Information Fund of Intellectual Property (DIFIP)
DIFIP security
database of scientific and technical information
data relevance
Materials reliability
patents
Organizations
data availability
maintenance engineering
composability
intellectual property
Analytical models
Resiliency
resilience
policy-based governance
pubcrawl
security
biblio
Improved Secure Internet of Things System using Web Services and Low Power Single-board Computers
Submitted by grigby1 on Mon, 03/29/2021 - 1:16pm
Internet of Things system
Web-based communication
web services
single-board computers
single board computers
service-oriented architecture
sensors
security vulnerabilities
security
Scalability
pubcrawl
privacy
microcomputers
message authentication
IoT system
IoT architecture
authentication
Internet of Things security
Internet of Things
Human Factors
expert systems
data privacy
data integrity
data confidentiality
data availability
cyber security
Cryptography
Computers
computer architecture
authorization
authorisation
biblio
Using Attack Pattern for Cyber Attack Attribution
Submitted by grigby1 on Fri, 08/28/2020 - 12:23pm
cyber attribution problem
pubcrawl
Metrics
information system
individual organization
Human behavior
data integrity
data confidentiality
data availability
attack pattern
Cyber Attribution
cyber attack initiator identification
cyber attack
computer network security
composability
attribution
attack scenario
biblio
A Topology Based Differential Privacy Scheme for Average Path Length Query
Submitted by aekwall on Mon, 06/22/2020 - 11:19am
Erbium
topology based differential privacy scheme
query function
privacy control parameters
node privacy protection
network vertices
edge-weighted privacy protection
differential privacy security mechanism
data query
average path length query
APL query
network topology
Euclidean distance
Scalability
Perturbation methods
Sensitivity
privacy protection
differential privacy
query processing
data availability
privacy
composability
pubcrawl
Human behavior
Resiliency
data privacy
biblio
A PSO clustering based RFID middleware
Submitted by aekwall on Mon, 06/01/2020 - 10:48am
policy-based governance
security of data
security
RFID middleware
Resiliency
resilience
radiofrequency identification
radio frequency identification
pubcrawl
PSO clustering scheme
PSO clustering
Acceleration
particle swarm optimization
particle swarm optimisation
middleware security
middleware
Data Security
data availability
convergence
composability
Clustering algorithms
Birds
biblio
Towards Solving the Data Availability Problem for Sharded Ethereum
Submitted by aekwall on Mon, 12/09/2019 - 12:16pm
Resiliency
pubcrawl
blockchain
ethereum
data availability
distributed systems
Proof of Stake
Sharding
Computing Theory and Resilience
biblio
Novel Sybil Defense Scheme for Peer–to–peer Applications
Submitted by aekwall on Mon, 02/18/2019 - 12:58pm
peer–
trusted nodes
to–
sybil nodes
sybil defense scheme
sybil attacks
Sybil attack
Social network services
simulation
Servers
resource management
radio frequency allocation incensing
pubcrawl
proactive
peer to peer security
peer-to-peer network overlays
Peer-to-peer computing
peer
p2p
overlay networks
Metrics
malicious data
logically connected hosts
Licenses
data availability
computer network security
composability
component
biblio
Blockchain: Solving the Privacy and Research Availability Tradeoff for EHR Data: A New Disruptive Technology in Health Data Management
Submitted by grigby1 on Wed, 11/14/2018 - 1:19pm
policy maker institutions
health system developers
Human Factors
law regulations
lifelong recorded patient health data
Medical services
multisignature data access
patient data
patient privacy
Health information ecosystem
policy makers
population health management
privacy
privacy data
protective principles
pubcrawl
Scalability
secure data storing
defensive data hiding attitude
blockchain
blockchain technology
Business
cryptographically secured data storage
Cryptography
data availability
data privacy
data structures
American HIPAA regulation
disruptive technology
EHR
EHR data
electronic health records
ethical problems
expert systems
health data management
Health data storage
biblio
Differential Privacy Data Protection Method Based on Clustering
Submitted by grigby1 on Fri, 09/28/2018 - 11:58am
information loss
Scalability
risk reduction
Resiliency
pubcrawl
privacy protection
pattern clustering
numerical attribute
mixed data
Knowledge Discovery
insensitive clustering method
insensitive clustering algorithm
categorical attribute
information disclosure
ICMD-DP method
Human behavior
distributed computing
differential privacy data protection method
differential privacy
data privacy
data availability
composability
clustering
biblio
A Privacy Preserving Model for Energy Internet Base on Differential Privacy
Submitted by grigby1 on Fri, 09/28/2018 - 11:57am
Monitoring
user behavior privacy
Sensitivity
Scalability
Resiliency
pubcrawl
privacy preserving model
privacy preserving data release
privacy preserving data mining
privacy preserving
privacy
power engineering computing
nonintrusive load monitoring
Non-intrusive Load Monitoring
NILM
Algorithm design and analysis
Load management
Human behavior
Exponential distribution
energy Internet privacy protection
energy internet
electrical data use analysis
differential privacy
Data Security
Data protection
data privacy
Data mining
data availability
composability
batteries
1
2
next ›
last »