Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data Security
biblio
Secure Data Streaming to Untrusted Road Side Units in Intelligent Transportation System
Submitted by aekwall on Mon, 11/23/2020 - 11:28am
Data Analytics
Intelligent Data and Security
Intelligent Data Security
vehicles stream data
vehicle-to-infrastructure communications
vehicle layer
untrusted road side units
secure data streaming
road side unit
data security issues
sensory data
key management
Intelligent Transportation Systems
Intelligent Transportation System
Compositionality
IoT
multi-tenancy
data analysis
vehicular ad hoc networks
privacy
pubcrawl
Resiliency
telecommunication security
Access Control
encryption
Data Security
Cryptography
Scalability
Monitoring
automobiles
biblio
Network Security Risk Assessment Using Intelligent Agents
Submitted by aekwall on Mon, 11/23/2020 - 11:22am
network connectivity
Data Security
attack graphs
automated intelligent systems
decision-making approach
FCMs
Fuzzy cognitive maps
governmental rules
interconnected network analysis
large networks analysis
attack graph
network graphical representation
network security engineers
network security risk assessment
organisational rules
Risk Prevention
security risk analysis
Intelligent Data Security
Intelligent Data and Security
Decision Making
Scalability
security
Task Analysis
Resiliency
pubcrawl
graph theory
multi-agent systems
tools
computer network security
robots
Communication networks
security breaches
risk analysis
computer networks
Compositionality
multiagent system
data communication
biblio
Enhancing Security and Privacy of Next-Generation Edge Computing Technologies
Submitted by aekwall on Mon, 11/16/2020 - 2:57pm
attack surface area
Resilient Security Architectures
system security manager
Security Micro-architecture
reputational penalties
raw confidential data
next-generation edge computing technologies
Internet-of-Things service architectures
financial penalties
edge security
device level attacks
Data protection
data confidentiality breach
Cloud to Edge
IoT
Active Security
cyber resilience
Embedded System
IoT architecture
edge computing
GDPR
pubcrawl
Resiliency
Internet of Things
data privacy
Data Security
computer network security
biblio
Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges, and Solutions
Submitted by aekwall on Mon, 10/19/2020 - 12:08pm
Key Policy Attribute Based Encryption (KP-ABE)
trust
tradition access control
Scalability
Resiliency
public key cryptography
pubcrawl
privacy protection laws
privacy
KP-ABE
key policy attribute-based encryption
Access Control
hierarchical encryption
encryption
edge computing
Data Security
data privacy
cloud computing service
Cloud Computing
basic ABE
authorisation
attribute-based encryption
biblio
PAVSS: Privacy Assessment Vulnerability Scoring System
Submitted by aekwall on Mon, 10/12/2020 - 11:31am
social engineering
Expert Systems and Privacy
Twitter data
privacy-breach vulnerability
Privacy Assessment Vulnerability Scoring System
Privacy assessment
PAVSS
online sources
online so cial networks
online platform
Federal Trade Commission
fair information practice principles
consumer information
cybersecurity experts
security of data
stored data
private data
Human Factors
Data Breach
Data Security
privacy
Twitter
social networking (online)
privacy attacks
pubcrawl
Human behavior
data privacy
Scalability
biblio
Research on Cloud Computing Security Evaluation Model Based on Trust Management
Submitted by grigby1 on Mon, 10/05/2020 - 2:10pm
Probability distribution
uncertainty
Trusted Computing
trust management mechanism
Trust management
subsequent cloud computing service
sharing applications
security of data
security assessment model
security
Scalability
Resiliency
resilience
quantifiable analysis
pubcrawl
Big Data trust management
information security
Human Factors
DS evidence theory method
DS evidence theory
data unification
Data Security
data credible quantification mechanism
computer theory
Computational modeling
cloud services
Cloud Security
cloud computing security evaluation model
cloud computing security
Cloud Computing
biblio
Evaluating Resilience of Grid Load Predictions under Stealthy Adversarial Attacks
Submitted by aekwall on Mon, 10/05/2020 - 11:47am
iterative attack method
adversarial perturbation
DeepForge
distributed sensor fusion
distributed smart meters
domain-specific deep-learning
Dynamic Pricing
grid maintenance
GridLAB-D
inference predictors
power distribution planning
load forecasting
load forecasting systems
model-based design
power distribution network
resilience evaluation
smart grid load prediction systems
synthetic norm-bounded modifications
testbed
CPS resilience
smart power grids
Data Security
cyber-physical systems
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
Iterative methods
optimization problem
optimisation
security of data
cyber physical systems
adversarial attacks
power engineering computing
power distribution control
sensor fusion
information processing
power systems
smart meters
distributed sensors
biblio
Environment Aware Privacy-Preserving Authentication with Predictability for Medical Edge Computing
Submitted by aekwall on Mon, 09/28/2020 - 12:02pm
environmental prediction
mutual authentication
biomedical communication
communication channel
edge computing health monitoring system
edge computing unit
environment aware privacy-preserving authentication protocol
environment equality
environmental assessment
elliptic curve
fuzzy extractor
fuzzy synthetic evaluation model
Health monitoring system
medical edge computing
resource-limited smart devices
smart health monitoring system
temporal health index
Computing Theory and Privacy
privacy preservation
authorisation
Data Security
data privacy
distributed processing
Cryptographic Protocols
Resiliency
Human behavior
pubcrawl
Scalability
fuzzy set theory
public key cryptography
Security analysis
secure communication
Elliptic curve cryptography
edge computing
privacy protection
biblio
Energy Data Security and Multi-Source Coordination Mechanism Based on Blockchain
Submitted by aekwall on Mon, 09/28/2020 - 11:42am
blockchain-based energy data supervision
transaction model
summary directory tree
multisource synergy mechanism
multisource coordination mechanism
multisource collaboration
multi-source collaboration
internet technology
energy industry
energy data security
consensus mechanism
clean energy
Scalability
blockchain security
blockchain technology
power system security
power engineering computing
Distributed databases
internet
pubcrawl
Resiliency
Data Security
Cryptography
biblio
Countering Cybersecurity and Counterfeit Material Threats in Test Systems
Submitted by aekwall on Mon, 09/28/2020 - 11:35am
mission critical electronics
AS5553
ATE system
ATEasy
commercial-off-the-shelf instrumentation
cybersecurity issue
LXI
military products
missile assemblies
aerospace products
secure software-based system
Security Technical Implementation Guide (STIG)
test development environment
test parameters
test sequences
TPS
undetected data breach
UUT
electronic warfare
data integrity
invasive software
Resiliency
pubcrawl
composability
Cybersecurity
program testing
Automated Secure Software Engineering
Data Security
ATE
automatic test equipment
malware
National security
automatic test software
automatic test systems
AD9100D
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
…
next ›
last »