Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
PAVSS: Privacy Assessment Vulnerability Scoring System
Submitted by aekwall on Mon, 10/12/2020 - 11:31am
social engineering
Expert Systems and Privacy
Twitter data
privacy-breach vulnerability
Privacy Assessment Vulnerability Scoring System
Privacy assessment
PAVSS
online sources
online so cial networks
online platform
Federal Trade Commission
fair information practice principles
consumer information
cybersecurity experts
security of data
stored data
private data
Human Factors
Data Breach
Data Security
privacy
Twitter
social networking (online)
privacy attacks
pubcrawl
Human behavior
data privacy
Scalability
biblio
An approach to Privacy on Recommended Systems
Submitted by aekwall on Mon, 10/12/2020 - 11:31am
user security
Expert Systems and Privacy
users personal information
referral systems
recommended systems
privacy protection techniques
online companies
website
expert systems
Europe
recommender systems
user privacy
Human Factors
security
data privacy
Companies
social networks
Data protection
internet
social networking (online)
Facebook
privacy
pubcrawl
Human behavior
History
Scalability
biblio
A Probability based Model for Big Data Security in Smart City
Submitted by grigby1 on Tue, 10/06/2020 - 1:41pm
security of data
IoT
organisational data
Organizations
personal data
probability
probability based model
pubcrawl
resilience
Resiliency
security
highly sensitive data
sensitive data sharing
smart applications
smart cities
Smart City
smart city critical data
smart city data
smart technologies
smart traffic management system
transport data
Trusted Computing
Data Leakage Detection
Big Data
big data security
bigraph
Computational modeling
Computing Theory
crisis response
critical data security
data analysis
Data Analytics
data leakage
Analytical models
Data models
data objects
data privacy
disaster resilience
economic data
emergency management
energy data
environment data
graph theory
Guilt Model
biblio
The Role of Interactivity in Local Differential Privacy
Submitted by grigby1 on Mon, 10/05/2020 - 1:49pm
fully interactive compositional protocol
testing
pubcrawl
Protocols
privacy guarantee
privacy
local differential privacy
Interaction
hypothesis testing problem
Compositionality
equivalent sequentially interactive protocol
differential privacy
data privacy
Compounds
Complexity theory
Computing Theory and Compositionality
Human Factors
Human behavior
biblio
Permissioned Blockchains and Virtual Nodes for Reinforcing Trust Between Aggregators and Prosumers in Energy Demand Response Scenarios
Submitted by aekwall on Mon, 09/28/2020 - 12:17pm
grid stability
renewable energy sources
end-to-end security
cyber physical systems
active consumer participation
auditable DR framework
DERs
design innovative DR schemes
DR services
DR signals
energy demand response scenarios
energy stakeholders
energy supply
energy waste
open systems
legacy energy systems
Load management
modern smart grid technologies
modern smart grids
reliable DR framework
RES
scale deployment
smart contract-based DR framework
software stakeholders
tamper-resistant DR framework
virtual node
virtual nodes
CPS Privacy
Permissioned Blockchains
Internet of Things
IoT devices
security
Human behavior
pubcrawl
blockchain
privacy
smart power grids
Stakeholders
smart contracts
power engineering computing
Smart Grids
power grids
data privacy
distributed power generation
energy management systems
power system stability
smart meters
Human Factors
demand side management
demand response
Fog computing
energy system
contracts
blockchains
interoperability
biblio
A Hardware-Software Codesign Approach to Identity, Trust, and Resilience for IoT/CPS at Scale
Submitted by aekwall on Mon, 09/28/2020 - 12:16pm
enhanced device identity
communication technologies
communication reliability
operational efficiency
hardware-software codesign
cyber physical systems
quality of services
Blockchain protocols
Byzantine actor
citizen welfare
distribution framework
Transmitters
entity trust
hardware-software codesign approach
IoT-CPS
multitier methodology
radio frequency-distinct native attributes
RF-DNA
RF-DNA Fingerprinting
system trustworthiness
trust-building
CPS Privacy
Wireless communication
computer network security
data privacy
Internet of Things
Cryptographic Protocols
Trusted Computing
Support vector machines
cyber-physical systems
Human behavior
pubcrawl
Communication system security
IoT
blockchain
internet
privacy
cryptocurrencies
quality of service
authentication
Human Factors
smart cities
Trust management
biblio
Privacy-Enabled Secure Control of Fog Computing Aided Cyber-Physical Systems
Submitted by aekwall on Mon, 09/28/2020 - 12:16pm
cyber physical systems
CPS Privacy
secure estimation scheme
Secure control design
privacy-enabled secure control
observer-based secure control problem
Luenberger observer
fog computing aided CPS
Fog computation
FCA-CPS
Data Perturbation
complicated computation
industrial process
Covariance matrices
Linear systems
Cryptography
Observers
Perturbation methods
fog layer
Human Factors
edge computing
security threats
privacy
pubcrawl
Human behavior
cyber-physical systems
distributed processing
data privacy
encryption
biblio
Cognitive Cybersecurity for CPS-IoT Enabled Healthcare Ecosystems
Submitted by aekwall on Mon, 09/28/2020 - 12:16pm
innovative cognitive cybersecurity
health care
Healthcare
healthcare ecosystem
Human behavior
Human Behavior and Cybersecurity
human cognitive behaviour
Human Factors
human life
infrastructures
emerging cybersecurity
Internet of Things
machine learning
Medical services
privacy
Privacy Threats
pubcrawl
security of data
sophisticated attack methods
computer security
Adaptation models
Artificial Intelligence
artificial intelligent
cognition
Cognitive cybersecurity
cognitive cybersecurity framework
cognitive methods
cognitive techniques
CPS Privacy
CPS-IoT
CPS-IoT enabled healthcare services
critical infrastructure systems
critical infrastructures
cyber physical systems
cyber-attacks
cybersecurity specialists
data privacy
biblio
Preserving Location Privacy in Cyber-Physical Systems
Submitted by aekwall on Mon, 09/28/2020 - 12:16pm
location obfuscation
vulnerabilities
user location information
trust
sensors
security
public adoption
public acceptance
pubcrawl
Proposals
privacy-preserving location service
privacy
mobile computing
Mix-zone
location-obfuscation
location privacy
CPS Privacy
location based services
IoT devices
IoT
Internet of Things
Human Factors
Human behavior
data privacy
cyber-physical systems
cyber physical systems
CPSS
CPS
context-awareness
Conferences
actuators
biblio
A radio-fingerprinting-based vehicle classification system for intelligent traffic control in smart cities
Submitted by aekwall on Mon, 09/28/2020 - 12:10pm
precise vehicle classification
comprehensive measurements
cost-efficiency
dynamic control methods
dynamic type-specific lane assignments
global system parameters
highly sophisticated traffic control methods
highly-dynamic Cyber Physical System
individual vehicles
intelligent traffic control systems
key element
machine learning based approach
key performance indicators
radio-fingerprint
radio-fingerprinting
real-time
road traffic control
specific data
street network
Traffic flow
up-to-date traffic
vehicle classification system
vehicle type information
CPS Privacy
vehicular ad hoc networks
traffic engineering computing
data privacy
Receivers
Measurement
Support vector machines
feature extraction
learning (artificial intelligence)
Human behavior
pubcrawl
privacy preservation
Roads
road vehicles
pattern classification
machine learning
privacy
cyber physical systems
Human Factors
smart cities
system state
CPS
System performance
radio transmitters
« first
‹ previous
…
38
39
40
41
42
43
44
45
46
…
next ›
last »