Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Big Data
biblio
Research on Nonlinear Frequency Hopping Communication Under Big Data
Submitted by grigby1 on Fri, 12/11/2020 - 1:41pm
Non - Linearity
Time-frequency Analysis
Time Frequency Analysis
statistical analysis
spread spectrum communication
security of data
security
Scalability
safety assessment
Resiliency
resilience
radiofrequency interference
pubcrawl
nonlinear frequency hopping communication
Big Data
Metrics
Interference
Frequency synchronization
Frequency modulation
Frequency Hopping Communication
frequency hop communication
Frequency conversion
data information
communication safety evaluation framework
communication data informatization processing methods
big data security
big data safety evaluation framework
biblio
Partially Predictable Vehicular Ad-hoc Network: Trustworthiness and Security
Submitted by aekwall on Mon, 12/07/2020 - 11:31am
cloud
Trustworthiness Evaluation
secure trustworthiness evaluation based routing protocol
road traffic safety
road traffic efficiency
partially predictable vehicular ad-hoc network
Partially Predictable Network (PPN)
NS2 software
normalized routing overhead
Key-encrypted onion
intelligent communications
hybrid protocol
average end to end delay
road traffic
road safety
Relays
VANET
trustworthiness
packet delivery ratio
vehicular ad hoc networks
Routing
Routing protocols
composability
pubcrawl
Cryptographic Protocols
security
telecommunication security
Big Data
biblio
A Deep Learning Based Intrusion Detection System on GPUs
Submitted by grigby1 on Tue, 12/01/2020 - 12:47pm
information security market
security breaches
Resiliency
resilience
real-world operations
pubcrawl
password protections mechanisms
parallel computing
optimization functions
neural network approach
neural nets
modern learning mechanism
market computers
learning (artificial intelligence)
intrusion detection system
Intrusion Detection
Access controls
IDS system
IDS on GPU
IDS
graphics processing units
GPUs
firewalls
encryption mechanisms
dynamic intrusion detection mechanism
deep learning based intrusion detection system
deep learning algorithms
deep learning
cyber world
composability
Big Data
authorisation
biblio
High Performance Data Encryption with AES Implementation on FPGA
Submitted by grigby1 on Tue, 12/01/2020 - 12:46pm
FPGA
Resiliency
resilience
Random access memory
pubcrawl
Pipelines
low latency
intrusion detection system
IDS
high speed
high performance data encryption
AES
field programmable gate arrays
encryption speed
encryption
Data Security
Cryptography
composability
BIGDATA
Big Data
AES implementation
AES encryption algorithm
biblio
An Incentive Mechanism Using Shapley Value for Blockchain-Based Medical Data Sharing
Submitted by aekwall on Mon, 11/23/2020 - 10:28am
data miners
Compositionality
Incentive mechanism
Shapley value
diseases
Medical diagnostic imaging
blockchain-based medical data sharing
computational process
cooperation model
medical information systems
disease diagnosis
incentive schemes
medical data sharing
Shapley value revenue distribution
topological relationships
Intelligent Data Security
Intelligent Data and Security
Resiliency
Scalability
data owners
Big Data
data privacy
security
game theory
Data models
learning (artificial intelligence)
security of data
pubcrawl
blockchain
Business
machine learning techniques
cryptocurrencies
Distributed databases
Predictive models
biblio
Anomaly Detection Models for Smart Home Security
Submitted by aekwall on Mon, 11/23/2020 - 10:28am
HMM model
smart home environment
Compositionality
privacy violations
Hidden Markov models
hidden Markov model
anomalous activities
anomaly detection models
cyber threat surface
fire accidents
Smart Home
multiple sensors
network level sensor data
smart home security
smart homes devices
smart security cameras
smoke sensors
unauthorized movements
Intelligent Data Security
Intelligent Data and Security
Resiliency
Monitoring
Scalability
Big Data
data privacy
security
smart devices
DDoS Attacks
learning (artificial intelligence)
machine learning
computer network security
pubcrawl
Anomaly Detection
Energy Efficiency
Data collection
sensor fusion
Intelligent sensors
Smart homes
home automation
biblio
Big Data Security Frameworks Meet the Intelligent Transportation Systems Trust Challenges
Submitted by aekwall on Mon, 11/23/2020 - 10:27am
Traffic Management
Intelligent Data and Security
Intelligent Data Security
sustainable adoption
Security Classification
security approaches
multitier ITS security framework
ITS trust challenges
coherent reference architecture
business intelligence development
Big Data security frameworks
reference architecture
big data technologies
Intelligent Transportation Systems
Intelligent Transportation System
Scalability
Compositionality
Logic gates
Data processing
authentication
pubcrawl
Resiliency
machine learning
learning (artificial intelligence)
computer architecture
Trusted Computing
Internet of Things
Big Data
authorization
biblio
Privacy-Preserving Keyword Search Schemes over Encrypted Cloud Data: An Extensive Analysis
Submitted by aekwall on Mon, 11/23/2020 - 10:21am
Intelligent Data Security
verifiability
storage management
Servers
security
Scalability
Resiliency
remote servers
pubcrawl
privacy-preserving keyword search schemes
privacy issue
privacy
keyword search functions
Keyword search
Big Data
Intelligent Data and Security
Information Leakage
Indexes
encryption
encrypted cloud data
efficiency
data privacy
Cryptography
Compositionality
cloud storage services
cloud storage
Cloud Computing
biblio
Enabling Efficient and Interoperable Control of IoBT Devices in a Multi-Force Environment
Submitted by grigby1 on Tue, 11/17/2020 - 1:58pm
middleware
tactical networks
sensors
Scalability
Resiliency
resilience
pubcrawl
process control
open systems
Object recognition
network management
multiforce environment
multiforce cooperation
multi-robot systems
military systems
battlefield scenarios
machine learning
IoT
iobt
interoperable control
interoperability
Internet of Things
Internet of battlefield things
innovative solutions
innovative paradigm
Human Factors
heterogeneous IoBT devices
Bridges
Big Data
biblio
Implementing Cyber Resilient Designs through Graph Analytics Assisted Model Based Systems Engineering
Submitted by aekwall on Mon, 11/16/2020 - 1:51pm
cyber resilient designs
Resilient Security Architectures
Resiliency
structured system engineering methodology
resilience requirements
Model-based Systems Engineering
mitigate cyber risk
MBSE tools
MBSE
inter-element relationships
graph analytics
graph analytic methods
graph analytic assisted model
engineering cyber resilient systems
design lifecycle
decision analysis methods
security of data
complex models
centralized MBSE database
cyber resilience
resilience
systems engineering
Risk
computer security
risk management
Analytical models
Cybersecurity
tools
graph theory
pubcrawl
Big Data
« first
‹ previous
…
18
19
20
21
22
23
24
25
26
…
next ›
last »