Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data protection
biblio
Identification of State Registers of FSM Through Full Scan by Data Analytics
Submitted by grigby1 on Fri, 08/28/2020 - 2:55pm
industrial property
state transitions
state register identification
Silicon
Scalability
Resiliency
resilience
regression analysis
Registers
pubcrawl
Physical design
OpenCores
logic design
Intellectual Property Protection
Big Data
FSM state registers
FSM design
finite-state machine
finite state machines
electronic engineering computing
downstream design
Decision trees
Decision Tree
Data protection
Data mining
data analysis
big data security metrics
Big Data Analytics
biblio
Secure Pattern-Based Data Sensitivity Framework for Big Data in Healthcare
Submitted by grigby1 on Fri, 08/28/2020 - 2:34pm
resilience
big data security in the cloud
special big data analytics methods
Sensitivity
sensitive information protection
secure pattern-based data sensitivity framework
patient data
healthcare data
Hadoop distributed file system
Hadoop
Elliptic curves
electronic medical records
data frequency
big data technologies
Scalability
information retrieval
Cryptography
electronic health records
Metrics
parallel processing
Data protection
Big Data
health care
Medical services
Access Control
Resiliency
pubcrawl
Distributed databases
data analysis
security
learning (artificial intelligence)
encryption
biblio
Using Attribute-Based Encryption on IoT Devices with instant Key Revocation
Submitted by aekwall on Mon, 08/17/2020 - 10:42am
pubcrawl
sensor readings
sensor devices
resource constraint devices
Identity-based encryption
cryptographic cipher-texts
ABE cipher-texts
IoT services
Ciphers
Data protection
policy-based governance
Scalability
Human behavior
data encryption
IoT devices
Internet of Things
Conferences
attribute-based encryption
data privacy
encryption
Cryptography
authorisation
biblio
Trajectory Protection Scheme Based on Fog Computing and K-anonymity in IoT
Submitted by grigby1 on Thu, 08/13/2020 - 4:33pm
maximum entropy methods
probability
anonymity
Trajectory
k-anonymity
cloud computing technology
k-anonymity-based dummy generation algorithms
location based services
location-based services
maximum entropy
Metrics
offline trajectory data protection
offline trajectory protection
online trajectory protection
real-time trajectory privacy protection
time-dependent query probability
trajectory protection
trajectory protection scheme
trajectory publication
transition probability
Cloud Computing
security of data
Servers
IoT
pubcrawl
Human behavior
resilience
Resiliency
security
privacy
Internet of Things
Computational modeling
Entropy
composability
mobile computing
edge computing
Fog computing
Data protection
Security analysis
biblio
Trajectory Anonymity Based on Quadratic Anonymity
Submitted by grigby1 on Thu, 08/13/2020 - 4:33pm
adjacent anonymous area
trajectory anonymous algorithm
trajectory anonymity publishing
synchronous trajectory data
Synchronous trajectory
Sensitive region
quadratic anonymity
privacy information
original Regional anonymity
original location
Location mappings
location mapping
Location area division
K-anonymous
forged location
current sensitive region
Servers
k-anonymity
Trajectory
anonymity
Euclidean distance
Metrics
Perturbation methods
Data protection
computer science
composability
data privacy
privacy
Resiliency
resilience
Human behavior
pubcrawl
biblio
Test-Driven Anonymization for Artificial Intelligence
Submitted by grigby1 on Thu, 08/13/2020 - 4:07pm
anonymization efforts
artificial intelligence security
test-driven anonymization approach
Software Testing
regulatory requirements
Privacy Protections
nonfunctional quality
k-anonymity
internal requirements
Insurance
functional suitability
functional quality
classification AIs
artificial intelligence tools
anonymized data
anonymization techniques
tools
anonymization
AI context
artificial intelligence technique
testing
Data protection
pattern classification
Production
health care
data privacy
Data models
pubcrawl
Artificial Intelligence
Predictive models
security of data
biblio
Protecting Data in Android External Data Storage
Submitted by aekwall on Mon, 08/10/2020 - 9:32am
storage management
android encryption
secure Android data storage
proactive-control
Permission
malicious malware
external-storage
Android external storage vulnerability
Android external data storage
Metrics
Memory
Android (operating system)
Monitoring
smart phones
Vulnerability
Data protection
Computer hacking
pubcrawl
Human behavior
Resiliency
mobile computing
invasive software
encryption
Scalability
biblio
False Sense of Security: A Study on the Effectivity of Jailbreak Detection in Banking Apps
Submitted by grigby1 on Thu, 07/30/2020 - 1:32pm
operating system
iOS Security
Study
sensitive data protection
Mobile communication
Jailbreak Evasion
jailbreak detection
iOS App Store
banking transactions
banking app
Banking
ios
two-factor authentication
bank data processing
mobile devices
feature extraction
Trusted Computing
operating systems (computers)
Compositionality
Metrics
trusted environment
Kernel
Data protection
smart phones
mobile computing
authentication
message authentication
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
biblio
Situation Aware Intrusion Detection System Design for Industrial IoT Gateways
Submitted by grigby1 on Thu, 07/30/2020 - 1:15pm
Resiliency
internetworking
IoT platform providers
IoT security
Logic gates
Metrics
Peer-to-peer computing
production engineering computing
Protocols
pubcrawl
resilience
Internet of Things
resilient services
security
security attacks
security measures
security services
sensors
situation aware intrusion detection system design
standard IIoT gateways
system services
cyber-attacks
Cloud Computing
composability
Compositionality
computational intelligence
computer architecture
computer network security
constrained IIoT gateways
consumer IoT segment
cyber security threat
Cryptography
Data protection
edge node
enterprise attackers
Human behavior
Human Factors
IIoT world
industrial IoT domain
Industrial IoT Gateway
industrial IoT gateways
biblio
Simulation of Protected Industrial Control Systems Based on Reference Security Model using Weighted Oriented Graphs
Submitted by grigby1 on Fri, 07/24/2020 - 12:01pm
Mathematical model
weighted oriented graphs
system protection analysis
Software
Servers
security of data
security
reference security models
reference security model
pubcrawl
production engineering computing
open systems
modeling of protected systems
automated systems
integrated circuits
Information services
information resources
Industrial Control Systems
industrial control
graph theory
Data protection
Cyber Attacks
critical infrastructures
critical infrastructure facilities
Control Theory
control engineering computing
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »