Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
The privacy paradigm : An overview of privacy in Business Analytics and Big Data
Submitted by grigby1 on Mon, 12/28/2020 - 12:37pm
Big Data
Technology management
privacy paradigm
GPDR
data mining technologies
dados
business analytics
analytics
big data privacy
Google
Data protection
Companies
privacy
information technology
data privacy
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
business data processing
Data mining
data analysis
biblio
Even Black Cats Cannot Stay Hidden in the Dark: Full-band De-anonymization of Bluetooth Classic Devices
Submitted by grigby1 on Mon, 12/28/2020 - 12:28pm
resilience
Human behavior
identified privacy attack
laptops
Lower Address Part
master device
personal area networks
piconet master
privacy
privacy attacks
privacy guarantees
pubcrawl
high data rates
Resiliency
software radio
Software-defined Radio based sniffer
Synchronization
telecommunication traffic
tethering
tracking attacks
Upper Address Part
Wireless communication
wireless headsets
wireless sensor networks
BT spectrum analysis
apparently benign information
audio streaming
audio streaming voice calling
automobiles
black cats
BLE
Bluetooth
Bluetooth Classic devices
bluetooth low energy
bluetooth security
BT addresses
address randomization
car stereo systems
Clocks
composability
computer network security
data privacy
de-anonymization technique
facto connectivity technology
frame encoding
frequency 79.0 MHz
Full-band De-anonymization
biblio
Security and Privacy Analysis of Wearable Health Device
Submitted by grigby1 on Mon, 12/28/2020 - 12:28pm
security
mobile computing
mobile devices
mobile health
mobile wearable health devices
privacy
privacy breach
privacy features
Privacy Risk
pubcrawl
resilience
Resiliency
malicious attack
Security analysis
security risk
security vulnerability
sensitive data information
sensitive information
Servers
telecommunication security
user data security
user sleeping arrangements
Wearable devices
dieting formula
authorisation
Biomedical monitoring
Bluetooth
Bluetooth networking
Bluetooth pairing process
bluetooth security
composability
Computer crime
data privacy
Data Security
wearables security
eating constraint
fitbit
Google Glass
Hacker
health care
health monitor system
health tracker devices
Human behavior
human health parameter monitoring
Jawbone
biblio
T2DNS: A Third-Party DNS Service with Privacy Preservation and Trustworthiness
Submitted by aekwall on Mon, 12/21/2020 - 1:35pm
IP networks
trustworthiness
Trusted Computing
third-party DNS service
Third-Party DNS
T2DNS
service proxy
Servers
server attackers
pubcrawl
Protocols
privacy preservation
privacy
obfuscation protocol
attestation
Internet infrastructure
internet
Intel SGX
initialization process
hybrid protocol
encryption protocol
encryption
data privacy
Cryptographic Protocols
computer network security
composability
client DNS queries
channel attackers
biblio
Bridge the Trustworthiness Gap amongst Multiple Domains: A Practical Blockchain-based Approach
Submitted by aekwall on Mon, 12/21/2020 - 1:33pm
contracts
trustworthiness-protection system
trustworthiness management
trustworthiness gap
trusted corporations
multiple-domain business partners
malicious falsification attacks
Isolated data islands
global trustworthiness
data trustworthiness
cloud-based prototype
blockchain-based approach
Prototypes
edge computing
Cloud Computing
Virtual machining
ethereum
trustworthiness
Distributed databases
cryptocurrencies
blockchain
composability
pubcrawl
Trusted Computing
Organizations
data privacy
authorisation
biblio
LPA-SDP: A Lightweight Privacy-Aware Service Discovery Protocol for IoT Environments
Submitted by aekwall on Mon, 12/21/2020 - 1:27pm
service discovery
ubiquitous data access
resource-constrained environments
resource discovery protocols
resource directory
privacy consideration
manual discovery
LPA-SDT
LPA-SDP
lightweight privacy-aware service discovery protocol
IoT deployments
battlefields
Resiliency
IoT
CoAP
resource-constrained devices
IoT environments
ubiquitous computing
Healthcare
6LoWPAN
privacy
Protocols
composability
pubcrawl
Internet of Things
data privacy
biblio
Policy-Based Access Control for Robotic Applications
Submitted by grigby1 on Thu, 12/17/2020 - 1:38pm
privacy leakage
Service robots
security aspects
security
ROS
robots
robotic systems
robotic applications
Robot sensing systems
robot programming
robot operating systems
Robot Operating System
Resiliency
resilience
pubcrawl
Access Control
policy-based governance
Policy-based access control
permissions
operating systems
modern robots
Human Factors
Human behavior
extended policy-based access control model
data privacy
basic permission control mechanism
authorisation
Adaptation models
access control mechanism
biblio
An Overview of Robot Operating System Forensics
Submitted by grigby1 on Thu, 12/17/2020 - 1:35pm
operating systems
robot operating systems
ROS security
robot operating system forensics
open source operational environment
digital investigation studies
client-server connection
autonomous technologies
Robot Operating System
Service robots
robot programming
vulnerabilities
Industry 4.0
Robot sensing systems
Forensics
privacy
operating systems (computers)
public domain software
Cyber-security
Industries
data privacy
Resiliency
resilience
policy-based governance
Human Factors
Human behavior
pubcrawl
Digital Forensics
security
biblio
Hardening ROS via Hardware-assisted Trusted Execution Environment
Submitted by grigby1 on Tue, 12/15/2020 - 1:42pm
middleware
security
ROS
Robot sensing systems
robot programming
robot operating systems
Robot Operating System
robot design phase
robot behavior
Resiliency
resilience
pubcrawl
policy-based governance
operating systems (computers)
bodily harm
Humanoid robots
Human Factors
Human behavior
hardware-assisted trusted execution environment
Hardware
entertainment
education
data privacy
cyber-physical systems
CPS
control engineering computing
complex cyber-physical systems
biblio
On Secrecy Key of a class of Secure Asymmetric Multilevel Diversity Coding System
Submitted by grigby1 on Tue, 12/15/2020 - 1:27pm
secrecy key size
Asymmetric
Codecs
exact secure rate region
Gaussian processes
key size
key size characterization
multilevel diversity coding
multilevel diversity coding systems
S-AMDCS
5G wireless networks
secure asymmetric MDCS
secure asymmetric multilevel diversity coding system
source-separate coding
superposition secure rate region
symmetric
wiretap channel
wiretap channels
wiretapped messages
Cryptography
pubcrawl
Metrics
resilience
Resiliency
private key cryptography
telecommunication security
security
data privacy
Internet of Things
5G mobile communication
Big Data
Compositionality
Communication networks
secrecy
linear codes
network coding
coding theory
« first
‹ previous
…
30
31
32
33
34
35
36
37
38
…
next ›
last »