Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Technology management
biblio
The privacy paradigm : An overview of privacy in Business Analytics and Big Data
Submitted by grigby1 on Mon, 12/28/2020 - 11:37am
Big Data
Technology management
privacy paradigm
GPDR
data mining technologies
dados
business analytics
analytics
big data privacy
Google
Data protection
Companies
privacy
information technology
data privacy
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
business data processing
Data mining
data analysis
biblio
Prevention of DoS Attacks by Detection of Multiple Malicious Nodes in VANETs
Submitted by grigby1 on Thu, 10/29/2020 - 10:23am
Roads
network throughput
packet delivery ratio
Packet detection
packet detection algorithm
packet loss ratio
pubcrawl
resilience
Resiliency
network availability
Safety
Safety messages
Technology management
VANET
VANETs
vehicle nodes
vehicular ad hoc networks
vehicular adhoc network
driver safety
automation
Compositionality
computer network security
critical information
Denial of Service attacks
detection algorithms
DoS attacks
DoS attacks prevention
manet attack prevention
irrelevant data
irrelevant packets
Jamming
malicious nodes
MANET Attack Detection
Metrics
multiple malicious nodes
biblio
Anatomization of Detection and Performance Measures Techniques for Flooding Attacks using Routing Protocols in MANETs
Submitted by grigby1 on Thu, 10/29/2020 - 10:23am
Technology management
MANET Attack Detection
security attack
portable hubs
performance measure techniques
Packet loss
network parameters
mobile hubs
mobile ad-hoc network
MANETSs
inactive attack
Dynamic attack
detection anatomization
decentralized validation
security
mobile computing
automation
mobile ad hoc networks
MANETs
Flooding Attacks
Compositionality
Routing protocols
Ad hoc networks
telecommunication security
Resiliency
resilience
Metrics
pubcrawl
biblio
Ten challenges for making automation a "team player" in joint human-agent activity
Submitted by Katie Dey on Mon, 09/09/2019 - 1:13pm
human-centered computing
Technology management
Teamwork
team working
team player
Systems engineering and theory
multi-agent systems
joint human-agent activity
joint activity
Interactions
intelligent agent
Humans
automation
human-agent activity
Human Machine Teaming
Human Factors
human computer interaction
HMT
Electric breakdown
Displays
delay
cognition
C3E 2019
automation components
Human Machine Teaming
Interactions
C3E 2019