Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
human factor
biblio
Investigating the Value of Privacy within the Internet of Things
Submitted by grigby1 on Wed, 09/05/2018 - 9:39am
Mobile communication
user privacy protection
Scalability
Resiliency
resilience
pubcrawl
PrivacyGate
privacy
phones
personal information
personal data exchange
operating systems
mobile computing
Android (operating system)
IoT transaction privacy
IoT devices
Internet of Things
human factor
Human behavior
game-theoretic concept
game theory
Data protection
data privacy
Computing Theory
Companies
Android operating system
biblio
Towards a theory of free-lunch privacy in cyber-physical systems
Submitted by grigby1 on Wed, 09/05/2018 - 9:39am
Human behavior
Smart homes
Scalability
Resiliency
resilience
Public transportation
pubcrawl
privacy
optimization
multiparametric programming
mathematical programming
human factor
computational geometry
Heating systems
free-lunch privacy mechanism
Decision Making
data-informed decision making processes
data utility
Data protection
data privacy protection
data privacy
cyber-physical systems
Computing Theory
biblio
Ideal complexity cryptosystem with high privacy data service for cloud databases
Submitted by grigby1 on Wed, 09/05/2018 - 9:39am
Databases
storage services
secrecy
Scalability
Safety
Resiliency
resilience
pubcrawl
privacy
metadata
human factor
Human behavior
high privacy data service
encryption techniques
encryption
client data
database management systems
Database as a service
data storage
data privacy
data confidentiality
cryptosystem
Cryptography
Concurrency
Computing Theory
Complexity theory
Cloudcomputing
cloud service provider
cloud databases
Cloud Computing
biblio
Differentially Private Trajectory Analysis for Points-of-Interest Recommendation
Submitted by grigby1 on Wed, 09/05/2018 - 9:38am
resilience
mobile computing
mobile positioning devices
points-of-interest recommendation
privacy
privacy-preserving trajectory mining
pubcrawl
recommendation
recommender systems
Mobile communication
Resiliency
road networks
Scalability
sensitive location information exposure
traffic engineering computing
Trajectory
trajectory data mining
trajectory dataset
Electronic mail
association matrix extraction
Bipartite graph
Computing Theory
Data mining
data privacy
differential privacy
differential privacy guarantees
differentially private trajectory analysis
Algorithm design and analysis
graph theory
high-speed wireless networks
HITS
Human behavior
human factor
hyperlink-induced topic search
large-scale trajectory data
location privacy
biblio
Limits of location privacy under anonymization and obfuscation
Submitted by grigby1 on Wed, 09/05/2018 - 9:38am
markov chain
Time series analysis
statistical analysis
Scalability
Resiliency
resilience
pubcrawl
privacy
obfuscation
mobile devices
mobile computing
Measurement
Markov processes
anonymization
location-based services
Location Privacy Protecting Mechanism (LPPM)
location privacy
Location Based Service (LBS)
information theory
Information Theoretic Privacy
human factor
Human behavior
general Markov Chain model
data privacy
Computing Theory
anonymization-based LBS systems
biblio
Group Differential Privacy-Preserving Disclosure of Multi-level Association Graphs
Submitted by grigby1 on Wed, 09/05/2018 - 9:38am
group differential privacy-preserving disclosure
εg-group differential privacy
Scalability
Resiliency
resilience
pubcrawl
privacy
multilevel association graphs
information privacy protection
human factor
Human behavior
group privacy
aggregate information
graph theory
graph data
Electronic mail
drugs
Data protection
data privacy
data analysis
Computing Theory
Bipartite graph
Aggregates
biblio
A Hierarchical Game Framework for Data Privacy Preservation in Context-Aware IoT Applications
Submitted by grigby1 on Wed, 09/05/2018 - 9:38am
Numerical models
user-defender-attacker game
two-player model
two-player game model
two-layer three-player game framework
service provider
secure privacy-preserving protocols
Scalability
Resiliency
resilience
pubcrawl
private information
privacy
computer science
Internet of Things
human factor
Human behavior
hierarchical game framework
Games
game theory
data privacy preservation
data privacy
Data models
context-aware IoT applications
context-aware Internet
Computing Theory
biblio
Threat Intelligence for Bluetooth-Enabled Systems with Automotive Applications: An Empirical Study
Submitted by grigby1 on Thu, 08/23/2018 - 10:36am
security risks
automotive
automotive electronics
automotive applications
Bluetooth
Bluetooth connectivity
bluetooth security
Bluetooth-enabled systems
composability
Cybersecurity
Resiliency
Safety
Roads
security
wireless interfaces
telecommunication security
Human behavior
human factor
infotainment
Inspection
malicious attacks
on-board communications
Pins
pubcrawl
resilience
threat intelligence
war-nibbling
biblio
Microblogging in a Privacy-Preserving Way
Submitted by grigby1 on Thu, 08/23/2018 - 10:36am
anonymous messaging
anonymity
bluetooth security
composability
Homomorphic encryption
Human behavior
human factor
Microblogging
ORAM
privacy
pubcrawl
resilience
Resiliency
biblio
Breaking BLE Beacons For Fun But Mostly Profit
Submitted by grigby1 on Thu, 08/23/2018 - 10:36am
pubcrawl
Resiliency
Human behavior
composability
resilience
human factor
bluetooth security
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »