Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information science
biblio
Algorithm for k-anonymity based on ball-tree and projection area density partition
Submitted by grigby1 on Thu, 08/13/2020 - 5:34pm
Loss measurement
usability
UCI
trees (mathematics)
tree data structures
Resiliency
resilience
pubcrawl
projection area density partition
privacy
Partitioning algorithms
microdata publishing
Metrics
Adult dataset
kd-tree
k-anonymity algorithm
k-anonymity
information science
individual privacy protection
Human behavior
Gotrack dataset
data privacy
composability
Classification algorithms
ball-tree
anonymity
biblio
NMF-Based Privacy-Preserving Collaborative Filtering on Cloud Computing
Submitted by aekwall on Mon, 07/13/2020 - 11:06am
recommender system
user privacy in the cloud
user privacy data
user personal information security
recommendation system
recommendation process
privacy protection algorithm
NMF-based privacy-preserving collaborative filtering
nmf
matrix elements
information science
recommender systems
Matrix decomposition
Privacy-preserving
security of data
Scalability
data privacy
collaboration
Data protection
Hybrid algorithm
Metrics
privacy
collaborative filtering
pubcrawl
Resiliency
Servers
Cloud Computing
biblio
Security and Trust Issues on Digital Supply Chain
Submitted by grigby1 on Thu, 03/12/2020 - 12:08pm
pubcrawl
Trusted Computing
trust problems
trust issues
Traceability
System performance
supply chains
supply chain security
supply chain management
security of data
security management
security
Scalability
Resiliency
resilience
Reliability
advanced information technologies
Pervasive Computing Security
Internet of Things
information technology
information science
Human behavior
History
exploratory investigation
digital supply chain system
digital supply chain management system
digital supply chain
composability
Cloud Computing
blockchain
Automated Response Actions
biblio
An Efficient SAT-Attack Algorithm Against Logic Encryption
Submitted by grigby1 on Tue, 01/07/2020 - 10:54am
information science
Superluminescent diodes
SAT-attack algorithm
SAT
Resiliency
resilience
pubcrawl
logic IP protection
Logic gates
logic encryption
integrated circuits
Benchmark testing
encryption
encrypted circuits
efficient encryption
decryption
cyber physical systems
Cyber Physical System
Cryptography
computability
composability
biblio
Multi End-Hopping Modeling and Optimization Using Cooperative Game
Submitted by grigby1 on Tue, 02/06/2018 - 2:04pm
MEH
computer network security
Control engineering
cooperative game
cyber-attack
DoS attack
game theory
hosts
information science
malicious scanning
Resiliency
moving target defense
MTD
multi end-hopping
Network reconnaissance
optimisation
optimization method
PCS
possible configurable space
pubcrawl
biblio
A Multi-Level Security Access Control Framework for Cross-Domain Networks
Submitted by grigby1 on Tue, 02/06/2018 - 1:54pm
Metrics
Ubiquitous Computing Security
target domain
simulation
secure interactions
Scalability
Resiliency
pubcrawl
Organizations
network domains
multilevel security protection
multilevel security access control framework
multilevel mapping method
Multi-Level Security
Access Control
mapping method
intradomains
inter-domain mapping
information science
Human Factors
Human behavior
hierarchical access control structures
Data protection
cross-domain networks
cross-domain
Conferences
Computational modeling
authorisation
biblio
"Auditing Protocols for Cloud Storage: A Survey"
Submitted by grigby1 on Thu, 02/23/2017 - 12:41pm
auditing protocol
Cloud Computing
cloud storage
Computational modeling
Data models
data privacy
information science
integrity
outsourcing
protocol auditing
Protocols
pubcrawl170105
Scalability
Secure
security
biblio
Quantifying cyber-resilience against resource-exhaustion attacks
Submitted by BrandonB on Tue, 05/05/2015 - 11:44am
Queueing analysis
stress-strain curve
Stress
Strain
simple queuing system
Servers
security of data
resource-exhaustion attacks
resilience
queuing theory
queueing theory
cyber security
networked queuing systems
Mechanical Engineering
material science
linguistic terms
Information systems
information sciences
information science
engineering terms
cyber-resilience quantification
cyber systems
profile
Mandi Gonzalez
CPS Domains
CPS Technologies
Education
Foundations
Science Policy
Research Program Overview
information science
unc-chapel hill
North Carolina
« first
‹ previous
1
2
3
4