Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Privacy Risk
biblio
Towards Explaining Epsilon: A Worst-Case Study of Differential Privacy Risks
Submitted by grigby1 on Tue, 04/26/2022 - 10:38am
Complexity theory
composability
differential privacy
Human behavior
privacy
Privacy Risk
pubcrawl
resilience
Resiliency
Scalability
ε
biblio
Security and Privacy Analysis of Wearable Health Device
Submitted by grigby1 on Mon, 12/28/2020 - 11:28am
security
mobile computing
mobile devices
mobile health
mobile wearable health devices
privacy
privacy breach
privacy features
Privacy Risk
pubcrawl
resilience
Resiliency
malicious attack
Security analysis
security risk
security vulnerability
sensitive data information
sensitive information
Servers
telecommunication security
user data security
user sleeping arrangements
Wearable devices
dieting formula
authorisation
Biomedical monitoring
Bluetooth
Bluetooth networking
Bluetooth pairing process
bluetooth security
composability
Computer crime
data privacy
Data Security
wearables security
eating constraint
fitbit
Google Glass
Hacker
health care
health monitor system
health tracker devices
Human behavior
human health parameter monitoring
Jawbone
biblio
A Game Theoretical Analysis of Risk Adaptive Access Control for Privacy Preserving
Submitted by aekwall on Mon, 09/21/2020 - 2:48pm
Resiliency
Human behavior
information theory
multistage two player game
privacy
privacy breaches
privacy preserving
Privacy Risk
privacy violation access requests
pubcrawl
Games
risk adaptive access control
risk analysis
Risk based access control
risk based access model
risk value
Scalability
Shannon information
sub-game perfect Nash equilibrium
cross-domain environment
Access Control
access control system
access request
Adaptation models
authorisation
Big Data
Cloud Computing
Control Theory and Privacy
Computing Theory and Privacy
cyber physical systems
cyber-physical systems
data privacy
estimation
game model
game theoretical analysis
game theoretical risk based access control
game theory
biblio
Privacy Risk Assessment for Data Subject-Aware Threat Modeling
Submitted by aekwall on Mon, 03/09/2020 - 10:16am
data subject-aware threat modeling
Privacy Risk
privacy by design
Monte Carlo methods
GDPR
Context modeling
data flow diagram system models
data protection by design
data subject-aware privacy risk assessment model
Human Factors
General Data Protection Regulation
Monte Carlo simulations
privacy risk assessment
privacy threat modeling activities
risk estimation approach
threat modeling tool prototype
Security Risk Estimation
Threat Modeling
risk analysis
data privacy
risk assessment
risk management
Analytical models
Data protection
data flow analysis
Metrics
privacy
pubcrawl
Resiliency
Data models
security
Scalability
security of data
biblio
Optimal Privacy-Enhancing And Cost-Efficient Energy Management Strategies For Smart Grid Consumers
Submitted by aekwall on Mon, 06/24/2019 - 2:05pm
pubcrawl
Metrics
optimal energy management strategies
optimal privacy-enhancement
optimal solution
policy-based governance
privacy
Privacy Risk
privacy-cost trade-off
privacy-enhancement
Markov processes
Resiliency
signal processing
Smart Grid Consumeer Privacy
smart grid consumer privacy
smart grid consumers
Smart metering system
smart power grids
standards
unauthorized testing
energy cost
Bellman dynamic programming
Conferences
consumer behavior
consumer privacy
cost-efficient energy management strategies
data privacy
decision theory
design problem
dynamic programming
belief state Markov decision process problem
energy management
energy management systems
Energy storage
Human behavior
kullback-leibler divergence
Kullback-Leibler divergence rate
Markov Decision Process
Markov decision process framework