Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cloud
biblio
An Attribute Based Encryption Scheme with Dynamic Attributes Supporting in the Hybrid Cloud
Submitted by grigby1 on Thu, 07/08/2021 - 1:36pm
ABE-DSA
cloud
Cloud Computing
data privacy
Data Security
encryption
Hybrid Cloud
Metrics
pubcrawl
resilience
Resiliency
Scalability
Servers
user privacy
user privacy in the cloud
biblio
User Privacy Protection Technology of Tennis Match Live Broadcast from Media Cloud Platform Based on AES Encryption Algorithm
Submitted by grigby1 on Thu, 07/08/2021 - 1:35pm
cloud
user privacy in the cloud
user privacy protection
Tennis matches
Sports
AES encryption algorithm
Media
Partitioning algorithms
Clustering algorithms
encryption
user privacy
privacy
Scalability
Resiliency
resilience
Metrics
pubcrawl
Cloud Computing
biblio
Privacy Smells: Detecting Privacy Problems in Cloud Architectures
Submitted by grigby1 on Thu, 07/08/2021 - 1:35pm
privacy
user privacy in the cloud
Quantifying privacy
privacy metrics
data flow analysis
Cloud Privacy
cloud
Measurement
user privacy
web services
computer architecture
Scalability
Resiliency
resilience
Metrics
pubcrawl
Monitoring
Cloud Computing
tools
biblio
Privacy-Aware and Authentication based on Blockchain with Fault Tolerance for IoT enabled Fog Computing
Submitted by aekwall on Mon, 06/28/2021 - 11:37am
Fog computing
security
Access Control
authentication
blockchain
cloud
Cloud Computing
contracts
edge computing
Fog Computing and Security
privacy
pubcrawl
Resiliency
Scalability
smart contract
biblio
Authentication Schemes and Security Issues in Internet Of Everything (IOE) Systems
Submitted by aekwall on Tue, 06/01/2021 - 12:23pm
Internet of Things (IoT)
wireless sensor networks
wireless sensor network (WSN)
Smart Grids
Servers
Sensor Systems
security
pubcrawl
Protocols
people to people (P2P)
people to machine (P2M)
machine-to-machine (M2M)
Smart Grid Sensors
Internet of Things
Internet of Everything (IoE)
Intelligent sensors
Device to Device
Cryptography
computational intelligence
Compositionality
composability
cloud
authentication
actuators
biblio
AUASF: An Anonymous Users Authentication Scheme for Fog-IoT Environment
Submitted by grigby1 on Thu, 05/13/2021 - 11:07am
computer architecture
Internet of Things
Cloud Computing
Servers
IoT
pubcrawl
resilience
Resiliency
authentication
Protocols
password
cloud
anonymous messaging
OTP
anonymous authentication
fog
biblio
Machine Learning based Malware Detection in Cloud Environment using Clustering Approach
Submitted by grigby1 on Wed, 05/05/2021 - 11:56am
machine learning
Trend Micro Locality Sensitive Hashing (TLSH)
Training
Solid modeling
Scalability
sandboxing
pubcrawl
Principal Component Analysis (PCA)
policy-based governance
malware detection
malware
cloud
feature extraction
False Positive Rate (FPR)
cuckoo sandbox
Computational modeling
composability
collaboration agreements
collaboration
clustering
Cloud Computing
biblio
A review of data analytics techniques for effective management of big data using IoT
Submitted by grigby1 on Tue, 04/27/2021 - 1:49pm
tools
security
IoT
pubcrawl
performance evaluation
data privacy
Big Data
Data Security
cloud
data analysis
big data security in the cloud
System performance
data management
Data Analytics
biblio
Time-controlled Regular Language Search over Encrypted Big Data
Submitted by grigby1 on Tue, 04/27/2021 - 1:48pm
Big Data
big data security in the cloud
cloud
Cloud Computing
data analysis
data privacy
data sharing
encryption
information technology
Memory
pubcrawl
regular language
searchable encryption
security
time-controlled
biblio
Big Data Privacy and Challenges for Machine Learning
Submitted by grigby1 on Tue, 04/27/2021 - 1:48pm
authorization
Big Data
big data security in the cloud
Characteristics of Big Data
cloud
Computational modeling
Data models
data privacy
genetic algorithms
machine learning
privacy
pubcrawl
security
Sources of Big Data
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »