Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Loss measurement
biblio
Temporally Discounted Differential Privacy for Evolving Datasets on an Infinite Horizon
Submitted by aekwall on Mon, 01/11/2021 - 1:41pm
time series
utility theory
temporally discounted differential privacy
temporal discounting.
smart-meter measurement time-series
privacy-preserving additive noise
evolving datasets
Australian electricity distribution company
Ausgrid
additive noise
privacy loss
Loss measurement
Scalability
differential privacy
smart power grids
privacy
composability
pubcrawl
Human behavior
Resiliency
Time measurement
real-time systems
data privacy
biblio
Measuring Gains and Losses in Human-Robot Trust: Evidence for Differentiable Components of Trust
Submitted by grigby1 on Tue, 12/01/2020 - 1:22pm
Particle measurements
trust dimension
trust
social robotics
robust trust
robots
Robot Trust
Resiliency
resilience
Reliability
pubcrawl
Airports
multi-dimensional-measure of trust
MDMT
Loss measurement
human-robot trust
human-robot interaction
Human Factors
Human behavior
Gain measurement
change direction
Atmospheric measurements
biblio
Algorithm for k-anonymity based on ball-tree and projection area density partition
Submitted by grigby1 on Thu, 08/13/2020 - 5:34pm
Loss measurement
usability
UCI
trees (mathematics)
tree data structures
Resiliency
resilience
pubcrawl
projection area density partition
privacy
Partitioning algorithms
microdata publishing
Metrics
Adult dataset
kd-tree
k-anonymity algorithm
k-anonymity
information science
individual privacy protection
Human behavior
Gotrack dataset
data privacy
composability
Classification algorithms
ball-tree
anonymity
biblio
A Study and Enhancement to the Security of MANET AODV Protocol Against Black Hole Attacks
Submitted by aekwall on Tue, 05/26/2020 - 11:03am
Metrics
unmanned aerial unit
uav
telecommunication security
security vulnerabilities
security
Routing protocols
Routing Protocol
Routing
Resiliency
pubcrawl
NS3 simulator
network security
mobile adhoc networks
mobile ad hoc networks
ad hoc on-demand distance vector routing
MANET security
MANET routing protocol
MANET AODV protocol
MANET
Loss measurement
IoT
Internet of Things
disaster recovery
delays
Compositionality
automata
AODV protocol
AODV based adhoc networks
biblio
A Study and Simulation Research of Blackhole Attack on Mobile AdHoc Network
Submitted by aekwall on Tue, 05/26/2020 - 10:57am
Loss measurement
Packet loss rate
ns-3 network simulator
network performance parameters
mobile nodes
mobile multihop network
MANET security measurement
internal attacks
intermediate nodes
end-to-end delay
blackhole nodes
blackhole attack feature extraction
Blackhole attack
AODV
AODV protocol
external attacks
IoT
mobile ad hoc network
Throughput
mobile ad hoc networks
MANET
network security
ns-3
Routing
Routing protocols
pubcrawl
Resiliency
feature extraction
security
telecommunication security
Internet-of-Things
Scalability
biblio
PriDe: A Quantitative Measure of Privacy-Loss in Interactive Querying Settings
Submitted by aekwall on Mon, 04/20/2020 - 10:31am
Loss measurement
privacy models and measurement
relational database management systems
querying behaviour
quantitative measure
privacy-loss score
PriDe measure
N-gram model
interactive querying settings
Electronic Privacy
behavioural profiles
data privacy
Urban areas
Analytical models
SQL query
SQL
Databases
query processing
Metrics
privacy
pubcrawl
Data models
biblio
An Improved Privacy Protection Method Based on k-degree Anonymity in Social Network
Submitted by aekwall on Mon, 04/20/2020 - 10:31am
Metrics
structural modifications
social networking (online)
social network
Publishing
pubcrawl
privacy protection
privacy models and measurement
privacy
pattern clustering
original social network
node degrees
network theory (graphs)
network structure stable
network nodes
anonymity
Mathematical model
Loss measurement
k-subgraph method
k-degree anonymous graph
k-degree anonymity
k-anonymity
information losses
information loss
improved privacy protection method
graph theory
data privacy
computer security
Clustering algorithms
anonymity models
biblio
PRESERVING PARAMETER PRIVACY IN SENSOR NETWORKS
Submitted by aekwall on Mon, 04/20/2020 - 10:24am
Cramér-Rao lower bound
privacy models and measurement
utility loss
public parameter estimation
private parameter estimation
privacy gain functions
predefined privacy gain threshold
perturbation
parameter privacy preservation
parameter estimation
information privacy
inference allowance
decentralized sensors.
Cramér-Rao lower bounds
pubcrawl
linear model
Loss measurement
Perturbation methods
sensor networks
Silicon
data privacy
Noise measurement
sensor fusion
Indexes
Metrics
privacy
wireless sensor networks
biblio
PRESERVING PARAMETER PRIVACY IN SENSOR NETWORKS
Submitted by aekwall on Mon, 04/20/2020 - 10:24am
Cramér-Rao lower bound
privacy models and measurement
utility loss
public parameter estimation
private parameter estimation
privacy gain functions
predefined privacy gain threshold
perturbation
parameter privacy preservation
parameter estimation
information privacy
inference allowance
decentralized sensors.
Cramér-Rao lower bounds
pubcrawl
linear model
Loss measurement
Perturbation methods
sensor networks
Silicon
data privacy
Noise measurement
sensor fusion
Indexes
Metrics
privacy
wireless sensor networks
biblio
A Unified Measurable Software Trustworthy Model Based on Vulnerability Loss Speed Index
Submitted by grigby1 on Fri, 04/03/2020 - 12:19pm
Trusted Computing
software metrics
software reliability
software security
software trust measurement
software trustworthiness
software trustworthy security growth model
software vulnerability datasets
trust measurement
Software measurement
unified measurable software trustworthy model
vulnerability loss speed index
vulnerability occurrence time
vulnerability severity prediction model
Vulnerability severity/type
Vulnerability time
vulnerability time occurrence
complex composite concept
software domain
Software
security
risk analysis
pubcrawl
probability
privacy models and measurement
predictive security metrics
Predictive models
Metrics
loss metric value
Loss measurement
internet technology
Indexes
future loss speed index
« first
‹ previous
1
2
3
next ›
last »