Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
accountability
biblio
Designing Accountable Systems
Submitted by Severin Kacianka on Fri, 08/13/2021 - 11:52am
accountability
PIRE
socio-technical systems
Structural Causal Models
Societal Design
biblio
Designing Accountable Systems
Submitted by Severin Kacianka on Wed, 08/11/2021 - 3:08pm
accountability
socio-technical systems
Structural Causal Models
PIRE
Societal Design
biblio
UniRoam: An Anonymous and Accountable Authentication Scheme for Cross-Domain Access
Submitted by grigby1 on Thu, 05/13/2021 - 12:07pm
security
Servers
blockchain
pubcrawl
resilience
Resiliency
performance evaluation
authentication
privacy
Scalability
accountability
Wireless fidelity
anonymous messaging
anonymous authentication
Cross-Domain Roaming
SGX
biblio
Security Assessment of Blockchains in Heterogenous IoT Networks : Invited Presentation
Submitted by grigby1 on Fri, 05/22/2020 - 2:08pm
Internet of Things
transparency
tracking
security
Resiliency
resilience
pubcrawl
network accountability
Network
Metrics
IoT device mesh network
IoT
accountability
Immutable
heterogenous IoT networks
Heterogenous
enterprise business use
Distributed databases
Digital Forensics
Cryptography
composability
blockchain technology
blockchain
biblio
An anomaly detection approach for enterprise file integration
Submitted by aekwall on Mon, 05/11/2020 - 11:29am
file transfer processes
corporate systems
effective self-learning anomaly detection module
emergency services
enterprise file integration
enterprise systems
file integration
file malfunction
file size
file structure
alarm system
file transfers
integration channels
integration duration
novel anomaly detection approach
organization work process management
real-time file integrations
transfer logs
transferring files
Anomaly Detection
Organizations
data integrity
information security
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
composability
Metrics
security of data
Intrusion Detection
Standards organizations
middleware
security issues
information system
emergency management
accountability
network accountability
biblio
Modeling of Blockchain Based Systems Using Queuing Theory Simulation
Submitted by aekwall on Mon, 05/11/2020 - 11:29am
Online banking
queuing theory simulation
Queuing theory for blockchain
M/M/n/L queuing system
leading technology
Blockchain using jsimgraph
Blockchain simulation
blockchain based systems
Bitcoin queuing simulation
network accountability
accountability
auditability
queueing theory
Queueing analysis
Resiliency
Smart Home
Data mining
social networks
internet
blockchain
Metrics
social networking (online)
Computational modeling
Peer-to-peer computing
bitcoin
composability
pubcrawl
biblio
Deep Embedding Logistic Regression
Submitted by aekwall on Mon, 05/11/2020 - 11:28am
Predictive models
nonlinear dimension-wise feature embedding
narrow neural network
LR
interpretability
DNNs
DELR
deep embedding logistic regression
classification accuracy
actionability
network accountability
accountability
deep neural networks
Numerical models
Kernel
regression analysis
Mathematical model
Logistics
pattern classification
Neural networks
neural nets
Metrics
classification
composability
pubcrawl
Resiliency
learning (artificial intelligence)
feature extraction
biblio
A Flow-Level Architecture for Balancing Accountability and Privacy
Submitted by aekwall on Mon, 05/11/2020 - 11:28am
privacy
self-certifying identifier
Performance analysis
network flows
multidelegate mechanism
Internet service provider
flow-level architecture
delegate-registry cooperation scheme
accountability
network accountability
internet
Metrics
computer network security
composability
pubcrawl
Resiliency
computer architecture
Trusted Computing
Protocols
security
Receivers
data privacy
IP networks
biblio
Database Structures for Accountable Flow-Net Logging
Submitted by aekwall on Mon, 05/11/2020 - 11:28am
Databases
Structured Query Language
security
Resiliency
relational databases
pubcrawl
network accountability
Metrics
Flow-net logs
Encapsulation
accountability
database structures
database management systems
Containers
computer security
computer network management
computer and networks
composability
accountable logging methodology
accountable Flow-Net logging
biblio
Automated Verification of Accountability in Security Protocols
Submitted by grigby1 on Fri, 04/03/2020 - 12:43pm
mechanized method
traditional trust assumptions
tools
security violation
security protocols
security protocol design
security property
pubcrawl
Protocols
protocol-agnostic definition
protocol verification
privacy
policy-based governance
Policy Based Governance
accountability
formal verification
formal methods and verification
Cryptography
Cryptographic Protocols
computer security
Compositionality
composability
collaboration
cognition
certificate transparency
Calculus
accountable algorithms protocol
accountability automated verification
« first
‹ previous
1
2
3
4
next ›
last »