Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
SDN-based Misbehavior Detection System for Vehicular Networks
Submitted by aekwall on Mon, 12/14/2020 - 12:44pm
sybil attacks
vehicular privacy standards
Sybil attack-resistant
Software-Defined Networking paradigm
SDN-based misbehavior Detection system
misbehavior detection systems
Misbehaving Detection Systems
cryptography solutions
context-aware MDS
voting
internal attacks
vehicular networks
Software Defined Networks
standards
computer network security
Metrics
vehicular ad hoc networks
privacy
composability
pubcrawl
Resiliency
software defined networking
Software
security
data privacy
Cryptography
Monitoring
biblio
An Intelligent Mechanism for Sybil Attacks Detection in VANETs
Submitted by aekwall on Mon, 12/14/2020 - 12:42pm
telecommunication computing
user privacy information
SyDVELM mechanism
Sybil Attacks.
fixed road-side components
Extreme Machine Learning
extreme learning machine
Acceleration
Scalability
distributed network
telecommunication network topology
Complexity theory
feedforward neural nets
VANET
data privacy
machine learning
sybil attacks
Metrics
vehicular ad hoc networks
VANETs
Sybil attack detection
privacy
composability
pubcrawl
Resiliency
security
data integrity
telecommunication security
biblio
Towards Deep Federated Defenses Against Malware in Cloud Ecosystems
Submitted by grigby1 on Fri, 12/11/2020 - 2:33pm
neural nets
machine learning
machine learning models
malware
Malware Analysis
malware containment
malware detection
Malware-Detection-Cloud-Computing-Graph-Neural-Networks-Federated-Learning-Multicloud-Natural-Language-Processing
Metrics
learning (artificial intelligence)
privacy
Privacy Requirements
pubcrawl
resilience
Resiliency
Task Analysis
Training
virtual machines
feature representation
Biological system modeling
Bit error rate
Cloud Computing
cloud computing environments
cloud-specific optimization problems
data privacy
deep federated defenses
feature extraction
attentional sequence models
federated learning
graph neural networks
graph theory
Human behavior
hypergraph learning models
inductive graph
invasive software
biblio
Deploying Privacy as a Service within a Cloud-Based Framework
Submitted by aekwall on Mon, 12/07/2020 - 12:33pm
cloud-based framework
trustworthy cloud services
software-based
software toolkit
service concepts
privacy regulations
PRIVAaaS
MAPE-K control loop
MAKE-K
good option
feedback control loop
deployment environment
data leakages
Cloud Computing
cloud systems
ATMOSPHERE Platform
privacy violations
cloud
trustworthiness
risk assessment
feedback
privacy
composability
pubcrawl
Trusted Computing
data privacy
biblio
Trustworthiness in IoT – A Standards Gap Analysis on Security, Data Protection and Privacy
Submitted by aekwall on Mon, 12/07/2020 - 12:31pm
UAVs
value-added services
standardisation
standard gap analysis
solid technical foundation
security-critical data
security-critical
regulatory foundation
quality living
optimised management
mobile IoT devices
Gap Analysis
data-driven systems
Data Protection and Privacy
Unmanned Aerial Vehicles
data privacy
autonomous aerial vehicles
interoperability
trustworthiness
Energy Efficiency
Data protection
standards
composability
pubcrawl
Trusted Computing
Protocols
privacy-sensitive data
security
Internet of Things
biblio
Secure Real-Time Heterogeneous IoT Data Management System
Submitted by aekwall on Mon, 12/07/2020 - 12:25pm
secure platform
neural style transfer
on-device computing
performance evaluation
Predictive Metrics
pubcrawl
real-time data collection
real-time data processing system
Real-time monitoring
real-time systems
Resiliency
Scalability
machine learning
secure real-time heterogeneous IoT data management
secure systems
security
sensitive data
Software
streaming IoT data
surveillance
time data analytics system
Trusted Execution Environment
trusted platform modules
drones
cloud
Cloud Computing
composability
Cryptography
cyber-physical system security
data analysis
data privacy
Data Security
diverse IoT devices
drone-based data
authorisation
edge computing
edge device
embedded devices
end-to-end data encryption mechanism
heterogeneous data
Internet of Things
IoT
IoT devices
IOT edge computing
large-scale data analytics
biblio
Design of Trusted B2B Market Platforms using Permissioned Blockchains and Game Theory
Submitted by grigby1 on Wed, 12/02/2020 - 2:15pm
secure B2B collaboration
Human behavior
Human Factors
insert
online business-to-business collaboration platforms
permissioned blockchain
privacy
privacy preservation
private B2B collaboration
pubcrawl
Games
smart contracts
Strategic Agents
style
styling
trust
trusted B2B market platforms
trusted collaboration
Trusted Computing
cryptographic regulation protocols
blockchain
business data processing
business sensitive information
collaboration
competitive agents
component
Computing Theory
contracts
Cryptographic Protocols
adequate transparency
data privacy
deep business logic
electronic commerce
enterprise buyers
enterprise sellers
formatting
game theoretic modeling
game theory
biblio
Understanding Trust, Privacy and Financial Fears in Online Payment
Submitted by aekwall on Mon, 11/23/2020 - 11:38am
online payment decision
Human behavior
human trust
customer concerns
customer fears
customer satisfaction
financial fear perception
financial fears
financial loss
privacy loss
online purchasing environment
online seller
payment page
payment security perception
perceived payment security
purchasing
risk perception
website
trust
Conferences
security
Trusted Computing
pubcrawl
privacy
Web sites
consumer behaviour
uncertainty
data privacy
Data collection
Human Factors
electronic money
online transactions
Decision Making
financial data processing
e-commerce
online payment
biblio
Digitized Trust in Human-in-the-Loop Health Research
Submitted by aekwall on Mon, 11/23/2020 - 11:38am
Artificial Intelligence
human-in-the-loop health research
human researchers
digitized trust
data transformations
collaborative health research environments
AI systems
human trust
Human behavior
hospitals
security of data
groupware
Pipelines
data privacy
blockchain technology
collaboration
trustworthiness
pubcrawl
computer architecture
Trusted Computing
biblio
An Incentive Mechanism Using Shapley Value for Blockchain-Based Medical Data Sharing
Submitted by aekwall on Mon, 11/23/2020 - 11:28am
data miners
Compositionality
Incentive mechanism
Shapley value
diseases
Medical diagnostic imaging
blockchain-based medical data sharing
computational process
cooperation model
medical information systems
disease diagnosis
incentive schemes
medical data sharing
Shapley value revenue distribution
topological relationships
Intelligent Data Security
Intelligent Data and Security
Resiliency
Scalability
data owners
Big Data
data privacy
security
game theory
Data models
learning (artificial intelligence)
security of data
pubcrawl
blockchain
Business
machine learning techniques
cryptocurrencies
Distributed databases
Predictive models
« first
‹ previous
…
31
32
33
34
35
36
37
38
39
…
next ›
last »