Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
Secure ADS-B protection scheme supporting query
Submitted by aekwall on Fri, 05/06/2022 - 12:52pm
data privacy
encryption
pubcrawl
Resiliency
Technological innovation
Compositionality
Performance analysis
Planning
Predictive Metrics
smart cities
smart transportation
encryption audits
biblio
An Hybrid Approach to Insure Data Integrity on Outsourced Data using Symmetric Key Cryptography
Submitted by aekwall on Fri, 05/06/2022 - 12:52pm
AES
encryption audits
outsourcing
hybrid encryption
DES
auditing
RSA
data integrity
Cryptography
Predictive Metrics
Reliability
Compositionality
Technological innovation
Resiliency
pubcrawl
encryption
Protocols
data privacy
Cloud Computing
biblio
Towards Efficient Co-audit of Privacy-Preserving Data on Consortium Blockchain via Group Key Agreement
Submitted by aekwall on Fri, 05/06/2022 - 12:51pm
privacy
data privacy
distributed ledger
Public key
pubcrawl
Resiliency
Industries
Compositionality
Prototypes
Fabrics
Predictive Metrics
privacy preservation
co-audit
consortium Blockchain
Group key agreement
encryption audits
biblio
Anomaly Detection Based on Edge Computing Framework for AMI
Submitted by grigby1 on Thu, 05/05/2022 - 4:33pm
Metrics
KDDCUP99 datasets
edge computing framework
Deep Convolutional Neural Network (DCNN)
anomaly detetion method
Advanced Metering Infrastructure(AMI)
edge detection
data centers
Distributed databases
Image edge detection
security
composability
Computational modeling
data privacy
Data models
Scalability
Resiliency
resilience
pubcrawl
Intrusion Detection
biblio
Lightweight and Privacy-preserving Search over Encryption Blockchain
Submitted by grigby1 on Thu, 05/05/2022 - 3:13pm
data structures
efficient encryption
searchable symmetric encryption
blockchains
Costs
outsourcing
smart contract
cyber physical system security framework
cyber physical systems
encryption
composability
data privacy
Resiliency
resilience
pubcrawl
blockchain
Cloud Computing
biblio
A Homomorphic Cloud Framework for Big Data Analytics Based on Elliptic Curve Cryptography
Submitted by grigby1 on Thu, 05/05/2022 - 2:19pm
Homomorphic encryption
Technological innovation
Scalability
Resiliency
resilience
pubcrawl
privacy
Metrics
Informatics
Big Data
Elliptic curve cryptography
data privacy
Cryptography
composability
clustering
cloud-based framework
Cloud Computing
Big Data Analytic
biblio
A Frequency Estimation Algorithm under Local Differential Privacy
Submitted by grigby1 on Tue, 04/26/2022 - 11:37am
Complexity theory
composability
data privacy
differential privacy
frequency estimation
Human behavior
Interference
Internet of Things
local differential privacy
privacy
pubcrawl
resilience
Resiliency
Scalability
Servers
biblio
Vulnerability Characterization and Privacy Quantification for Cyber-Physical Systems
Submitted by grigby1 on Wed, 04/20/2022 - 10:47am
Computational modeling
CPS Privacy
cyber-physical systems
Cyber-Physical Systems (CPS)
data privacy
differential privacy
Differential Privacy (DP)
Human Factors
Personalized Differential Privacy
privacy
pubcrawl
Publishing
social computing
vulnerabilities
biblio
A Privacy-Preserving-Framework-Based Blockchain and Deep Learning for Protecting Smart Power Networks
Submitted by grigby1 on Wed, 04/20/2022 - 10:46am
Anomaly Detection
blockchain
CPS Privacy
cyber-physical system (CPS)
data privacy
deep learning
Human Factors
machine learning
power systems
privacy
privacy preservation
proof of work (PoW)
pubcrawl
biblio
Privacy-Preserving Schemes for Safeguarding Heterogeneous Data Sources in Cyber-Physical Systems
Submitted by grigby1 on Wed, 04/20/2022 - 10:46am
machine learning
sensors
security
SCADA systems
pubcrawl
privacy preservation
privacy
perturbation
Monitoring
authentication
Human Factors
data privacy
cyber-physical systems
cyberattack
Cryptography
CPS Privacy
blockchain
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
…
next ›
last »