Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data Security
biblio
A Novel Anti-Collusion Audio Fingerprinting Scheme Based on Fourier Coefficients Reversing
Submitted by grigby1 on Wed, 01/20/2021 - 4:09pm
Media
Fingerprint recognition
Fourier coefficients
Fourier transform
Fourier transforms
frequency-domain analysis
Human behavior
illegal redistributed audio copies
illegal redistribution
Data Security
multimedia computing
multimedia fingerprinting coding
pubcrawl
resilience
Resiliency
Resists
security of data
Acoustic Fingerprints
Data protection
data hiding
data encapsulation
copyright
computer security
composability
colluded audio
audio signal
audio quality
audio fingerprint
audio copyright protection
audio coding
anticollusion audio fingerprinting
Anti-collusion
Acoustic signal processing
biblio
Fuzzy Elliptic Curve Cryptography based Cipher Text Policy Attribute based Encryption for Cloud Security
Submitted by aekwall on Mon, 01/18/2021 - 11:24am
data confidentiality
Receivers
public key encryption
public key cryptography
fuzzy set theory
fuzzy fined-grained access control
fuzzy elliptic curve cryptography
Fuzzy Cryptography
Fuzzy
encryption
efficient encryption
Diffie Hellman
data transfer
Data Security
data privacy
Elliptic curve cryptography
data access control scheme
cyber physical systems
composability
Cloud Security
Cloud Computing
cipher text policy attribute based encryption
authorisation
Attribute authority
access control mechanisms
Access Control
Metrics
Resiliency
Scalability
pubcrawl
biblio
Challenges and Designs for Secure Deletion in Storage Systems
Submitted by aekwall on Mon, 01/11/2021 - 1:30pm
data scrubbing
data deletion
user data protection
storage systems
secure deletion
programming strategy
magnetic recording
legal compliance requirements
hard disk drives
flash-based solid-state drives
disc drives
deletion design security
security of data
Hard disks
flash memories
Data Sanitization
Law
storage management
privacy
pubcrawl
encryption
Data Security
Scalability
biblio
Big Data Security and Privacy: Current Challenges and Future Research perspective in Cloud Environment
Submitted by grigby1 on Mon, 12/28/2020 - 12:40pm
Metrics
Unstructured Data
Structured Data
storage management
Servers
sensitive data storage
semistructured data
security threats
security of data
Scalability
Resiliency
resilience
pubcrawl
Organizations
Big Data
internet
Human behavior
data structures
data storage
data security challenges
Data Security
data privacy
cloud server
cloud environment
Cloud Computing
big data security
Big data privacy top
big data privacy
biblio
Security and Privacy Analysis of Wearable Health Device
Submitted by grigby1 on Mon, 12/28/2020 - 12:28pm
security
mobile computing
mobile devices
mobile health
mobile wearable health devices
privacy
privacy breach
privacy features
Privacy Risk
pubcrawl
resilience
Resiliency
malicious attack
Security analysis
security risk
security vulnerability
sensitive data information
sensitive information
Servers
telecommunication security
user data security
user sleeping arrangements
Wearable devices
dieting formula
authorisation
Biomedical monitoring
Bluetooth
Bluetooth networking
Bluetooth pairing process
bluetooth security
composability
Computer crime
data privacy
Data Security
wearables security
eating constraint
fitbit
Google Glass
Hacker
health care
health monitor system
health tracker devices
Human behavior
human health parameter monitoring
Jawbone
biblio
Investigation on 6LoWPAN Data Security for Internet of Things
Submitted by aekwall on Mon, 12/21/2020 - 1:26pm
Data Security
wireless sensor networks
Wireless communication
security
Routing protocols
pubcrawl
IoT security
Internet of Things (IoT)
Internet of Things
ipv6 security
Communication system security
authentication
6LoWPAN
policy-based governance
Metrics
composability
Resiliency
biblio
A novel solution for securing robot communications based on the MQTT protocol and ROS
Submitted by grigby1 on Thu, 12/17/2020 - 1:37pm
ROS-enabled robotic systems
resilience
Resiliency
robot communications
Robot Operating System
robot operating systems
robot programming
robotic applications
robotic solutions
ROS
ROS-enabled robotic surveillance system
queueing theory
securing ROS-enabled robotic system
security
security of data
security threats
Servers
Service robots
telecommunication security
telemetry
transport protocols
medical robotic surveillance
automatic robotic surveillance
Data Security
delays
hijacking attacks
Human behavior
Human Factors
internet
IoT
man-in-the-middle attacks
authentication
Message Queuing Telemetry Transport protocol
mobile robots
MQTT
MQTT protocol
operating systems (computers)
Performance analysis
policy-based governance
Protocols
pubcrawl
biblio
An Adaptive Telerobotics Control for Advanced Manufacturing
Submitted by grigby1 on Tue, 12/15/2020 - 1:43pm
locally operated robots
camera device
compact reliable UDP
compact-RUDP
connection reliability
control arhitecture
cutting tool
cutting tools
data channelling
data communication reliability
data feedback packets
data packet transfer prioritization
Distributed Decision Making
file transfers
industrial manipulators
link status monitoring
bandwidth control
Machining
network communications
reliable operational process
Remote control
remotely operated robots
robot movements
robot teleoperation
round-trip time
TCP-like sliding window
teleoperation
telerobotics reasoning architecture
telerobotics reasoning networking
UDP packets
video stream
robot operating systems
Path Planning
pubcrawl
Human behavior
Human Factors
policy-based governance
resilience
Resiliency
mobile robots
security
Protocols
control engineering computing
production engineering computing
media streaming
Data Security
Reliability
control commands
Servers
telecommunication network reliability
Robot sensing systems
telerobotics
light sensor
transport protocols
video streaming
robot vision
image sensors
5DOF robotic arm
adaptable operational process
adaptive telerobotics control
advanced manufacturing
advanced robot path planning
asynchronous file transfer
biblio
Secure Real-Time Heterogeneous IoT Data Management System
Submitted by aekwall on Mon, 12/07/2020 - 12:25pm
secure platform
neural style transfer
on-device computing
performance evaluation
Predictive Metrics
pubcrawl
real-time data collection
real-time data processing system
Real-time monitoring
real-time systems
Resiliency
Scalability
machine learning
secure real-time heterogeneous IoT data management
secure systems
security
sensitive data
Software
streaming IoT data
surveillance
time data analytics system
Trusted Execution Environment
trusted platform modules
drones
cloud
Cloud Computing
composability
Cryptography
cyber-physical system security
data analysis
data privacy
Data Security
diverse IoT devices
drone-based data
authorisation
edge computing
edge device
embedded devices
end-to-end data encryption mechanism
heterogeneous data
Internet of Things
IoT
IoT devices
IOT edge computing
large-scale data analytics
biblio
High Performance Data Encryption with AES Implementation on FPGA
Submitted by grigby1 on Tue, 12/01/2020 - 1:46pm
FPGA
Resiliency
resilience
Random access memory
pubcrawl
Pipelines
low latency
intrusion detection system
IDS
high speed
high performance data encryption
AES
field programmable gate arrays
encryption speed
encryption
Data Security
Cryptography
composability
BIGDATA
Big Data
AES implementation
AES encryption algorithm
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
…
next ›
last »