Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malicious users
biblio
Threat detection in Cognitive radio networks using SHA-3 algorithm
Submitted by aekwall on Fri, 04/28/2023 - 9:41am
security
simulation
sensors
blockchain
Reliability
malicious users
pubcrawl
diversity reception
blockchains
Resiliency
cognitive radio
Cognitive Radio Network
Secure Hash Algorithm 3
spectrum sensing
Cognitive Radio Security
biblio
A Trust-based Message Passing Algorithm against Persistent SSDF
Submitted by aekwall on Mon, 06/28/2021 - 12:31pm
cognitive radio
cooperative spectrum sensing
false trust
Libraries
malicious users
Mathematical model
message passing
policy-based governance
pubcrawl
radio transmitters
Reliability
Resiliency
Resists
Scalability
sensors
biblio
Inference of Suspicious Co-Visitation and Co-Rating Behaviors and Abnormality Forensics for Recommender Systems
Submitted by grigby1 on Thu, 04/08/2021 - 5:10pm
Scalability
Metrics
personalized collaborative recommender systems
pervasiveness
pubcrawl
rating intention
real-world data
recommender system
recommender systems
resilience
Resiliency
Measurement
security of data
spotting anomalies
structure-based property
suspicious co-visitation behavior
suspicious nodes
suspicious ratings
time series
Time series analysis
ubiquitous computing
unified detection framework
Forensics
Anomaly Detection
association rules
Attack detection
co-rating behaviors
co-rating graphs
collaboration
Couplings
Data mining
e-commerce services
electronic commerce
abnormality forensics
forensics metrics including distribution
fundamental vulnerabilities
graph theory
historical ratings
Human behavior
inference
information forensics
malicious attack
malicious attack behaviors
malicious users
biblio
On the Impact of SSDF Attacks in Hard Combination Schemes in Cognitive Radio Networks
Submitted by aekwall on Mon, 03/15/2021 - 12:05pm
MAJORITY-rule
critical threats
CSS
different hard-decision fusion schemes
fusion center
hard combination schemes
hard data
hard data combining
hard-decision combination
hard-decision fusion scheme
licensed frequency bands
cooperative spectrum sensing
malicious user
miss detection
OR-rule
Primary User spectrum accessibility
PU
Spectrum Sensing Data Falsification reports
SSDF attacks
user performs Energy Detection
Cognitive Radio Security
cooperative communication
Resiliency
pubcrawl
Signal to noise ratio
probability
collaboration
Bandwidth
Interference
radio networks
sensors
telecommunication security
signal detection
Cascading style sheets
malicious users
radio spectrum management
cognitive radio
cognitive radio networks
detection performance
AND-rule
AYMU attacks
biblio
Conditional Anonymity enabled Blockchain-based Ad Dissemination in Vehicular Ad-hoc Network
Submitted by grigby1 on Thu, 01/28/2021 - 1:59pm
resilience
Human behavior
in-vehicle service
internal attacker scenarios
malicious users
message authentication
Metrics
monitoring authority
privacy
pubcrawl
fake ads
Resiliency
vehicle-to-infrastructure communication
vehicle-to-vehicle communication
vehicular ad hoc networks
Vehicular Ad-hoc Network
vehicular network
zero-knowledge proof of knowledge
ZKPoK
certification authority
advertisement sharing
advertising
anonymity
authenticated users
behavioural privacy leakage
blockchain
blockchain-based ad dissemination
certificate-less cryptography
ad dissemination
composability
conditional anonymity
cryptocurrencies
Cryptography
data privacy
delays
Distributed databases
fair incentive mechanism
biblio
User Credibility Assessment Based on Trust Propagation in Microblog
Submitted by grigby1 on Wed, 12/02/2020 - 2:15pm
online social network
user social relationship graph
user credibility assessment
Uniform resource locators
two-way propagation trust scoring
trustworthiness-based user credibility evaluation algorithm
Trusted Computing
trust propagation
trust
social networking (online)
Social network services
seed node selection algorithm
pubcrawl
pruning algorithm
optimisation
online social networking platform
Clustering algorithms
network topology
microblog user credibility evaluation algorithm
Microblog platform
microblog
Manuals
malicious users
low trusted user
Human Factors
Human behavior
graph theory
feature extraction
Fans
false social relationships
Computing Theory
biblio
IoT Malware Analysis
Submitted by aekwall on Mon, 10/26/2020 - 12:12pm
machine learning
Ollydebug
IoT malware analysis
information system integrity
information system confidentiality
information system availability
CIA triad
malicious users
malicious software
Predictive Metrics
malware attacks
Malware Analysis
image recognition
privacy
IoT
blockchain
Metrics
pubcrawl
Human behavior
Resiliency
invasive software
security
malware
data integrity
IoT devices
Internet of Things
Conferences
biblio
BlockSee: Blockchain for IoT Video Surveillance in Smart Cities
Submitted by aekwall on Mon, 09/28/2020 - 12:09pm
jointly provides validation
video surveillance
video frames
video cameras
urban environments
Urban areas
smart cities
pubcrawl
privacy issues
privacy
physical manipulations
observed scene
multiple video-flows
mechanical settings
malicious users
bitcoin
IoT video surveillance
Internet of Things
Human Factors
Human behavior
heterogeneous owners
distributed city-wide monitoring systems
data privacy
cyber physical systems
CPS Privacy
contracts
Cameras
camera settings
BlockSee
blockchain-based video surveillance system
biblio
Use of Artificial Neural Networks to Identify Fake Profiles
Submitted by aekwall on Mon, 08/10/2020 - 10:36am
Artificial Neural Networks
social network page
social media
sigmoid function
malicious users
Identify Fake Profiles
fake profiles identification
Facebook friend request
artificial neural network
security of data
cyber physical systems
neural nets
social networking (online)
policy-based governance
pubcrawl
Resiliency
machine learning
learning (artificial intelligence)
biblio
Constant Size CP-ABE with Scalable Revocation for Resource-Constrained IoT Devices
Submitted by grigby1 on Fri, 07/24/2020 - 12:40pm
Internet of Things
valid users
scalable revocation
Scalability
resource-constrained IoT devices
resource constraints
related schemes
pubcrawl
portable devices
policy-based governance
mobile-based selective sharing
mobile computing
malicious users
IoT
Internet of Things device
authorisation
Cryptography
CP-ABE
constant size CP-ABE
constant number
constant ciphertext length CP-ABE scheme
constant ciphertext
constant cipher-text
collaboration
ciphertext-policy attribute encryption scheme
chosen ciphertext attack secure
CCA-secure
CCA secure proxy-based scalable revocation
C-PROSRCC scheme
1
2
next ›
last »