Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
privacy leakage
biblio
C2P2: Content-Centric Privacy Platform for Privacy-Preserving Monitoring Services
Submitted by grigby1 on Tue, 01/21/2020 - 10:28am
Monitoring service
Wth-privacy-preserving monitoring service
ubiquitous surveillance cameras
town and country planning
surveillance
Smart City
smart cities
security
Scalability
Resiliency
resilience
pubcrawl
privacy-preserving monitoring services
privacy preservation
privacy leakage
privacy
C2P2
information-centric networking
Information Centric Networks
Information Centric Networking (ICN)
Information Centric Network
image recognition
image classification model
image classification
encryption
data privacy
data aggregation
content-centric privacy platform
cloud-based services
Cloud Computing
Cameras
biblio
PMDA: Privacy-Preserving Multi-Functional Data Aggregation Without TTP in Smart Grid
Submitted by grigby1 on Thu, 03/28/2019 - 2:16pm
privacy leakage
TTP
trusted third party
smart power grids
smart meters
Smart Grids
Smart Grid Privacy
Smart Grid
Security analysis
security
pubcrawl
privacy-preserving multifunctional data aggregation
privacy-preserving aggregation
privacy protection
privacy preserving
composability
privacy flaws
privacy
power engineering computing
PMDA
multifunctional aggregation
Multi-functional computation
Metrics
Meters
Human behavior
energy management
electricity readings
data privacy
data aggregation
Cryptography
biblio
Feature Selection for Machine Learning-Based Early Detection of Distributed Cyber Attacks
Submitted by aekwall on Wed, 02/13/2019 - 11:02am
learning (artificial intelligence)
Support vector machines
support vector machine
Servers
security of data
Scalability
Resiliency
Random Forest
pubcrawl
privacy leakage
principal component analysis
machine learning-based detection methods
machine learning algorithms
machine learning
Attack vectors
Human behavior
Feature Selection
feature extraction
Electronic mail
early detection
distributed cyber attacks
denial of services
DDoS Attacks
data privacy
cyberattack
cyber security community
Command & Control communication
C&C communication
biblio
Friend or Foe?: Your Wearable Devices Reveal Your Personal PIN
Submitted by grigby1 on Tue, 09/05/2017 - 12:58pm
hand movement trajectory recovery
Human behavior
leakage of pin
pin sequence inference
privacy
privacy leakage
pubcrawl
Resiliency
Scalability
Wearable devices
wearables security
biblio
"Discovery of De-identification Policies Considering Re-identification Risks and Information Loss"
Submitted by grigby1 on Thu, 02/23/2017 - 11:14am
Lattices
Upper bound
UCI machine learning repository
Synthetic aperture sonar
Safe Harbor
risk analysis
reidentification risks
pubcrawl170105
privacy leakage
privacy
learning (artificial intelligence)
Computational modeling
information loss
information entropy
HIPPA
Entropy
deidentified data
deidentification policies
de-identification
data privacy
data analysis
« first
‹ previous
1
2