Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
edge computing
biblio
Context-Aware Enforcement of Privacy Policies in Edge Computing
Submitted by grigby1 on Fri, 04/03/2020 - 12:33pm
Human behavior
sensitive data
Scalability
pubcrawl
Privacy Policies
privacy model
privacy measures
privacy enhanced applications
privacy
mobile electronic health record
mobile computing
Cloud Computing
electronic health records
ehealth domain
edge computing
e-health
data privacy
context-aware enforcement
context-aware edge computing
context awareness
complex domain-specific privacy policies
biblio
Process Provenance-based Trust Management in Collaborative Fog Environment
Submitted by aekwall on Mon, 03/30/2020 - 11:33am
Cloud Computing
Servers
History
Resiliency
Human behavior
pubcrawl
composability
Metrics
Reliability
trust
collaboration
edge computing
Fog computing
Provenance
collaborative
process provenance
biblio
Towards Achieving a Secure Authentication Mechanism for IoT Devices in 5G Networks
Submitted by aekwall on Mon, 03/16/2020 - 10:34am
Internet of Things
telecommunication security
security mechanisms
secure authentication mechanism
Scalable Security
Scalability
pubcrawl
NB-IOT
Narrowband IoT
mobile network infrastructure
Mobile Identity Management
message authentication
IoT security
IoT platform
IoT device
composability
Identity provider
Identity management
edge computing
Cross-Layer Security
Conferences
Computer crime
Cloud Computing
cellular radio
cellular network architecture
cellular IoT
5G networks
5G mobile communication
Cross Layer Security
Resiliency
biblio
Approaches for Collaborative Security Defences in Multi Network Environments
Submitted by aekwall on Mon, 03/16/2020 - 10:34am
counteract everywhere approach
Scalable Security
timing influence defense efficiency
task execution order
multinetwork environments
multidomain defensive action
Multi-Domain Defense
minimize propagation approach
minimize countermeasure approach
distributed attacks
defense approaches
Defense Algorithms
Computer crime
computer networks
collaborative security defence approach
Collaborative Defense
edge computing
pubcrawl
security
Conferences
Scalability
Cloud Computing
computer network security
biblio
On Pending Interest Table in Named Data Networking based Edge Computing: The Case of Mobile Augmented Reality
Submitted by aekwall on Mon, 03/02/2020 - 12:29pm
Human Factors
Ubiquitous Computing Security
remote computation
PIT expiry time
pending interest table
NDN based EC
Mobility
mobile augmented reality
latency
interest satisfaction rate
host centric IP architecture
distributed computation
storage resources
augmented reality
named data networking
security
edge computing
internet
Metrics
pubcrawl
Resiliency
computer architecture
mobile computing
Task Analysis
Internet of Things
Scalability
IP networks
Cloud Computing
security of data
biblio
Authentication Algorithm and Techniques Under Edge Computing in Smart Grids
Submitted by aekwall on Mon, 03/02/2020 - 12:26pm
edge computing
traditional password-based authentication
smart grid architecture
OTP algorithms
one-time password
one time password
two factor authentication
two-factor authentication
Two dimensional displays
Human Factors
authorisation
authentication protocol
security problems
Smart Grid
message authentication
smart power grids
authentication
pubcrawl
Cryptographic Protocols
Conferences
biblio
Data Caching Optimization in the Edge Computing Environment
Submitted by grigby1 on Tue, 02/18/2020 - 11:55am
mobile users
information retrieval
Integer Problem (IP)
integer programming
integer programming problem
Metrics
mobile computing
mobile data traffic
mobile devices
Energy Efficiency
network delay reduction
Page-Hinckley-Test (PHT)
resilience
Resiliency
Scalability
service provider
Web Caching
pubcrawl
edge servers
edge computing environment
edge computing
delays
data popularity
data optimization
data handling
data caching problem
data caching optimization
data cache problem
data access latency
data access
Cloud Computing
centralized cloud
cache storage
biblio
An Attack Vector Evaluation Method for Smart City Security Protection
Submitted by grigby1 on Mon, 02/17/2020 - 5:08pm
pubcrawl
weakness
vulnerability assessment
Vulnerability
Software
smart city security protection
smart cities
simulation
security weaknesses
security of data
security
risk management
Resiliency
resilience
quantitative evaluation method
Analytical models
policy-based governance
network security risk assessment
Metrics
Human behavior
formal representation
edge computing
depend conditions
defense factors
critical information infrastructure
Conferences
Big Data
Attack vectors
attack vector evaluation method
attack vector
biblio
Use of Machine Learning in Detecting Network Security of Edge Computing System
Submitted by grigby1 on Tue, 01/28/2020 - 2:38pm
machine learning
Training
Support vector machines
support vector machine
Smart homes
smart home system
Resiliency
resilience
RBF-function SVM method
radial basis function networks
pubcrawl
privacy
network security detection
mutation code detection
Alibaba ECS
learning (artificial intelligence)
IoT systems
Internet of Things
home automation
Hardware
feature extraction
edge computing system
edge computing
computer network security
composability
code mutation
Cloud Computing
biblio
Research on Security Protection Technology System of Power Internet of Things
Submitted by grigby1 on Tue, 01/21/2020 - 11:39am
real-time security monitoring
power grid transmission
power grids
power Internet of Things
Power system protection
power system security
privacy protection
production links
Protocols
pubcrawl
power engineering computing
resilience
Resiliency
Scalability
security
security monitoring
security protection technology system
sensor security
sensors
terminal identity authentication
edge area autonomy
application security risks
authentication
authority control
Cloud Computing
computer architecture
computer network management
computer network security
data communication
data transmission protection
application layer cloud fog security management
edge computing
fog calculation
Fog computing
Human behavior
internet
Internet of Things
Metrics
network security
Network Security Architecture
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »