Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data processing
biblio
Big Data Security Frameworks Meet the Intelligent Transportation Systems Trust Challenges
Submitted by aekwall on Mon, 11/23/2020 - 11:27am
Traffic Management
Intelligent Data and Security
Intelligent Data Security
sustainable adoption
Security Classification
security approaches
multitier ITS security framework
ITS trust challenges
coherent reference architecture
business intelligence development
Big Data security frameworks
reference architecture
big data technologies
Intelligent Transportation Systems
Intelligent Transportation System
Scalability
Compositionality
Logic gates
Data processing
authentication
pubcrawl
Resiliency
machine learning
learning (artificial intelligence)
computer architecture
Trusted Computing
Internet of Things
Big Data
authorization
biblio
Cognitive Internet of Vehicles: Motivation, Layered Architecture and Security Issues
Submitted by aekwall on Mon, 10/19/2020 - 11:46am
cutting-edge technologies
Internet of Vehicles
cyber physical systems
technological advancements
cyber-physical impact
automobile scenario
automotive
automotive ecosystem
CIoV
cloud-based artificial intelligence
Cognitive Internet of Vehicles
communication field
vehicles
industrial revolution
industrial revolution 4.0
Intelligent Transportation System
Intelligent Transportation System concept
layer abstractions
local network
prime security
smart decision
technological evolution
ubiquitous 5G mobile network
Transportation
Cloud Computing
data privacy
security
computer architecture
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
Metrics
internet
Data processing
security of data
sensors
layered architecture
edge computing
next generation networks
Human Factors
security issues
security requirements
Artificial Intelligence
ubiquitous computing
privacy issues
biblio
An Adversarial Perturbation Approach Against CNN-based Soft Biometrics Detection
Submitted by aekwall on Mon, 10/12/2020 - 11:33am
Privacy Threats
Expert Systems and Privacy
unwanted soft biometrics-based identification
subject ethnicity
keystroke dynamics
Gender
daily life consumer electronics
computer vision tasks
CNN-based soft biometrics detection
biometric-based authentication systems
biometric approaches
adversarial stickers
adversarial perturbation approach
authentication systems
sensitive information
Perturbation methods
security of data
computer vision
Human Factors
biometrics (access control)
Data processing
authentication
convolutional neural nets
Neural networks
privacy
deep learning
pubcrawl
Human behavior
learning (artificial intelligence)
data privacy
Scalability
biblio
Edge AI and Blockchain for Privacy-Critical and Data-Sensitive Applications
Submitted by grigby1 on Fri, 08/07/2020 - 3:47pm
Electrocardiography
Scalability
fog computing paradigms
AI
cloud servers
Data processing
data-sensitive applications
e-health
edge AI
edge artificial intelligence
ethereum
Ethereum blockchain based architecture
Fall Detection
network architecture
privacy-critical systems
responsive systems
smarter systems
U-Health
Ubiquitous Health
resilience
Internet of Things
feature extraction
Artificial Intelligence
IoT
blockchain
Distributed databases
pubcrawl
Human behavior
Human Factors
Logic gates
Resiliency
data privacy
privacy
Medical services
Cloud Computing
edge computing
security vulnerabilities
network load
biblio
Multiple Fault Diagnosis Methods Based on Multilevel Multi-Granularity PCA
Submitted by aekwall on Mon, 05/18/2020 - 10:47am
multilevel multigranularity PCA
traditional PCA fault diagnosis
Resiliency
pubcrawl
production engineering computing
process monitoring
process fault diagnosis
principal component analysis
multivariate statistical analysis
multiple process variables
multiple fault diagnosis methods
multiple fault diagnosis
Correlation
multi-level
multi-granularity
Metrics
linear correlation
Human Factors
fault diagnosis
fault detection
Data processing
Data models
cyber physical systems
Covariance matrices
biblio
Research on Industrial Internet of Things Security Architecture and Protection Strategy
Submitted by aekwall on Mon, 05/04/2020 - 11:14am
Protocols
Internet of Things
Internet of Things security architecture
IoT security
IoT systems
Network Security Architecture
network security threats
production engineering computing
protection strategy
intelligent transportation
pubcrawl
security
security of data
security protection strategies
security strategy
security threats
Servers
Intelligent Data and Security
intelligent processing
intelligent environment detection
information security issues
industrial IoT system
industrial IoT information security protection technology
Industrial IoT
industrial automation systems
Data processing
data acquisition
cyber security threats
computer network security
Scalability
Resiliency
Compositionality
Intelligent Data Security
biblio
Genoma: Distributed Provenance as a Service for IoT-based Systems
Submitted by aekwall on Mon, 03/30/2020 - 11:33am
cloud
provenance-as-a-service
Production facilities
IoT-based systems
genomics
Genoma
edge
distributed provenance
distributed IoT provenance
data processing substrate
Data processing
data management
Substrates
IoT
data provenance
Provenance
bioinformatics
Metrics
composability
pubcrawl
Human behavior
Resiliency
Data models
Internet of Things
Cloud Computing
biblio
A Novel Key-Value Based Real-Time Data Management Framework for Ship Integrated Power Cyber-Physical System
Submitted by grigby1 on Mon, 01/27/2020 - 12:27pm
relational databases
power engineering computing
power system management
power systems
pubcrawl
Real-time Data Management
real-time data management prototype system
real-time data processing
real-time systems
relational data management
open source in-memory key-value store
resilience
Resiliency
Scalability
ship Big Data
ship integrated power cyber-physical system
ship integrated power cyber-physics system
ships
storage management
Human behavior
Cyber Physical System
cyber-physical system
cyber-physical systems
data handling
Data models
Data processing
data-driven intelligence
delays
generation ship integrated power system
Big Data
Human Factors
Integrated Power System
IPS
key-value data model
Key-value Store
marine engineering
Marine vehicles
Metrics
biblio
The Method of Raising Numbers, Represented in the System of Residual Classes to an Arbitrary Power of a Natural Number
Submitted by aekwall on Mon, 01/20/2020 - 11:48am
multiplication
Task Analysis
subtraction
Scalability
Resiliency
residual classes
residual class system
Redundancy
pubcrawl
positive number
number theory
no-fault operations
negative number
natural redundancy
natural number
addition
Mathematical model
integer arithmetic operations
exponentiation
digital arithmetic
Data processing
data compression
Conferences
computer systems and components
computer systems
Complexity theory
artificial redundancy
arithmetic operations
arbitrary power
biblio
A new Security Mechanism for Vehicular Cloud Computing Using Fog Computing System
Submitted by aekwall on Mon, 12/30/2019 - 12:15pm
UBP
privacy
pubcrawl
Resiliency
Scalability
secure vehicular platform
security mechanism
Traffic congestion
traffic engineering computing
Prediction algorithms
user behavior profiling
VANET
VCC
vehicle computing service requests
vehicle storing service requests
vehicular cloud computing
vehicular cloud servers
Vehicular fog computing
edge computing
security
Cloud Computing
computer architecture
data privacy
Data processing
data servers
Decoy technology
distributed processing
Fog computing
encryption
energy consumption reduction
Fog Computing and Security
fog computing architecture
fog computing system
Monitoring
power aware computing
« first
‹ previous
1
2
3
4
5
next ›
last »