Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information privacy
biblio
An Analytics Toolbox for Cyber-Physical Systems Data Analysis: Requirements and Challenges
Submitted by aekwall on Tue, 05/25/2021 - 2:33pm
security
information security
cyber-physical systems
pubcrawl
privacy
Urban areas
data privacy
Scalability
Human Factors
Data Analytics
Time factors
information privacy
CPS Privacy
Cyber-Physical Products
biblio
A Scalable Correlation Clustering strategy in Location Privacy for Wireless Sensor Networks against a Universal Adversary
Submitted by aekwall on Mon, 10/26/2020 - 11:02am
correlation methods
Location Privacy in Wireless Networks
wireless network sensors
universal adversary
scalable correlation clustering strategy
remote Environment
adversary
information privacy
telecommunication network planning
Compositionality
Semantics
energy consumption
scalable
telecommunication security
sensors
trust
Correlation
Metrics
sensor placement
privacy
location privacy
wireless sensor networks
pubcrawl
Human behavior
Resiliency
security
biblio
PRESERVING PARAMETER PRIVACY IN SENSOR NETWORKS
Submitted by aekwall on Mon, 04/20/2020 - 9:24am
Cramér-Rao lower bound
privacy models and measurement
utility loss
public parameter estimation
private parameter estimation
privacy gain functions
predefined privacy gain threshold
perturbation
parameter privacy preservation
parameter estimation
information privacy
inference allowance
decentralized sensors.
Cramér-Rao lower bounds
pubcrawl
linear model
Loss measurement
Perturbation methods
sensor networks
Silicon
data privacy
Noise measurement
sensor fusion
Indexes
Metrics
privacy
wireless sensor networks
biblio
PRESERVING PARAMETER PRIVACY IN SENSOR NETWORKS
Submitted by aekwall on Mon, 04/20/2020 - 9:24am
Cramér-Rao lower bound
privacy models and measurement
utility loss
public parameter estimation
private parameter estimation
privacy gain functions
predefined privacy gain threshold
perturbation
parameter privacy preservation
parameter estimation
information privacy
inference allowance
decentralized sensors.
Cramér-Rao lower bounds
pubcrawl
linear model
Loss measurement
Perturbation methods
sensor networks
Silicon
data privacy
Noise measurement
sensor fusion
Indexes
Metrics
privacy
wireless sensor networks
biblio
Information Privacy of Cyber Transportation System: Opportunities and Challenges
Submitted by grigby1 on Fri, 09/28/2018 - 3:05pm
Cybersecurity
resilience
pubcrawl
Resiliency
Human behavior
survey
information privacy
policy-based governance
Transportation
E-Government
biblio
Privacy Protection Dashboard: A Study of Individual Cloud-Storage Users Information Privacy Protection Responses
Submitted by grigby1 on Wed, 09/05/2018 - 9:44am
pubcrawl
Cloud Computing
Control Theory
Human behavior
human factor
information privacy
item response theory
Metrics
privacy
protection motivation theory
resilience
Resiliency
Scalability
User behavior
user privacy in the cloud
biblio
Deep Web Online Anonymity
Submitted by grigby1 on Mon, 04/02/2018 - 11:30am
resilience
Internet user
Logic gates
Metrics
online anonymity
personal information sharing
privacy
privacy protection
pubcrawl
internet
Resiliency
social hub
social media
social networking (online)
Terrorism
user data
Vulnerabilities of Social Media
cyber space
anonymity
Browsers
composability
Computer crime
Computer hacking
Computers
crime
Cryptography
Anarchy
Cyberspace Anonymity
Data protection
deep web
Government
hidden encrypted network
Human behavior
information privacy
biblio
Quantum approach to the information privacy in Smart Grid
Submitted by grigby1 on Wed, 02/21/2018 - 12:53pm
pubcrawl
smart power grids
Smart Grids
Smart Grid Privacy
Smart Grid
Schedules
Scalability
Resiliency
resilience
Quantum Key Distribution
quantum cryptography
Communication networks
Protocols
power system security
information privacy
Human Factors
Human behavior
encoding
data privacy
Cryptography
complex grid system
biblio
Privacy and Security: How to Differentiate Them Using Privacy-Security Tree (PST) Classification
Submitted by grigby1 on Thu, 12/28/2017 - 12:34pm
Metrics
security of data
Science of Security
Scalability
Resiliency
pubcrawl
PST classification
privacy-security tree classification
privacy
Policy-Governed Secure Collaboration
pattern classification
authentication
Law
information system domain
information security
information privacy
Human Factors
Human behavior
Data protection
data privacy
composability
collaboration
biblio
Explaining the Role of Trust in Cloud Service Acquisition
Submitted by BrandonB on Wed, 05/06/2015 - 12:26pm
cloud transactions
Law
mediating
Organizations
personal identity information
privacy
sensitive personal information
service provider ability
service provider integrity
transacting parties
trust
Banking
Cloud Computing
cloud services acquisition
internet
Context
Data protection
digital identity management system
financial institutions
trusted cloud identity ecosystem
Trusted Computing
user assurances
user confidence
Ghana
identity abuses
information privacy
interest protection
1
2
next ›
last »