Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Europe
biblio
An approach to Privacy on Recommended Systems
Submitted by aekwall on Mon, 10/12/2020 - 11:31am
user security
Expert Systems and Privacy
users personal information
referral systems
recommended systems
privacy protection techniques
online companies
website
expert systems
Europe
recommender systems
user privacy
Human Factors
security
data privacy
Companies
social networks
Data protection
internet
social networking (online)
Facebook
privacy
pubcrawl
Human behavior
History
Scalability
biblio
Trust-Region Minimization Algorithm for Training Responses (TRMinATR): The Rise of Machine Learning Techniques
Submitted by grigby1 on Mon, 10/05/2020 - 2:11pm
Scalability
Neural networks
Newton method
nonconvex functions
optimisation
optimization
pubcrawl
Quasi-Newton methods
resilience
Resiliency
memory storage
security
Signal processing algorithms
storage management
Training
training responses
TRMinATR
Trust-region methods
trust-region minimization algorithm
Hessian matrices
computational complexity
computer architecture
computer theory
deep learning
Europe
gradient descent methods
gradient methods
Hessian approximations
approximation theory
Hessian matrix inversion
Human Factors
learning (artificial intelligence)
limited memory BFGS quasiNewton method
Limited-memory BFGS
Line-search methods
machine learning
matrix inversion
biblio
DeMetrA - Decentralized Metering with user Anonymity and layered privacy on Blockchain
Submitted by aekwall on Mon, 09/21/2020 - 3:50pm
market value
cars
adversarial modifications
Decentralized Metering
DeMetrA - decentralized metering
Distributed Database
DSLRs
identity-based cryptography
identity-based signatures
layered encoding
cyber physical systems
odometer fraud
odometers
practical concern
product attributes
pseudonym
reported values
shutter counters
specific counters
Control Theory and Privacy
privacy
Scalability
Cryptography
data privacy
History
Protocols
malicious modification
Resiliency
Human behavior
pubcrawl
automobiles
blockchain
Distributed databases
cyber-physical systems
digital signatures
Public key
blockchain technology
user anonymity
Europe
biblio
AIS Transmission Data Quality: Identification of Attack Vectors
Submitted by grigby1 on Fri, 08/28/2020 - 12:02pm
security
obstacle avoidance
potential attack vectors
Protocols
pubcrawl
Receivers
resilience
Resiliency
Scalability
maritime sector
security of data
Signal resolution
standards
state agencies
timing
transmission data quality
Vectors
AIS
marine navigation
marine communication
legislation
Human behavior
governments
Europe
data quality
conceptual countermeasures
collision avoidance
Coast Guard
automatic identification system
Attack vectors
Artificial Intelligence
AIS networks
AIS data
biblio
Fraud Detection using Machine Learning and Deep Learning
Submitted by aekwall on Mon, 08/24/2020 - 1:37pm
credit card
Europe
Forestry
Credit cards
area under the ROC curve
Australian dataset
autoencoder
benchmark multiple machine learning methods
Boltzmann machines
cost of failure
financial data processing
data mining techniques
Deep belief networks
EU
European dataset
German dataset
k nearest neighbor
Matthews correlation coefficient
restricted boltzmann machine
security checks
pattern classification
Support vector machines
support vector machine
learning (artificial intelligence)
machine learning
Random Forest
Resiliency
pubcrawl
composability
deep learning
Data models
convolutional neural nets
deep learning methods
Data mining
convolutional neural networks
Artificial Neural Networks
belief networks
fraud
fraud detection
biblio
Simulating the Efficiency of Thermoelectrical Generators for Sensor Nodes
Submitted by grigby1 on Thu, 07/16/2020 - 11:44am
Resiliency
Mathematical model
Metrics
power grids
power system security
precise monitoring
production site
pubcrawl
renewable energy sources
renewable sources
resilience
HVDC power transmission
sensor node
simulation
simulations
specific environment
Substations
Temperature sensors
thermoelectric conversion
thermoelectrical generator
wireless sensor networks
wireless sensor nodes
electrical vehicles
batteries
composability
computational fluid dynamics
computational fluid dynamics model converter
Conductivity
converter
converter station
course means
CPS modeling
Electric Vehicles
autarkic energy supply
electricity
energy harvesting
environmental factors
Europe
fossil fuels
Generators
green electrical power
Grid Security
high voltage direct current technology
HVDC power convertors
biblio
Critical Infrastructure Security: Alignment of Views
Submitted by aekwall on Mon, 07/06/2020 - 10:18am
Europe
Damage Assessment
protection of critical infrastructure
intergovernmental national views
informational space
information environment
cyber environment
critical infrastructure security
common cyberspace
air gap
critical information infrastructure
security
National security
Cyberspace
computer security
pubcrawl
Resiliency
information security
critical infrastructures
critical infrastructure
security of data
biblio
The European H2020 project VESSEDIA (Verification Engineering of Safety and SEcurity critical Dynamic Industrial Applications)
Submitted by grigby1 on Fri, 06/26/2020 - 1:18pm
IoT security
verification engineering of safety and security critical dynamic industrial applications
tools
static analysis
Source code analysis
software fault tolerance
Software
security of data
Security and Safety Analysis
security
Safety
Resiliency
pubcrawl
program diagnostics
Metrics
certification
IoT
Internet of Things
high-criticality applications
formal verification
Formal Specification
formal methods
European H2020 project VESSEDIA
Europe
embedded systems
Cyber-security
cyber-physical systems
cyber-attacks
connected systems security
composability
biblio
Noisy Encrypted Image Correction based on Shannon Entropy Measurement in Pixel Blocks of Very Small Size
Submitted by aekwall on Mon, 06/15/2020 - 11:01am
Image Processing
pixel blocks
noisy encrypted image
multimedia security
local Shannon entropy measurement
local entropy
Image reconstruction
image content confidentiality
block-size
blind error localization
forward error correction
Europe
Cryptography
image encryption
Noise measurement
image denoising
statistical analysis
Entropy
Metrics
composability
pubcrawl
Resiliency
encryption
biblio
Performance Measurements of Network Service Deployment on a Federated and Orchestrated Virtualisation Platform for 5G Experimentation
Submitted by aekwall on Mon, 06/01/2020 - 10:48am
network functions virtualization
virtualisation experiments
virtualisation
software defined networking
Servers
security
SDN experiments
Resiliency
resilience
pubcrawl
policy-based governance
orchestration
NFV experiments
network service deployment
network service
5G experimentation
network function virtualization
multiple component testbeds
Monitoring
middleware security
middleware platform
middleware
Measurement
KPI
Europe
EU SoftFIRE project
computer architecture
composability
5G mobile communication
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »