Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
Anomaly Detection Models for Smart Home Security
Submitted by aekwall on Mon, 11/23/2020 - 11:28am
HMM model
smart home environment
Compositionality
privacy violations
Hidden Markov models
hidden Markov model
anomalous activities
anomaly detection models
cyber threat surface
fire accidents
Smart Home
multiple sensors
network level sensor data
smart home security
smart homes devices
smart security cameras
smoke sensors
unauthorized movements
Intelligent Data Security
Intelligent Data and Security
Resiliency
Monitoring
Scalability
Big Data
data privacy
security
smart devices
DDoS Attacks
learning (artificial intelligence)
machine learning
computer network security
pubcrawl
Anomaly Detection
Energy Efficiency
Data collection
sensor fusion
Intelligent sensors
Smart homes
home automation
biblio
Privacy-Preserving Keyword Search Schemes over Encrypted Cloud Data: An Extensive Analysis
Submitted by aekwall on Mon, 11/23/2020 - 11:21am
Intelligent Data Security
verifiability
storage management
Servers
security
Scalability
Resiliency
remote servers
pubcrawl
privacy-preserving keyword search schemes
privacy issue
privacy
keyword search functions
Keyword search
Big Data
Intelligent Data and Security
Information Leakage
Indexes
encryption
encrypted cloud data
efficiency
data privacy
Cryptography
Compositionality
cloud storage services
cloud storage
Cloud Computing
biblio
Enabling Cyber Security Data Sharing for Large-scale Enterprises Using Managed Security Services
Submitted by grigby1 on Fri, 11/20/2020 - 2:14pm
Policy
managed security service
managed security service provider
Managed security services
Monitoring
MSS platform customers
MSSP
multi-tenant
organization
outsourcing
Peer-to-peer computing
platform solution
large-scale enterprises
policy-based governance
Portals
privacy
privacy concerns
private sectors
pubcrawl
public sectors
security of data
Security Policies Analysis
Task Analysis
use case
data anonymization
business data processing
cloud service
collaboration
collaborative data sharing
component
computer security
confidential data sharing
cyber security
cyber security data sharing
cyber security information
cybercrimes
architecture
data encryption
data privacy
Data Sanitization
data sharing
design
diagram
flexible data sharing
information
Lakes
large-scale enterprise
biblio
Synthesizing Energy Consumption Data Using a Mixture Density Network Integrated with Long Short Term Memory
Submitted by grigby1 on Fri, 11/20/2020 - 2:06pm
residential consumer energy consumption
mixture density network
multiple critical infrastructures
policy-based governance
power engineering computing
Power Grid
Predictive models
privacy
privacy concerns
Probability density function
pubcrawl
Metrics
residential smart meters
resilience
Resiliency
Scalability
security
smart cities
smart grid consumer privacy
smart meters
smart power grids
standards
energy consumption
collaboration
commercial consumer energy consumption
Communication networks
composability
data analysis
data dissemination
Data models
data privacy
data storage
data synthesis
centralized data analytics
fully synthetic energy consumption data
Human behavior
human behavioral impacts
information dissemination
load patterns
Logic gates
long short-term memory network
LSTM
MDN
biblio
A Secure and Efficient Renewable Energy Trading Scheme Based on Blockchain in Smart Grid
Submitted by grigby1 on Fri, 11/20/2020 - 2:05pm
distributed energy trading schemes
composability
green computing
Smart Grids
Security analysis
power system interconnection
renewable energy sources
power markets
credibility-based equity proof mechanism
distributed energy sources
Distributed energy trading
smart power grids
efficient energy renewable trading scheme
electricity market trading model
energy internet
Energy storage
Energy systems
energy trading market
privacy protection
secure energy renewable trading scheme
smart grid consumer privacy
Resiliency
privacy
security
blockchain
Distributed databases
pubcrawl
Human behavior
