Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
personal data
biblio
Intelligent System and Human-Computer Interaction for Personal Data Cyber Security in Medicaid Enterprises
Submitted by grigby1 on Fri, 09/08/2023 - 10:09am
information management
Medicaid enterprise
intelligent system
enterprise resource planning
Data Warehouse
data warehouses
intelligent data
data flow
cyber-physical system
human computer interaction
Human-computer interaction
Compositionality
security
personal data
Internet of Things
composability
cyber security
Medical services
Scalability
Hardware
Software
Resiliency
resilience
pubcrawl
biblio
Development of the Algorithm to Ensure the Protection of Confidential Data in Cloud Medical Information System
Submitted by grigby1 on Mon, 04/18/2022 - 11:38am
Cloud Computing
computer architecture
Homomorphic encryption
information security
machine learning algorithms
medical cloud information system
personal data
pubcrawl
Scalability
security scalability
standardization
telemedicine
biblio
Expert System for Assessing the Efficiency of Information Security
Submitted by grigby1 on Mon, 03/29/2021 - 1:26pm
information security efficiency assessment
technical measures
security of data
security
resilience
pubcrawl
protected information
personal data
Organizations
organizational measures
organizational and administrative documents
Monitoring
IP networks
informed decisions
information system
Security Audits
information security audit
information security
information protection system
expert systems
expert system
expert assessment method
Data protection
coefficient of significance
authorities
auditing
audit information security
Scalability
Resiliency
Human behavior
biblio
Risks Identification in the Exploitation of a Geographically Distributed Cloud Infrastructure for Storing Personal Data
Submitted by grigby1 on Mon, 03/29/2021 - 1:14pm
Scalability
natural person
Object recognition
payment information records
personal data
personal data records
privacy
processing
pubcrawl
Risk
risk Identification
risk management
models
security
security of data
Servers
social engineering techniques
storage management
stored resources
storing personal data
system
Task Analysis
technical project
unsecured service
Data protection
augumented reality
Big Data
Cloud Computing
cloud services
cloud storage administrators
Companies
confidential information leaks
controller
cyber incidents
data leak
data privacy
auditing storage
data storage subsystem
data subject GDPR
digital twin
Distributed databases
expert systems
geographically distributed cloud infrastructure
geographically distributed company
high-loaded infocommunications systems
Human Factors
information quality
Kaspersky Lab
biblio
Software architecture for the application of facial recognition techniques through IoT devices
Submitted by aekwall on Tue, 03/09/2021 - 11:58am
neural network
Transportation
Systematics
Software measurement
software architecture proposal
Software Architecture
Software
security of data
Scalability
Resiliency
pubcrawl
process control
personal data
biometric encryption
Metrics
IoT devices
Internet of Things
feature extraction
facial recognition time
facial recognition techniques
facial recognition
face recognition
encryption
data privacy
biometrics (access control)
Big Data
biblio
Biometric System of Access to Information Resources
Submitted by aekwall on Tue, 03/09/2021 - 11:57am
internet
webhost web server
web resource
unauthorized access
structural schematic diagram
software and hardware complex
Scalability
Resiliency
pubcrawl
phpMyAdmin database server
PHP scripting language
personal data
online front-ends
Metrics
JavaScript
Java
biometric encryption
information resourses
information resources
information resource
Identification
hypermedia markup languages
HTML hypertext markup language
hardware complex
Google Chrome extension
fingerprint
embedded scripts
developed complex
C language
biometric system
authorisation
authoring languages
biblio
An Empirical Evaluation of GDPR Compliance Violations in Android mHealth Apps
Submitted by grigby1 on Thu, 01/28/2021 - 1:33pm
Resiliency
mHealth apps
mobile computing
patient monitoring
personal data
privacy
Privacy Policies
Privacy Policy
privacy protection
pubcrawl
resilience
Metrics
Scalability
security
security of data
Semantics
sensitive data
severe privacy issues
severe privacy threats
software reliability
step-by-step guidelines
Systematics
Data protection
Android apps
Android mHealth
app code
app implementations
app privacy policy
app users
data collections
data flow
data practices
data privacy
android encryption
Data Transmission
GDPR
GDPR compliance violations
GDPR lists general rules
General Data Protection Regulation
GUI
Human behavior
medical computing
medical information systems
biblio
A Probability based Model for Big Data Security in Smart City
Submitted by grigby1 on Tue, 10/06/2020 - 1:41pm
security of data
IoT
organisational data
Organizations
personal data
probability
probability based model
pubcrawl
resilience
Resiliency
security
highly sensitive data
sensitive data sharing
smart applications
smart cities
Smart City
smart city critical data
smart city data
smart technologies
smart traffic management system
transport data
Trusted Computing
Data Leakage Detection
Big Data
big data security
bigraph
Computational modeling
Computing Theory
crisis response
critical data security
data analysis
Data Analytics
data leakage
Analytical models
Data models
data objects
data privacy
disaster resilience
economic data
emergency management
energy data
environment data
graph theory
Guilt Model
biblio
Privacy Preserving Big Data Publication On Cloud Using Mondrian Anonymization Techniques and Deep Neural Networks
Submitted by aekwall on Mon, 07/13/2020 - 11:07am
privacy
k-anonymity
machine learning
Mondrian anonymization techniques
Mondrian based k-anonymity approach
neural nets
Neural networks
personal data
personally identifiable information
predominant factor
high-dimensional data deep neural network based framework
privacy breach
privacy preservation
privacy preserving big data publication
privacy-preservation
protection
Resiliency
security
user privacy in the cloud
data analysis
pubcrawl
Human Factors
resilience
Scalability
Metrics
Big Data
Big Data Analytics
Cloud Computing
compromising privacy
big data privacy
data management
Data models
data privacy
data utility
Databases
deep neural networks
differential privacy
DNN
biblio
An Anonymous Attribute-based Access Control System Supporting Access Structure Update
Submitted by aekwall on Mon, 07/06/2020 - 9:57am
policy-based governance
hidden access structures
cloud-based cryptographic system
cloud service provider
anonymous attribute-based encryption
anonymous attribute-based access control system
access structure update
personal data
fine-grained access control
outsourcing
cryptology
Metrics
Cloud Computing
pubcrawl
Human behavior
Resiliency
Proxy re-encryption
data privacy
data owner
attribute-based encryption
data confidentiality
Cryptography
authorisation
Scalability
1
2
next ›
last »