Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information entropy
biblio
Collaboration-Based Location Privacy Protection Method
Submitted by grigby1 on Thu, 08/13/2020 - 4:34pm
privacy protection algorithm
collaborative users
information entropy
location anonymity
location privacy
location-based
maximum anonymity value set
multihop communication
personalized anonymity
collaboration-based location privacy protection method
query block exchange
query diversity
query information
random-QBE
Services
spread spectrum communication
user collaboration
user cooperative privacy protection
Switches
Servers
pubcrawl
Human behavior
resilience
Resiliency
data privacy
privacy
composability
collaboration
quality of service
Metrics
query processing
anonymity
groupware
anonymity requirement
anonymous group
anonymous location
biblio
Information Entropy Differential Privacy: A Differential Privacy Protection Data Method Based on Rough Set Theory
Submitted by aekwall on Mon, 01/06/2020 - 9:35am
information entropy difference privacy
use information entropy
Sensitivity
Scalability
Rough sets
rough set theory
Resiliency
random noise
pubcrawl
privacy protection
privacy
personalized noise
personal sensitive information
information entropy differential privacy solution
Computing Theory and Privacy
information entropy
Human behavior
Entropy
differential privacy protection data method
differential privacy
data privacy
data correlations
correlation data privacy issues
Correlation
composability
behavioral prediction
Association data
associated data
biblio
A Reliable and Lightweight Trust Computing Mechanism for IoT Edge Devices Based on Multi-Source Feedback Information Fusion
Submitted by aekwall on Mon, 12/09/2019 - 11:22am
low-overhead trust computing algorithms
information entropy
IoT edge computing applications
IoT edge computing architecture
IoT edge devices
largescale IoT edge computing
lightweight trust computing mechanism
lightweight trust evaluating mechanism
lightweight trust mechanism
global trust calculation
multi-source feedback information fusion
multisource feedback information fusion
objective information entropy theory
outsourced computing services
reliable trust computing mechanism
trust calculation mechanism
trust computing mechanism
Computing Theory and Trust
Entropy
Cloud Computing
Internet of Things
security
Trusted Computing
pubcrawl
composability
Computational modeling
Reliability
security of data
sensor fusion
edge computing
Compositionality
outsourcing
Computational efficiency
feedback information fusion algorithm
feedback trust
biblio
A security protection approach based on software defined network for inter-area communication in industrial control systems
Submitted by grigby1 on Mon, 06/11/2018 - 2:19pm
interarea communication protection
software defined networking
Software Defined Network (SDN)
Software Defined Network
security protection approach
security protection
security interarea communication architecture
security inspection method
Resiliency
resilience
pubcrawl
production engineering computing
Package Inspection
Networked Control Systems Security
Metrics
attacks propagation prevention
Inter-Area Communication
information entropy
Industrial Control Systems
industrial control
hazards propagation prevention
Hazards
Entropy
deep network behaviors analysis
cyber-attacks detection
customized communication protection technology
control engineering computing
computer network security
composability
biblio
"Discovery of De-identification Policies Considering Re-identification Risks and Information Loss"
Submitted by grigby1 on Thu, 02/23/2017 - 11:14am
Lattices
Upper bound
UCI machine learning repository
Synthetic aperture sonar
Safe Harbor
risk analysis
reidentification risks
pubcrawl170105
privacy leakage
privacy
learning (artificial intelligence)
Computational modeling
information loss
information entropy
HIPPA
Entropy
deidentified data
deidentification policies
de-identification
data privacy
data analysis
biblio
Service Operator-Aware Trust Scheme for Resource Matchmaking across Multiple Clouds
Submitted by BrandonB on Wed, 05/06/2015 - 1:16pm
multidimensional resource service operator
Trusted Computing
trust scheme
Trust management
SOTS
service operator-aware trust scheme
service operator
security
resource matchmaking
resource allocation
Registers
Availability
multicloud environment
multi-cloud environment
middleware framework
middleware
information entropy theory
information entropy
Entropy
Computational modeling
Cloud Computing
Cloud broker
biblio
Analysis on vulnerability of power grid based on electrical betweenness with information entropy
Submitted by BrandonB on Fri, 05/01/2015 - 6:26am
complex networks
Entropy
Generators
IEEE 118 bus system
IEEE standards
information entropy
Load modeling
power grid vulnerability
power grids
Vulnerability
« first
‹ previous
1
2