Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
sensors
biblio
In Sensors We Trust – A Realistic Possibility?
Submitted by BrandonB on Tue, 05/05/2015 - 11:43am
Data mining
computer architecture
Buildings
architecture
information dissemination
information management
information sharing
processing architecture
secure systems
security
sensing infrastructure
sensor information flow
sensors
biblio
Vessel track correlation and association using fuzzy logic and Echo State Networks
Submitted by BrandonB on Tue, 05/05/2015 - 11:22am
Recurrent neural networks
moving object tracking
naval engineering computing
Neural networks
object tracking
pattern clustering
Radar tracking
recurrent neural nets
recurrent neural network
Mathematical model
sensing modality
sensors
target tracking
Track Association
Track Correlation
Vectors
vessel track association
vessel track correlation
fuzzy k-nearest neighbours
computational-intelligence-based methods
Correlation
correlation methods
data fusion
Defence and Security
defense community
echo state networks
fuzzy c-means clustering
computational intelligence
Fuzzy logic
fuzzy set theory
Kalman filter
Kalman filters
Marine vehicles
Maritime Domain Awareness
maritime vessels
biblio
Right to silence: Establishing map-based Silent Zones for participatory sensing
Submitted by BrandonB on Mon, 05/04/2015 - 2:16pm
Mobile communication
wireless sensor networks
user privacy protection
sensors
security of data
privacy level
privacy
performance evaluation
participatory sensing
mobile phones
Mobile handsets
mobile devices
mobile computing
ban zones
map-based silent zones
location data
large-scale sensing systems
k-anonymity
habitat density
embedded sensors
dynamic map-based blinding out
data privacy
Cities and towns
cartography
Buildings
biblio
Examining the Effect of Wireless Sensor Network Synchronization on Base Station Anonymity
Submitted by BrandonB on Mon, 05/04/2015 - 2:11pm
synchronisation
WSN topology
wireless sensor networks
wireless sensor network synchronization
Wireless Sensor Network
Wireless communication
traffic analysis techniques
TPSN
timing-synch protocol for sensor networks
telecommunication traffic
telecommunication security
telecommunication network topology
Synchronization
anonymity
sensors
security mechanisms
reference broadcast synchronization
Receivers
RBS
Protocols
network traffic flow
location privacy
evidence theory analysis
data sources
BS anonymity improvement
base station anonymity
biblio
PADAVAN: Privacy-Aware Data Accumulation for Vehicular Ad-hoc Networks
Submitted by BrandonB on Mon, 05/04/2015 - 1:58pm
privacy-aware data accumulation
Vehicular Communication
vehicular ad-hoc networks
vehicular ad hoc networks
vehicles
VANET
telecommunication security
submitted data privacy protection
sensors
security
anonymity
privacy
PADAVAN
Junctions
data privacy
data consumer
Data collection
authentication
anonymous data collection scheme
anonymous authentication scheme
biblio
A Metric for Evaluating Base Station Anonymity in Acknowledgement-Based Wireless Sensor Networks
Submitted by BrandonB on Mon, 05/04/2015 - 1:57pm
Media Access Protocol
WSN topology
wireless sensor networks
Wireless Sensor Network
traffic analysis technique
telecommunication traffic
telecommunication security
standards
sensors
network traffic flow
acknowledged communication
Measurement
location privacy
enhanced evidence theory metric
Correlation
base station anonymity
anonymity
acknowledgement based wireless sensor networks
acknowledgement aware evidence theory
biblio
Cryptographic key generator candidates based on smartphone built-in sensors
Submitted by BrandonB on Mon, 05/04/2015 - 1:35pm
Android (operating system)
Android-based smartphones
Ciphers
cryptographic key generator candidates
cryptographic system
Cryptography
encryption
Generators
random number generation
random number generators
Random sequences
RNG
sensors
smart phones
smartphone
smartphone built-in sensors
biblio
Joint localization and fingerprinting of sound sources for auditory scene analysis
Submitted by BrandonB on Mon, 05/04/2015 - 12:01pm
sensor fusion
vehicular-traffic case study
vehicles
traffic engineering computing
testing
support-vector machine classification
Support vector machines
sound-based techniques
sound source localization
sound source fingerprinting
sensors
Accuracy
scene element classification
phase-based sound localization
pattern classification
Image analysis
feature extraction
embedded nodes
data fusion
auditory scene analysis
Acoustic signal processing
biblio
Fault-tolerant control of a wireless HVAC control system
Submitted by BrandonB on Thu, 04/30/2015 - 3:07pm
fault tolerant control scheme
wireless sensors
wireless sensor networks
wireless HVAC control system
Wireless communication
sensors
sensing and actuation data
permanent failures
malicious intrusions
HVAC
fault-tolerant control
Fault tolerant systems
actuators
fault tolerant control
fault tolerance
fault detection
failure analysis
control systems
communication nodes
centralized controller
building management systems
Building automation
Atmospheric modeling
actuators network
biblio
A Finite State Hidden Markov Model for Predicting Multistage Attacks in Cloud Systems
Submitted by BrandonB on Thu, 04/30/2015 - 2:16pm
risk model
multistaged cloud attack
occurrence probability
Prediction algorithms
prediction of multi-staged attacks
Predictive models
probability
risk analysis
risk assessment
multistage attacks
security
security of data
security risk
security technology
security threat
sensors
Vectors
early warning alerts
adaptive risk approach
auto response controller
autonomous cloud intrusion detection framework
Cloud Computing
cloud resources
cloud systems
Correlation
DARPA 2000 dataset
ACIDF
early warnings
finite state hidden Markov model
finite state hidden Markov prediction model
Hidden Markov models
HMM
intrusion prevention
LLDDoS1.0 attack
« first
‹ previous
…
36
37
38
39
40
41
42
43
44
next ›
last »