Metrics
policy-based governance
collaboration
resilience
Cryptography
Indexes
data privacy
Scalability
internet
Computational modeling
distributed power generation
power engineering computing
power system security
Smart Grid
biblio
At the cross roads of lattice-based and homomorphic encryption to secure data aggregation in smart grid
Submitted by grigby1 on Fri, 11/20/2020 - 2:04pm
Security analysis
policy-based governance
power meters
privacy
privacy-preserving lattice
pubcrawl
resilience
Resiliency
Scalability
security
Metrics
smart appliances
smart energy meters
Smart Grid
smart grid consumer privacy
Smart Grids
smart household appliances
smart meters
smart power grids
encryption
communication complexity
composability
consumer privacy
Cryptography
customer privacy protection
data aggregation
data privacy
domestic appliances
collaboration
home area network appliances
home energy use
homomorphic aggregation scheme
Homomorphic encryption
Human behavior
lattice-based homomorphic encryption
Logic gates
messages confidentiality
biblio
Security and Privacy for Smart Meters: A Data-Driven Mapping Study
Submitted by grigby1 on Fri, 11/20/2020 - 2:04pm
smart power grids
smart grid consumer privacy
topic modeling techniques
topic modeling
smart metering systems
privacy techniques
privacy related issues
general smart grid paradigm
energy consumer
data-driven mapping study
data-driven analysis
smart meters
composability
privacy
Smart Grid
power engineering computing
Scalability
data privacy
security
Resiliency
resilience
collaboration
policy-based governance
Metrics
Human behavior
pubcrawl
biblio
Load Forecasting of Privacy-Aware Consumers
Submitted by grigby1 on Fri, 11/20/2020 - 2:03pm
Resiliency
polling frequency constraints
power engineering computing
predictive control
Predictive models
privacy
privacy protection schemes
privacy-aware consumers
pubcrawl
regression analysis
report consumption data
resilience
policy-based governance
Scalability
short-term load forecasts
SM data
smaller consumer aggregations
smart grid consumer privacy
smart meter
smart meters
STLF accuracy
Support vector machines
support vector regression
temporal resolutions
high spatial resolutions
composability
consumer aggregation levels
consumer privacy
consumer privacy risks
data privacy
data-driven grid management
Electric Grid
energy consumption
forecast accuracy
forecasting
grid visible consumer load profile
collaboration
higher aggregation levels
Human behavior
load forecasting
Load modeling
load profiles
load-forecasting
load-levelling scheme
Metrics
model-distribution predictive control
Mutual information
planning techniques
biblio
Enhancing Security and Privacy of Next-Generation Edge Computing Technologies
Submitted by aekwall on Mon, 11/16/2020 - 2:57pm
attack surface area
Resilient Security Architectures
system security manager
Security Micro-architecture
reputational penalties
raw confidential data
next-generation edge computing technologies
Internet-of-Things service architectures
financial penalties
edge security
device level attacks
Data protection
data confidentiality breach
Cloud to Edge
IoT
Active Security
cyber resilience
Embedded System
IoT architecture
edge computing
GDPR
pubcrawl
Resiliency
Internet of Things
data privacy
Data Security
computer network security
biblio
Modified Feature Descriptors to enhance Secure Content-based Image Retrieval in Cloud
Submitted by aekwall on Mon, 11/16/2020 - 1:11pm
Outsourced Database Integrity
visual descriptors
visual databases
unencrypted images
texture descriptors
Secure kNN
secure CBIR scheme
searchable encryption
searchable encrypted index
retrieval precision
Resiliency
pubcrawl
outsourced images
outsourced encrypted images
color descriptors
modified feature descriptors
Metrics
locality sensitive hashing
image texture
image retrieval
image colour analysis
feature extraction
encrypted domain gain
data privacy
Cryptography
content-based retrieval
content-based image retrieval
composability
« first
‹ previous
…
32
33
34
35
36
37
38
39
40
…
next ›
last »