Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
Analysis of Cyber-Physical Security in Electric Smart Grid : Survey and challenges
Submitted by aekwall on Mon, 09/28/2020 - 12:10pm
cyber-physical system
power engineering computing
Smart Grids
Human Factors
attack motivation
CPS
Meters
security model
ICT
Smart Grid
communication system
defence
electric smart grid
information and communication technology
privacy issue
security concern
CPS Privacy
Monitoring
cyber physical systems
smart power grids
privacy
cyber-physical security
Reliability
Vulnerability
pubcrawl
Human behavior
cyber-physical systems
SCADA systems
SCADA
security
privacy concerns
data privacy
architecture
biblio
Taxonomy Analysis of Security Aspects in Cyber Physical Systems Applications
Submitted by aekwall on Mon, 09/28/2020 - 12:10pm
distributive nature
autonomous systems
CPS
security aspects
sensitive data
Intelligent systems
control methods
critical applications
cyber physical system applications
security issues
eHealth
innovative technologies
IoT related issues
taxonomy analysis
taxonomy based analysis
vehicular technologies
CPS Privacy
privacy
computer network security
Monitoring
data privacy
privacy concerns
Internet of Things
security
Human behavior
pubcrawl
security of data
cyber physical systems
Smart Grid
Smart Grids
sensors
Human Factors
industrial control
taxonomy
biblio
BlockSee: Blockchain for IoT Video Surveillance in Smart Cities
Submitted by aekwall on Mon, 09/28/2020 - 12:09pm
jointly provides validation
video surveillance
video frames
video cameras
urban environments
Urban areas
smart cities
pubcrawl
privacy issues
privacy
physical manipulations
observed scene
multiple video-flows
mechanical settings
malicious users
bitcoin
IoT video surveillance
Internet of Things
Human Factors
Human behavior
heterogeneous owners
distributed city-wide monitoring systems
data privacy
cyber physical systems
CPS Privacy
contracts
Cameras
camera settings
BlockSee
blockchain-based video surveillance system
biblio
Privacy in Feedback: The Differentially Private LQG
Submitted by aekwall on Mon, 09/28/2020 - 12:09pm
CPS
CPS Privacy
trajectory control
state trajectory
optimal feedback control values
malicious advisory
LQR problem
LQG problem
linear-quadratic-Gaussian problem
linear quadratic Gaussian control
interacting agents
infinite-horizon linear-quadratic-regulator problems
feedback privacy
Feedback loop
cloud computer
Cloud Computing
numerical simulation
numerical analysis
optimal control
Trajectory
Sensitivity
Dynamical Systems
Human Factors
cyber physical systems
feedback
privacy
pubcrawl
Human behavior
cyber-physical systems
data privacy
biblio
Optimizing Spectrum Pooling for Multi-Tenant C-RAN Under Privacy Constraints
Submitted by aekwall on Mon, 09/28/2020 - 12:09pm
participating operators
finite-capacity backhaul links
finite-capacity fronthaul links
fronthaul/backhaul compression strategies
inter-onerator privacy
inter-operator cooperation
inter-tenant privacy constraints
multi-tenant
multitenant C-RAN
multitenant Cloud Radio Access Network system
downlink transmission
privacy constraint
private shared subbands
proprietary radio units
RAN sharing
shared subband
spectrum pooling
user equipments
CPS Privacy
radio access networks
Cloud Computing
data privacy
Human behavior
pubcrawl
privacy
optimization
cyber physical systems
Bandwidth
computer network security
Downlink
Interference
Human Factors
Quantization (signal)
bandwidth allocation
precoding
C-RAN
cloud processor
biblio
Context-Aware Privacy Preservation in a Hierarchical Fog Computing System
Submitted by aekwall on Mon, 09/28/2020 - 12:02pm
quality of service
Computing Theory and Privacy
multiple fog node communication
hierarchical infrastructure
hierarchical fog computing system
FOG computing environment
dynamic MDP-based privacy-preserving model
decentralized infrastructure
context-aware privacy preservation
content-aware applications
zero-sum game
Ethernet
Privacy Threats
Topology
security of data
Redundancy
network topology
pubcrawl
Human behavior
Resiliency
real-time systems
game theory
Protocols
distributed processing
Internet of Things
data privacy
Scalability
biblio
Rethinking Location Privacy for Unknown Mobility Behaviors
Submitted by aekwall on Mon, 09/28/2020 - 12:02pm
blank-slate models
Computing Theory and Privacy
Zirconium
unknown mobility
sporadic hardwired models
Quantifying privacy
profile estimation-based LPPM
privacy properties
nonsporadic location privacy scenarios
mobility patterns
Mobility Models
mechanism design
LPPM design
location privacy-preserving mechanisms
location privacy service
location privacy protections
Scalability
blank-slate approach
design phase
location privacy
Training data
data privacy
testing
Training
Data protection
privacy
pubcrawl
Human behavior
Resiliency
Data models
mobile computing
biblio
Privacy-Preserving Fuzzy Multi-Keyword Search for Multiple Data Owners in Cloud Computing
Submitted by aekwall on Mon, 09/28/2020 - 12:02pm
locality-sensitive hashing
Computing Theory and Privacy
single data owner model
searchable encryption schemes
search privacy
privacy-preserving fuzzy multikeyword search
plaintext search techniques
multiple data owners
LSH
Information Leakage
fuzzy multi-keyword search.
encrypted documents
ciphertext search
Bloom filter
BF
Cloud Computing
Privacy-preserving
encryption method
cloud server
Indexes
fuzzy set theory
query processing
pubcrawl
Human behavior
Resiliency
data privacy
encryption
Cryptography
Servers
Scalability
biblio
Environment Aware Privacy-Preserving Authentication with Predictability for Medical Edge Computing
Submitted by aekwall on Mon, 09/28/2020 - 12:02pm
environmental prediction
mutual authentication
biomedical communication
communication channel
edge computing health monitoring system
edge computing unit
environment aware privacy-preserving authentication protocol
environment equality
environmental assessment
elliptic curve
fuzzy extractor
fuzzy synthetic evaluation model
Health monitoring system
medical edge computing
resource-limited smart devices
smart health monitoring system
temporal health index
Computing Theory and Privacy
privacy preservation
authorisation
Data Security
data privacy
distributed processing
Cryptographic Protocols
Resiliency
Human behavior
pubcrawl
Scalability
fuzzy set theory
public key cryptography
Security analysis
secure communication
Elliptic curve cryptography
edge computing
privacy protection
biblio
An Enhanced Approach to Cloud-based Privacy-preserving Benchmarking
Submitted by aekwall on Mon, 09/28/2020 - 12:01pm
Homomorphic encryption
Computing Theory and Privacy
statistical measures
secure multi-party computation
product cost optimisation
privacy-preserving benchmarking systems
Oblivious transfer
key performance indicators
key figure comparison
cloud-based privacy-preserving benchmarking
cloud-based KPI comparison
cloud-based
benchmarking system
Benchmarking
software performance evaluation
Cloud Computing
Privacy-preserving
Benchmark testing
Complexity theory
statistical analysis
Companies
privacy
pubcrawl
Human behavior
Resiliency
Protocols
data privacy
encryption
Cryptography
Scalability
« first
‹ previous
…
39
40
41
42
43
44
45
46
47
…
next ›
last »