Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
privacy issues
biblio
A Comparative Study on security breach in Fog computing and its impact
Submitted by aekwall on Mon, 06/28/2021 - 11:35am
edge computing
security breach
Scalability
Resiliency
pubcrawl
Privacy-preserving techniques
privacy issues
privacy
Fog Computing and Security
Fog computing
data privacy
computer architecture
Cloud vs Fog
Cloud Computing
challenges
Bandwidth
security
biblio
Modeling of Insider Threat using Enterprise Automaton
Submitted by grigby1 on Thu, 04/08/2021 - 3:55pm
automata
psycho-social behaviors
novel unified model
nonhuman agents
insider threat modeling
insider attacker
insider agents
insider
Enterprise process
enterprise automaton
authorized privileges
security management
Silicon
Task Analysis
Metrics
authorisation
Attack detection
Computational modeling
privacy issues
data privacy
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
business data processing
security
Organizations
insider threat
biblio
OC-FakeDect: Classifying Deepfakes Using One-class Variational Autoencoder
Submitted by grigby1 on Fri, 01/15/2021 - 11:02am
detecting Deepfakes
Face
DeepFake
binary-classification based detection
binary-classification based methods
class-based approach
computer-generated image
data scarcity limitations
deepfakes data
deepfakes detection
deepfakes generation methods
Image reconstruction
detection performance
detects nonreal images
fake face images
image forgery method
OC-FakeDect
one-class anomaly detection problem
one-class variational autoencoder
person
sufficient fake images data
Support vector machines
Training
Anomaly Detection
pubcrawl
Human behavior
Human Factors
Metrics
Resiliency
data privacy
Scalability
privacy issues
learning (artificial intelligence)
Streaming media
Benchmark testing
resilience
Forensics
face recognition
feature extraction
image classification
pattern clustering
object detection
biblio
Cognitive Internet of Vehicles: Motivation, Layered Architecture and Security Issues
Submitted by aekwall on Mon, 10/19/2020 - 10:46am
cutting-edge technologies
Internet of Vehicles
cyber physical systems
technological advancements
cyber-physical impact
automobile scenario
automotive
automotive ecosystem
CIoV
cloud-based artificial intelligence
Cognitive Internet of Vehicles
communication field
vehicles
industrial revolution
industrial revolution 4.0
Intelligent Transportation System
Intelligent Transportation System concept
layer abstractions
local network
prime security
smart decision
technological evolution
ubiquitous 5G mobile network
Transportation
Cloud Computing
data privacy
security
computer architecture
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
Metrics
internet
Data processing
security of data
sensors
layered architecture
edge computing
next generation networks
Human Factors
security issues
security requirements
Artificial Intelligence
ubiquitous computing
privacy issues
biblio
BlockSee: Blockchain for IoT Video Surveillance in Smart Cities
Submitted by aekwall on Mon, 09/28/2020 - 11:09am
jointly provides validation
video surveillance
video frames
video cameras
urban environments
Urban areas
smart cities
pubcrawl
privacy issues
privacy
physical manipulations
observed scene
multiple video-flows
mechanical settings
malicious users
bitcoin
IoT video surveillance
Internet of Things
Human Factors
Human behavior
heterogeneous owners
distributed city-wide monitoring systems
data privacy
cyber physical systems
CPS Privacy
contracts
Cameras
camera settings
BlockSee
blockchain-based video surveillance system
biblio
Template Protection based on Homomorphic Encryption: Computationally Efficient Application to Iris-Biometric Verification and Identification
Submitted by grigby1 on Fri, 08/28/2020 - 2:42pm
IITD database
Template Protection
secure systems
Scalability
Resiliency
resilience
Recognition accuracy
pubcrawl
Probes
privacy issues
permanent protection
Metrics
iris-coding
iris-biometric verification
Iris recognition
Image coding
biometric encryption
identification mode
Homomorphic encryption
Hamming distance
feature extraction
encryption domain scheme
encryption
early decision making strategy
Decision Making
Cryptography
computationally efficient application
computational overload
block-wise comparison
biometrics (access control)
biometric recognition systems
biblio
A Scalable (\$\textbackslashtextbackslashalpha, k\$)-Anonymization Approach using MapReduce for Privacy Preserving Big Data Publishing
Submitted by grigby1 on Fri, 08/07/2020 - 2:47pm
big data privacy
Velocity of data
timely anonymization
scenarios efficient anonymization
Scalable k-Anonymization approach
Scalable k-Anonymization (SKA)
scalable anonymization approach
Publishing
privacy preserving big data publishing
privacy preserving approaches scalability
MapReduce based Anonymization (MRA)
k-anonymity
data publishing approaches
Credit cards
security of data
anonymity
AI
Government
Scalability
Big Data
privacy issues
privacy
data privacy
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
biblio
Privacy-Preserving Deep Learning via Additively Homomorphic Encryption
Submitted by grigby1 on Fri, 08/07/2020 - 2:47pm
resilience
neural nets
privacy
privacy issues
privacy-preserving deep learning
privacy-preserving financial data analytics systems
privacy-preserving logistic regression
pubcrawl
regression analysis
JST CREST AI
Resiliency
Scalability
social challenges
social life
social sciences computing
Society 5.0
super-smart society
additively homomorphic encryption
IoT
information and communication technology
Human Factors
Human behavior
fraud
fourth industrial revolution
financial institutions
financial data processing
encryption
digital arithmetic
deep learning
data privacy
data analysis
Big Data
AI
biblio
Critical Aspects Pertaining Security of IoT Application Level Software Systems
Submitted by aekwall on Mon, 06/01/2020 - 9:47am
middleware security
Vulnerability
standards
Software systems
software security
security of data
security
Resiliency
resilience
pubcrawl
Protocols
privacy issues
policy-based governance
application level software systems
middleware
IoT devices
IoT
Internet of Things security
Internet of Things
Insecure Software/Firmware
insecure software
Insecure Interfaces
data privacy
Constrained Application Protocol
composability
CoAP
biblio
Social Privacy Score Through Vulnerability Contagion Process
Submitted by aekwall on Mon, 04/20/2020 - 9:31am
Diffusion processes
privacy models and measurement
vulnerable social interactions
vulnerable interactions
vulnerable friends
vulnerability measurement
vulnerability diffusion process
vulnerability contagion process
social privacy score
privacy fields
privacy awareness framework
over-trusting vulnerable users
Messaging services
graph-theoretical properties
security of data
sensitive information
Message service
privacy issues
social networking (online)
Metrics
privacy
graph theory
pubcrawl
Electronic mail
Current measurement
security
data privacy
1
2
3
next ›
last »