Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
user privacy protection
biblio
User Privacy Protection Technology of Tennis Match Live Broadcast from Media Cloud Platform Based on AES Encryption Algorithm
Submitted by grigby1 on Thu, 07/08/2021 - 1:35pm
cloud
user privacy in the cloud
user privacy protection
Tennis matches
Sports
AES encryption algorithm
Media
Partitioning algorithms
Clustering algorithms
encryption
user privacy
privacy
Scalability
Resiliency
resilience
Metrics
pubcrawl
Cloud Computing
biblio
Assisting the Development of Secure Mobile Apps with Natural Language Processing
Submitted by aekwall on Mon, 05/18/2020 - 9:53am
natural language processing
user privacy protection
tools
secure mobile apps development
Scalability
Resiliency
recommender systems
rapid growth
pubcrawl
Androids
Mobile Security
mobile devices
mobile computing
largest worldwide market share
Humanoid robots
Human behavior
data privacy
biblio
User Privacy Protection for Cloud Computing Based Smart Grid
Submitted by grigby1 on Mon, 03/09/2020 - 1:58pm
security
power system reliability
power system security
privacy
privacy protection
pubcrawl
Reliability
resilience
Resiliency
Scalability
power engineering computing
Smart Grid
smart grid communication system
Smart Grid Privacy
Smart Grids
smart meter system
smart meters
smart power grids
user privacy protection
data security issue
Cloud Computing
collaboration
composability
Conferences
data chunk storage
data combination privacy
data insertion
data privacy
data searching
chunk relationship confusion
electric system efficiency
electric system reliability
electric system safety
electrical safety
Human behavior
Human Factors
Metrics
policy-based governance
biblio
An Empirical Study on the Data Security and Privacy Awareness to Use Health Care Wearable Devices
Submitted by aekwall on Mon, 02/17/2020 - 1:56pm
health care wearable devices
wearables security
structural equation analysis
security practice
security knowledge
security conduct
Security Awareness
security attitude
psychological effects
private businesses
privacy awareness
physical negative effects
personal health data
patient monitoring
multilayer medical resources
medical market
security of data
health applications
psychology
medical data
National security
privacy protection
user privacy protection
health care
Data protection
privacy
pubcrawl
Human behavior
Resiliency
Data Security
Scalability
biblio
A Novel Moving Target Defense Technique to Secure Communication Links in Software-Defined Networks
Submitted by aekwall on Mon, 09/09/2019 - 9:47am
secure communication links
moving target defense (MTD)
MTD model
MTD-based security model
network architecture
Network Control
network device
network intruders
novel moving target defense technique
SDN security model
secure communication
message transmission
security solution
sensitive data leakages
Software-defined networking (SDN)
Switches
transmitted messages
user identities
user privacy protection
work-in-progress research
Predictive Metrics
OpenFlow
IP networks
Receivers
security
computer network management
Data models
Resiliency
pubcrawl
Routing
Data protection
software-defined networking
computer network security
Scalability
network management
Software-Defined Networks
moving target defense
centralized orientation
communication environment
communication links
Computer Network Attacks
computer networking
biblio
Covert Communication Under Channel Uncertainty and Noise Uncertainty
Submitted by grigby1 on Thu, 09/05/2019 - 10:25am
low probability of detection communication
user privacy protection
uncertainty
Throughput
telecommunication security
signal transmission
Signal to noise ratio
Scalability
resilience
receive SNR
Rayleigh fading channel
Rayleigh channels
Probability density function
noise uncertainty
noise power
average probability
Gain
fading channels
error statistics
eavesdropper
Data protection
covert throughput loss
covert throughput gain
covert communication
covert channels
Compositionality
channel uncertainty
channel gain
Channel estimation
average probability of detection error
biblio
Investigating the Value of Privacy within the Internet of Things
Submitted by grigby1 on Wed, 09/05/2018 - 9:39am
Mobile communication
user privacy protection
Scalability
Resiliency
resilience
pubcrawl
PrivacyGate
privacy
phones
personal information
personal data exchange
operating systems
mobile computing
Android (operating system)
IoT transaction privacy
IoT devices
Internet of Things
human factor
Human behavior
game-theoretic concept
game theory
Data protection
data privacy
Computing Theory
Companies
Android operating system
biblio
Right to silence: Establishing map-based Silent Zones for participatory sensing
Submitted by BrandonB on Mon, 05/04/2015 - 1:16pm
Mobile communication
wireless sensor networks
user privacy protection
sensors
security of data
privacy level
privacy
performance evaluation
participatory sensing
mobile phones
Mobile handsets
mobile devices
mobile computing
ban zones
map-based silent zones
location data
large-scale sensing systems
k-anonymity
habitat density
embedded sensors
dynamic map-based blinding out
data privacy
Cities and towns
cartography
Buildings