Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Smart City
biblio
Towards A Transparent and Privacy-Preserving Healthcare Platform with Blockchain for Smart Cities
Submitted by grigby1 on Tue, 10/12/2021 - 2:54pm
blockchain
Companies
data privacy
healthcare data
Human behavior
Insurance
Insurance policy
Medical services
privacy
Privacy Policies
pubcrawl
Scalability
smart cities
Smart City
transparency
biblio
Innovative Predictive Model for Smart City Security Risk Assessment
Submitted by grigby1 on Tue, 10/12/2021 - 2:46pm
Predictive models
what “if” methodology
Smart City
smart cities
security
risk management
risk assessment
pubcrawl
predictive security metrics
Analytical models
predictive model
Prediction algorithms
Metrics
domino effect
Data models
consequences calculation
Big Data Analytics
biblio
LGMal: A Joint Framework Based on Local and Global Features for Malware Detection
Submitted by grigby1 on Tue, 09/21/2021 - 3:51pm
malware detection
static analysis
Smart City
smart cities
Semantics
Resiliency
resilience
pubcrawl
privacy
Metrics
convolutional neural network
Malware Analysis
malware
Human behavior
graph theory
graph convolutional networks
feature extraction
Data mining
convolutional neural networks
biblio
Role of Ubiquitous Computing and Mobile WSN Technologies and Implementation
Submitted by aekwall on Wed, 07/07/2021 - 4:46pm
secure communication
Resiliency
Metrics
Scalability
pubcrawl
Ubiquitous Computing Security
ubiquitous computing
Smart Home
Smart City
security
Mobile wireless sensor networks
mobile ad hoc networks
military computing
Games
data privacy
wireless sensor networks
Human Factors
Monitoring
biblio
Approach to Security Provision of Machine Vision for Unmanned Vehicles of “Smart City”
Submitted by grigby1 on Thu, 12/17/2020 - 2:01pm
pubcrawl
unmanned vehicles
unmanned vehicle hardware platforms
Smart City
smart cities
security provision
security
robotic complexes
robot vision
robot operating systems
Resiliency
resilience
remotely operated vehicles
contour analysis
policy-based governance
objects detection
object detection
Neural networks
neural nets
machine vision systems
learning (artificial intelligence)
information security systems
Human Factors
Human behavior
feature squeezing method
deep learning
biblio
Security Threats for Autonomous and Remotely Controlled Vehicles in Smart City
Submitted by grigby1 on Thu, 12/17/2020 - 1:55pm
policy-based governance
traffic engineering computing
threat
telerobotics
Smart City
smart cities
security of data
security graph
security context
security
robot operating systems
Resiliency
resilience
remotely operated vehicles
remotely controlled vehicles
pubcrawl
autonomous controlled vehicles
model
mobile robots
integrity property
integrity
Industrial Control Systems
industrial control
Human Factors
Human behavior
data integrity
cybersecurity threats
cyber
control system security
control engineering computing
AV system
autonomous vehicles
biblio
Blockchain-Based Internet of Vehicles (IoV): An Efficient Secure Ad Hoc Vehicular Networking Architecture
Submitted by aekwall on Mon, 10/19/2020 - 11:47am
connected vehicles
secured communication
secure ad hoc vehicular networking architecture
distribution cloud
distributed access control system
connected vehicle communication network
blockchain-based Internet of Vehicles
information sharing
network resources
Smart City
cyber physical systems
IoV
Internet of Vehicles
distributed control
telecommunication network reliability
security
Human Factors
blockchain technology
Intelligent sensors
Reliability
blockchain
Metrics
vehicular ad hoc networks
privacy
pubcrawl
Human behavior
Resiliency
telecommunication security
Internet of Things
telecommunication traffic
biblio
Cyber-Physical Interdependencies in Power Plant Systems: A Review of Cyber Security Risks
Submitted by grigby1 on Tue, 10/06/2020 - 1:50pm
research target
network topology
network-based models
power engineering computing
power generation
power plant systems
power plants
pubcrawl
Reliability
modern computing
Safety
Security Metrics
security of data
smart cities
Smart City
Smart Grid
system components
Topology
Cyber-physical attacks
Analytical models
communication direction
computational complexity
Computational modeling
Computing Theory
control parameters
critical infrastructure
cyber security risks
advanced communication technologies
cyber-physical interdependencies
cyber-physical systems
digital transformation process
graph theory
graph-based models
interdependent connections
Metrics
biblio
A Probability based Model for Big Data Security in Smart City
Submitted by grigby1 on Tue, 10/06/2020 - 1:41pm
security of data
IoT
organisational data
Organizations
personal data
probability
probability based model
pubcrawl
resilience
Resiliency
security
highly sensitive data
sensitive data sharing
smart applications
smart cities
Smart City
smart city critical data
smart city data
smart technologies
smart traffic management system
transport data
Trusted Computing
Data Leakage Detection
Big Data
big data security
bigraph
Computational modeling
Computing Theory
crisis response
critical data security
data analysis
Data Analytics
data leakage
Analytical models
Data models
data objects
data privacy
disaster resilience
economic data
emergency management
energy data
environment data
graph theory
Guilt Model
biblio
Modeling Cyber Security of Information Systems Smart City Based on the Theory of Games and Markov Processes
Submitted by aekwall on Mon, 07/06/2020 - 10:14am
Markov processes
Cyber Dependencies
town and country planning
smart city systems
likelihood of cyber threats
information systems smart city
information security circuits
cybernetic risk
Cyber Security Systems
Communication Systems
information technologies
Smart City
cyber threats
Compositionality
smart cities
security of data
Human Factors
Games
Information systems
probability
Mathematical model
Computer hacking
Metrics
Computational modeling
component
pubcrawl
Resiliency
cyber security
game theory
Scalability
« first
‹ previous
1
2
3
4
5
next ›
last »