Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
edge computing
biblio
Securing Named Data Networks: Challenges and the Way Forward
Submitted by grigby1 on Thu, 12/05/2019 - 10:53am
named data networks
security
Resiliency
resilience
pubcrawl
privacy
policy governance
Policy Based Governance
Policy
Access Control
Metrics
integrity
Human Factors
Human behavior
edge computing
confidentiality
collaboration
clean slate
biblio
Performance Evaluation of the Policy Enforcement Fog Module for Protecting Privacy of IoT Data
Submitted by aekwall on Mon, 11/11/2019 - 11:47am
policy enforcement
active data bundles
cloud
data privacy-penalties
data sources
fog
fog computing infrastructure
local IoT applications
PEFM
active bundles
policy enforcement fog module
privacy controls
Privacy Threats
privacy violations
real-time IoT applications
self-protecting mechanism
sensitive IoT data protection
smart home proof-of-concept scenario
Human behavior
security of data
Cloud Computing
Scalability
data owners
data privacy
Internet of Things
performance evaluation
real-time systems
IoT
pubcrawl
privacy
edge computing
Smart Home
Privacy Policies
Privacy Policy
privacy protection
biblio
Zero-Trust Hierarchical Management in IoT
Submitted by grigby1 on Mon, 08/05/2019 - 11:39am
IoT networks
Zero-Trust Management
zero-trust hierarchical mining process
zero-trust hierarchical management
zero trust
Scalability
Resiliency
resilience
Reliability
pubcrawl
policy-based governance
middleware
blockchain
Internet of Things
Human Factors
Human behavior
Hierarchical Mining
exponential scalability
edge computing
Data mining
contracts
constrained infrastructure
computer network management
blockchain-based middleware
biblio
Multiple Attributes Based Spoofing Detection Using an Improved Clustering Algorithm in Mobile Edge Network
Submitted by aekwall on Mon, 08/05/2019 - 10:44am
MEC network
spoofing detection method
spoofing detection
security problems
security of data
Scalability
Resiliency
pubcrawl
pattern clustering
multiple channel attributes
multiple attributes
mobile edge computing network
Mobile Edge Computing
mobile computing
Cloud Computing
Intrusion Detection
internet
Information Centric Networks
Information Centric Network
Image edge detection
ICN
Heuristic algorithms
edge computing
distributed network architecture
Clustering algorithms
clustering algorithm
cluster algorithm
cloud platform
biblio
A secure data aggregation protocol for fog computing based smart grids
Submitted by aekwall on Mon, 06/24/2019 - 3:00pm
Smart Grid
policy-based governance
privacy
Protocols
pubcrawl
Resiliency
secure data aggregation
Secure Data Aggregation scheme
Security analysis
Servers
performance evaluation results
Smart Grid Consumeer Privacy
smart grid consumer privacy
Smart Grids
smart power grids
storage efficiency
storage overhead
telecommunication security
transmission overhead
edge computing
Cloud Computing
cloud server
computational overhead
Cryptography
data aggregation
data aggregation process
data privacy
Data Transmission
additive homomorphic encryption consumer privacy
end-to-end confidentiality
FCSG
Fog computing
fog layer
Human behavior
Internet of Things
Metrics
novel Domingo-Ferrer additive privacy
biblio
A Security Policy Enforcement Framework for Controlling IoT Tenant Applications in the Edge
Submitted by aekwall on Mon, 06/17/2019 - 10:21am
Policy Based Governance
Access Control
edge computing
IoT
model-driven security
policy-based governance
pubcrawl
security policies
services computing
ThingML
biblio
Learning-Based Rogue Edge Detection in VANETs with Ambient Radio Signals
Submitted by grigby1 on Wed, 05/01/2019 - 11:33am
security
Q-learning based detection scheme
received ambient signal properties
Received signal strength indicator
reinforcement learning technique
resilience
Resiliency
roadside units
rogue edge attacks
rogue edge node
RSSI
RSUs
Scalability
pubcrawl
serving edge
shared ambient radio
signal detection
source media access control address
spoofing detection
telecommunication computing
telecommunication security
test threshold
VANET model
vehicular ad hoc networks
wireless networks
learning (artificial intelligence)
ambient radio signals
authentication
composability
detection error rate reduction
detection scheme
dynamic VANET
edge computing
edge detection
Image edge detection
indoor radio
indoor wireless networks
large-scale network infrastructure
access protocols
learning-based rogue edge detection
MAC address
man-in-the-middle attacks
Metrics
mobile device
Mobile handsets
OBUs
onboard units
optimal detection policy
PHY-layer rogue edge detection scheme
physical-layer rogue edge detection
biblio
A security architecture of VANET based on blockchain and mobile edge computing
Submitted by aekwall on Mon, 04/01/2019 - 10:04am
Network Security Architecture
Vehicular Ad-hoc Network
vehicular ad hoc networks
VANET data
VANET
trusted central entity
service layer
security of data
security architecture
security
Resiliency
pubcrawl
perception layer
blockchain
Mobile Edge Computing
mobile computing
edge computing layer
edge computing
edge cloud services
Distributed databases
Data Security
computer architecture
Cloud Computing
blockchain technology
blockchain security
biblio
CloudWoT - A Reference Model for Knowledge-Based IoT Solutions
Submitted by grigby1 on Fri, 03/22/2019 - 12:40pm
big data security
cloud
Cloud Computing
CloudWoT
CPPS
edge computing
IACS
IoT
Metrics
pubcrawl
resilience
Resiliency
Scalability
Semantic Web
biblio
Trustworthy Orchestration of Container Based Edge Computing Using Permissioned Blockchain
Submitted by grigby1 on Fri, 02/08/2019 - 4:35pm
smart contracts
Metrics
network accountability
open systems
Peer-to-peer computing
permissioned blockchain
Provenance
pubcrawl
resilience
Resiliency
IoT devices
Stakeholders
Trusted Computing
trustworthy orchestration
Trustworthy Systems
trustworthy transactions
velocity
verity
volume
W3C-PROV data model
context dependent data analysis
blockchain
blockchain container based architecture
business network
Cloud Computing
cloud resources
composability
computer architecture
container based edge computing
Containers
accountability
cyber physical systems
data analysis
decentralized interaction model
EC infrastructures
edge computing
Internet of Things
Internet of Things devices
IoT based applications
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
next ›
last »