Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
sensor fusion
biblio
Trust-Based Distributed Kalman Filter Estimation Fusion under Malicious Cyber Attacks
Submitted by grigby1 on Fri, 06/19/2020 - 10:48am
sensor networks
pubcrawl
replay attacks
resilience
Resiliency
Scalability
security
security of data
sensor fusion
Policy-Governed Secure Collaboration
state estimation
trust-based distributed Kalman filter estimation fusion
trust-based distributed processing frame
Trusted Computing
trusted nodes
truth discovery
wireless sensor networks
information exchange
Cyber Attacks
distributed cooperative localization
Distributed databases
Distributed Kalman filter
distributed processing
Dynamic state estimation
False Data Injection
false trust
Covariance matrices
Kalman filters
malicious attacks
malicious cyber attacks
malicious network attack
measurement errors
neighbor nodes
policy-based governance
biblio
PRESERVING PARAMETER PRIVACY IN SENSOR NETWORKS
Submitted by aekwall on Mon, 04/20/2020 - 9:24am
Cramér-Rao lower bound
privacy models and measurement
utility loss
public parameter estimation
private parameter estimation
privacy gain functions
predefined privacy gain threshold
perturbation
parameter privacy preservation
parameter estimation
information privacy
inference allowance
decentralized sensors.
Cramér-Rao lower bounds
pubcrawl
linear model
Loss measurement
Perturbation methods
sensor networks
Silicon
data privacy
Noise measurement
sensor fusion
Indexes
Metrics
privacy
wireless sensor networks
biblio
PRESERVING PARAMETER PRIVACY IN SENSOR NETWORKS
Submitted by aekwall on Mon, 04/20/2020 - 9:24am
Cramér-Rao lower bound
privacy models and measurement
utility loss
public parameter estimation
private parameter estimation
privacy gain functions
predefined privacy gain threshold
perturbation
parameter privacy preservation
parameter estimation
information privacy
inference allowance
decentralized sensors.
Cramér-Rao lower bounds
pubcrawl
linear model
Loss measurement
Perturbation methods
sensor networks
Silicon
data privacy
Noise measurement
sensor fusion
Indexes
Metrics
privacy
wireless sensor networks
biblio
A Stochastic Method to Physical Layer Security of an Amplify-and-Forward Spectrum Sensing in Cognitive Radio Networks: Secondary User to Relay
Submitted by grigby1 on Fri, 04/10/2020 - 11:20am
fading channels
amplify-and-forward cooperative spectrum sensing
average secrecy rate
Cognitive Radio Network
cognitive radio networks
Communication system security
compressed sensing
correlated AP
CRN network
Amplify-and-Forward
fusion center
malicious eavesdropping secondary users
Relays
secondary user
sensing data
sensor fusion
stochastic geometry
stochastic method
resilience
sensors
Wireless communication
telecommunication security
secure transmission
pubcrawl
composability
Metrics
Resiliency
security
Interference
physical layer security
cognitive radio
cooperative communication
radio spectrum management
active SUs
AF-CSS-CRN
amplify and forward communication
biblio
Combining Tensor Decompositions and Graph Analytics to Provide Cyber Situational Awareness at HPC Scale
Submitted by grigby1 on Mon, 02/17/2020 - 4:16pm
resilience
metadata
Metrics
multidimensional anomaly detection fusing HPC Analytics and Tensors
network topology
parallel processing
parallelized graph analysis
pattern clustering
pubcrawl
MADHAT
Resiliency
security of data
sensor fusion
situational awareness
structured network sensor logs
Tensile stress
tensors
tools
groupware
Security Metrics
clustering methods
composability
data structures
Detectors
Electronic mail
graph analytics
graph theory
Computing Theory
high-performance packages
HPC architecture for cyber situational awareness
HPC resources
HPC scale
integrated workflow
IP networks
large-scale sparse tensor decompositions
biblio
Emergency Severity Assessment Method for Cluster Supply Chain Based on Cloud Fuzzy Clustering Algorithm
Submitted by grigby1 on Mon, 01/27/2020 - 11:34am
Scalability
Metrics
multidata fusion method
optimisation
pattern clustering
policy-based governance
pubcrawl
resilience
Resiliency
Risk Severity Assessment
Human Factors
sensor fusion
sliding window model
summary cloud model generation algorithm
Sun mary Cloud Model Generation Algorithm
supply chain risk assessment
synopsis data
time attenuation model
Voltage control
composite uncertainty characteristics
cloud fuzzy clustering algorithm
cloud model processing
cluster centers
cluster microcluster weights
Cluster Supply Chain
cluster supply chain emergency
collaboration
composability
Cloud Computing
data stream fuzzy clustering algorithm
emergency management
Emergency Risk
emergency severity assessment indexes
emergency severity assessment method
fuzzy set theory
high-dimensional data stream characteristics
Human behavior
biblio
Decentralized Multi-Sensor Scheduling for Multi-Target Tracking and Identity Management
Submitted by grigby1 on Tue, 01/21/2020 - 10:38am
pubcrawl
wireless sensor networks
telecommunication scheduling
target tracking
target information
state estimation
sensor fusion
sensor dynamic constraints
Scalability
resilience
closed-loop multitarget tracking algorithm
primary sensor
multiple secondary sensors
identity management method
identity management algorithm
Identity management
Human behavior
Decision Making
decentralized multisensor scheduling
biblio
A Reliable and Lightweight Trust Computing Mechanism for IoT Edge Devices Based on Multi-Source Feedback Information Fusion
Submitted by aekwall on Mon, 12/09/2019 - 11:22am
low-overhead trust computing algorithms
information entropy
IoT edge computing applications
IoT edge computing architecture
IoT edge devices
largescale IoT edge computing
lightweight trust computing mechanism
lightweight trust evaluating mechanism
lightweight trust mechanism
global trust calculation
multi-source feedback information fusion
multisource feedback information fusion
objective information entropy theory
outsourced computing services
reliable trust computing mechanism
trust calculation mechanism
trust computing mechanism
Computing Theory and Trust
Entropy
Cloud Computing
Internet of Things
security
Trusted Computing
pubcrawl
composability
Computational modeling
Reliability
security of data
sensor fusion
edge computing
Compositionality
outsourcing
Computational efficiency
feedback information fusion algorithm
feedback trust
biblio
Analogous Study of Security Threats in Cognitive Radio
Submitted by grigby1 on Thu, 12/05/2019 - 9:55am
pubcrawl
wireless sensor networks
wireless security threat issue
Wireless communication
white space
telecommunication security
SSDF
spectrum sensing data falsification
signal detection
sensors
sensor fusion
security
Resiliency
resilience
radio spectrum management
PUE
cognitive radio
Primary user Emulation
Jamming
Interference
Fusion Techniques
fusion technique
electromagnetic spectrum band
Electromagnetic spectrum
Data integration
CRWSN
Cooperative Spectrum Sensing and Spectrum Sensing Data Falsification (SSDF)
cooperative spectrum sensing
cooperative communication
cognitive radio wireless sensor networks
Cognitive Radio Security
Cognitive Radio (CR)
biblio
Watching and Safeguarding Your 3D Printer: Online Process Monitoring Against Cyber-Physical Attacks
Submitted by grigby1 on Wed, 11/27/2019 - 2:01pm
3D printing
composability
cyber-physical security
Metrics
Online Process Monitoring
physical layer security
pubcrawl
resilience
Resiliency
sensor fusion
« first
‹ previous
1
2
3
4
5
6
next ›
last »