Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
edge computing
biblio
Identity of Things (IDoT): A Preliminary Report on Identity Management Solutions for IoT Devices
Submitted by grigby1 on Thu, 08/17/2023 - 4:40pm
resource management
Identity of Things (IDoT)
Identity Management (IdM)
IAM
digital certificates
device identity
Device Certificates
Block Chain
Fog computing
Internet of Things (IoT)
IoT security
Public key
Internet of Things
edge computing
Companies
Computer crime
PKI
Identity management
Scalability
Resiliency
resilience
Human behavior
pubcrawl
security
biblio
A Deep Learning-Based Fog Computing and cloud computing for Orchestration
Submitted by grigby1 on Fri, 07/21/2023 - 1:48pm
deep learning
Cloud Computing
machine learning algorithms
security
pubcrawl
resilience
Software
Scalability
edge computing
Fog computing
Intelligent sensors
Resiliency
Cloud System
Fog Service Management
Fog system security
biblio
Research on Edge Network Security Technology Based on DHR
Submitted by grigby1 on Wed, 07/12/2023 - 12:48pm
edge computing
DHR
Active Defense
Multi-access Edge Computing
dynamic networks
Electrical Engineering
Redundancy
maintenance engineering
network security
security
composability
Computational modeling
Heuristic algorithms
Resiliency
resilience
Metrics
pubcrawl
biblio
AEaaS: Artificial Intelligence Edge-of-Things as a Service for Intelligent Remote Farm Security and Intrusion Detection Pre-alarm System
Submitted by grigby1 on Mon, 07/10/2023 - 3:36pm
composability
farm security system
smart agriculture
Resiliency
fog
edge detection
edge computing
Systematics
Image edge detection
real-time systems
computer architecture
Scalability
resilience
Metrics
pubcrawl
Intrusion Detection
IoT
security
Cloud Computing
biblio
Neural Network-Based DDoS Detection on Edge Computing Architecture
Submitted by grigby1 on Mon, 07/10/2023 - 3:35pm
real-time systems
Resiliency
edge detection
Vocabulary
Image edge detection
neural network
edge computing
DDoS
network security
Cloud Computing
composability
Computational modeling
Scalability
resilience
Metrics
pubcrawl
Neural networks
security
biblio
A Review Paper on IDS in Edge Computing or EoT
Submitted by grigby1 on Mon, 07/10/2023 - 3:35pm
machine learning
Task Analysis
security
Scalability
Resiliency
resilience
Reliability engineering
pubcrawl
privacy
Metrics
IDS
Intrusion Detection System (IDS)
Intrusion Detection
Image edge detection
fourth industrial revolution
Edge of Things (EoT)
edge detection
edge computing
composability
biblio
A Cross-Domain Data Security Sharing Approach for Edge Computing based on CP-ABE
Submitted by grigby1 on Fri, 05/19/2023 - 2:05pm
Peer-to-peer computing
pubcrawl
policy-based governance
collaboration
Scalability
Data models
Access Control
Computational modeling
Data Security
edge computing
Time-frequency Analysis
Processor scheduling
CP-ABE
Ciphertext policy attribute-based encryption
cross-domain
data security sharing
biblio
Cryptographic Data Security for IoT Healthcare in 5G and Beyond Networks
Submitted by grigby1 on Tue, 02/28/2023 - 5:50pm
IoT security
end-to-end
Costs
networks
Healthcare
5G
encryption
edge computing
decryption
composability
Prototypes
Cybersecurity
Internet of Things
Medical services
5G mobile communication
Cryptography
Resiliency
resilience
Metrics
Human behavior
pubcrawl
IoT
security
privacy
biblio
SCLERA: A Framework for Privacy-Preserving MLaaS at the Pervasive Edge
Submitted by grigby1 on Fri, 02/03/2023 - 5:19pm
Data models
trust computing
Pervasive Computing Security
Human Factors
Pipelines
distributed learning
edge computing
Computational modeling
data privacy
privacy
Scalability
Conferences
Resiliency
resilience
Metrics
pubcrawl
deep learning
biblio
When Deep Learning Meets Steganography: Protecting Inference Privacy in the Dark
Submitted by grigby1 on Fri, 02/03/2023 - 4:58pm
deep learning
pubcrawl
Metrics
privacy
data privacy
Cloud Computing
composability
Perturbation methods
edge computing
Image edge detection
Weapons
adversarial attacks
Steganography
steganography detection
inference privacy
1
2
3
4
5
6
7
8
9
…
next ›
last »