Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Internet of Things
biblio
A Hardware-Software Codesign Approach to Identity, Trust, and Resilience for IoT/CPS at Scale
Submitted by aekwall on Mon, 09/28/2020 - 12:16pm
enhanced device identity
communication technologies
communication reliability
operational efficiency
hardware-software codesign
cyber physical systems
quality of services
Blockchain protocols
Byzantine actor
citizen welfare
distribution framework
Transmitters
entity trust
hardware-software codesign approach
IoT-CPS
multitier methodology
radio frequency-distinct native attributes
RF-DNA
RF-DNA Fingerprinting
system trustworthiness
trust-building
CPS Privacy
Wireless communication
computer network security
data privacy
Internet of Things
Cryptographic Protocols
Trusted Computing
Support vector machines
cyber-physical systems
Human behavior
pubcrawl
Communication system security
IoT
blockchain
internet
privacy
cryptocurrencies
quality of service
authentication
Human Factors
smart cities
Trust management
biblio
An Improved Communications in Cyber Physical System Architecture, Protocols and Applications
Submitted by aekwall on Mon, 09/28/2020 - 12:16pm
CPS infrastructure
middleware
sensors
Human Factors
Data Analytics
mobile devices
CPS
Wireless Sensor Network
WSN
cyber physical systems
communication infrastructure
computerized integration connectivity
cyber world
CPS middleware
Cyber Physical system architecture
energy efficient protocols
Machine Communication
man-made physical world
Mobile Sensor Information Agent
MSIA
quality of services
SDN-based CPS
software related mobile sensing paradigm
CPS Privacy
wireless sensor networks
Monitoring
Cloud Computing
Internet of Things
security
Protocols
Software
mobile computing
computer architecture
software defined networking
Human behavior
pubcrawl
computer network security
energy conservation
telecommunication power management
Decision Making
privacy
software-defined networking
mobile radio
cyber-physical systems
SDN
smart decision making
quality of service
biblio
Cognitive Cybersecurity for CPS-IoT Enabled Healthcare Ecosystems
Submitted by aekwall on Mon, 09/28/2020 - 12:16pm
innovative cognitive cybersecurity
health care
Healthcare
healthcare ecosystem
Human behavior
Human Behavior and Cybersecurity
human cognitive behaviour
Human Factors
human life
infrastructures
emerging cybersecurity
Internet of Things
machine learning
Medical services
privacy
Privacy Threats
pubcrawl
security of data
sophisticated attack methods
computer security
Adaptation models
Artificial Intelligence
artificial intelligent
cognition
Cognitive cybersecurity
cognitive cybersecurity framework
cognitive methods
cognitive techniques
CPS Privacy
CPS-IoT
CPS-IoT enabled healthcare services
critical infrastructure systems
critical infrastructures
cyber physical systems
cyber-attacks
cybersecurity specialists
data privacy
biblio
Preserving Location Privacy in Cyber-Physical Systems
Submitted by aekwall on Mon, 09/28/2020 - 12:16pm
location obfuscation
vulnerabilities
user location information
trust
sensors
security
public adoption
public acceptance
pubcrawl
Proposals
privacy-preserving location service
privacy
mobile computing
Mix-zone
location-obfuscation
location privacy
CPS Privacy
location based services
IoT devices
IoT
Internet of Things
Human Factors
Human behavior
data privacy
cyber-physical systems
cyber physical systems
CPSS
CPS
context-awareness
Conferences
actuators
biblio
Taxonomy Analysis of Security Aspects in Cyber Physical Systems Applications
Submitted by aekwall on Mon, 09/28/2020 - 12:10pm
distributive nature
autonomous systems
CPS
security aspects
sensitive data
Intelligent systems
control methods
critical applications
cyber physical system applications
security issues
eHealth
innovative technologies
IoT related issues
taxonomy analysis
taxonomy based analysis
vehicular technologies
CPS Privacy
privacy
computer network security
Monitoring
data privacy
privacy concerns
Internet of Things
security
Human behavior
pubcrawl
security of data
cyber physical systems
Smart Grid
Smart Grids
sensors
Human Factors
industrial control
taxonomy
biblio
BlockSee: Blockchain for IoT Video Surveillance in Smart Cities
Submitted by aekwall on Mon, 09/28/2020 - 12:09pm
jointly provides validation
video surveillance
video frames
video cameras
urban environments
Urban areas
smart cities
pubcrawl
privacy issues
privacy
physical manipulations
observed scene
multiple video-flows
mechanical settings
malicious users
bitcoin
IoT video surveillance
Internet of Things
Human Factors
Human behavior
heterogeneous owners
distributed city-wide monitoring systems
data privacy
cyber physical systems
CPS Privacy
contracts
Cameras
camera settings
BlockSee
blockchain-based video surveillance system
biblio
Context-Aware Privacy Preservation in a Hierarchical Fog Computing System
Submitted by aekwall on Mon, 09/28/2020 - 12:02pm
quality of service
Computing Theory and Privacy
multiple fog node communication
hierarchical infrastructure
hierarchical fog computing system
FOG computing environment
dynamic MDP-based privacy-preserving model
decentralized infrastructure
context-aware privacy preservation
content-aware applications
zero-sum game
Ethernet
Privacy Threats
Topology
security of data
Redundancy
network topology
pubcrawl
Human behavior
Resiliency
real-time systems
game theory
Protocols
distributed processing
Internet of Things
data privacy
Scalability
biblio
Data Management Portfolio for Improvement of Privacy in Fog-to-cloud Computing Systems
Submitted by aekwall on Mon, 09/28/2020 - 12:01pm
edge devices
Computing Theory and Privacy
sample data models
privacy architecture
practical data model
Message Queuing Telemetry Transport
fog-to-cloud computing systems
fog architecture
DPPforF2C
data service model
Data Privacy for Fog-to-Cloud (DPPforF2C)
data portfolio
data management portfolio
Advanced Message Queuing Protocol
telemetry
queueing theory
IoT
fog nodes
data management
Data models
Fog computing
Data Transmission
middleware
Protocols
pubcrawl
Human behavior
Resiliency
Internet of Things
privacy concerns
data privacy
Scalability
Cloud Computing
biblio
IoT Trajectory Data Privacy Protection Based on Enhanced Mix-zone
Submitted by aekwall on Mon, 09/21/2020 - 3:50pm
privacy protection
Control Theory and Privacy
weighted undirected graph
user flow-based algorithm
traditional Mix-zone
Mix-zone
migration probability
IoT trajectory data privacy protection
enhanced Mix-zone
attack method
data sets
cyber physical systems
computer network security
cyber-physical systems
probability
privacy
graph theory
pubcrawl
Human behavior
Resiliency
information security
Internet of Things
data privacy
Scalability
biblio
Lightweight Node-level Malware Detection and Network-level Malware Confinement in IoT Networks
Submitted by aekwall on Mon, 09/21/2020 - 3:46pm
Correlation
confinement
runtime malware detection
real-time malware control strategies
network-level malware confinement
network functionality
Malware propogation
Malware propagation
Malware confinement
lightweight node-level malware detection
average network throughput
predictive control
IoT networks
cyber-physical systems
privacy
computer network security
malware detection
composability
pubcrawl
Resiliency
feature extraction
invasive software
performance evaluation
security
Runtime
malware
Internet of Things
network security
Detectors
« first
‹ previous
…
52
53
54
55
56
57
58
59
60
…
next ›
last »