Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
FLDDoS: DDoS Attack Detection Model based on Federated Learning
Submitted by grigby1 on Thu, 10/06/2022 - 2:20pm
resilience
Data Imbalance
Resiliency
DDoS Attack
Collaborative Work
denial-of-service attack
Named Data Network Security
Clustering algorithms
federated learning
deep learning
Computational modeling
data privacy
privacy
Scalability
Human Factors
Human behavior
pubcrawl
biblio
Investigating the Design Space for Name Confidentiality in Named Data Networking
Submitted by grigby1 on Thu, 10/06/2022 - 2:20pm
privacy
pubcrawl
Human behavior
Human Factors
Scalability
data privacy
named data networking
military communication
confidentiality
Semantics
resilience
Systematics
Named Data Network Security
TCPIP
Resiliency
biblio
Virtual Private Mobile Network with Multiple Gateways for B5G Location Privacy
Submitted by grigby1 on Mon, 10/03/2022 - 11:46am
data privacy
Location Privacy. Routing. Virtual Private Mobile Network
Location Privacy in Wireless Networks
location privacy
Vehicular and wireless technologies
wireless networks
Compositionality
composability
Cellular networks
Logic gates
privacy
performance evaluation
Conferences
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Location Based Privacy Protection Data Interference Method
Submitted by grigby1 on Mon, 10/03/2022 - 11:46am
Compositionality
Data interference
Soft sensors
Location Privacy in Wireless Networks
location privacy
Phantoms
privacy protection
Publishing
wireless networks
energy consumption
pubcrawl
composability
wireless sensor networks
data privacy
privacy
Resiliency
resilience
Metrics
Human behavior
biblio
Privacy-Preserving Proximity Detection Framework for Location-Based Services
Submitted by grigby1 on Mon, 10/03/2022 - 11:46am
sensors
private proximity detecting
location based services(LBSs)
Location Privacy in Wireless Networks
location privacy
privacy preserving
Homomorphic encryption
Mobile communication
Performance analysis
wireless networks
Compositionality
Servers
composability
Wireless communication
data privacy
privacy
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Privacy-Aware Ant Routing for Wireless Multimedia Sensor Networks in Healthcare
Submitted by grigby1 on Mon, 10/03/2022 - 11:45am
Routing
Wireless Multimedia Sensor Networks (WMSN)
unlinkability
Pseudonymity
Ant Routing
Location Privacy in Wireless Networks
location privacy
anonymity
wireless networks
Compositionality
Switches
pubcrawl
composability
Wireless communication
wireless sensor networks
Medical services
data privacy
privacy
Resiliency
resilience
Metrics
Human behavior
biblio
Analysis of network security and privacy security based on AI in IOT environment
Submitted by aekwall on Fri, 09/30/2022 - 1:46pm
security
Software
privacy
Internet of Things
data privacy
pubcrawl
Metrics
Resiliency
Human behavior
composability
network security
IoT security
IoT
Production
AI
privacy security
biblio
A nodal Authentication IoT Data Model for Heterogeneous Connected Sensor Nodes Within a Blockchain Network
Submitted by aekwall on Fri, 09/30/2022 - 1:45pm
Human behavior
nodal authentication
IoT Data Security
Heterogeneous systems
data integrity
Data Security
IoT security
public key cryptography
composability
Data models
Resiliency
Metrics
pubcrawl
Protocols
authentication
data privacy
blockchain
biblio
Self-Sovereign Identity creation on Blockchain using Identity based Encryption
Submitted by aekwall on Fri, 09/30/2022 - 1:40pm
blockchain
privacy
data privacy
Scalability
Access Control
pubcrawl
Resiliency
Human behavior
data integrity
decentralized
maintenance engineering
Identity management
Identity-based encryption
user-centric
biblio
A Blockchain and Self-Sovereign Identity Empowered Digital Identity Platform
Submitted by aekwall on Fri, 09/30/2022 - 1:39pm
Data Breach
blockchain
Cloud Computing
Medical services
data privacy
Scalability
pubcrawl
Resiliency
Human behavior
Buildings
Government
Identity management
Banking
Self-Sovereign Identity
zero-knowledge proof
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »