Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
privacy
biblio
Alexa in Phishingland: Empirical Assessment of Susceptibility to Phishing Pretexting in Voice Assistant Environments
Submitted by grigby1 on Wed, 10/12/2022 - 2:38pm
Amazon Alexa
Conferences
Electronic mail
Human behavior
IoT security
Phishing
Phishing Susceptibility
privacy
pubcrawl
security
Virtual assistants
Voice assistant security
biblio
“X-Phish: Days of Future Past”‡: Adaptive & Privacy Preserving Phishing Detection
Submitted by grigby1 on Wed, 10/12/2022 - 2:36pm
Adaptation models
adaptive
collaborative learning
feature extraction
Human behavior
machine learning
network security
Organizations
Phishing
Phishing Detection
privacy
privacy preserving
pubcrawl
biblio
FLDDoS: DDoS Attack Detection Model based on Federated Learning
Submitted by grigby1 on Thu, 10/06/2022 - 3:20pm
resilience
Data Imbalance
Resiliency
DDoS Attack
Collaborative Work
denial-of-service attack
Named Data Network Security
Clustering algorithms
federated learning
deep learning
Computational modeling
data privacy
privacy
Scalability
Human Factors
Human behavior
pubcrawl
biblio
Investigating the Design Space for Name Confidentiality in Named Data Networking
Submitted by grigby1 on Thu, 10/06/2022 - 3:20pm
privacy
pubcrawl
Human behavior
Human Factors
Scalability
data privacy
named data networking
military communication
confidentiality
Semantics
resilience
Systematics
Named Data Network Security
TCPIP
Resiliency
biblio
FPTSA-SLP: A Fake Packet Time Slot Assignment-based Source Location Privacy Protection Scheme in Underwater Acoustic Sensor Networks
Submitted by grigby1 on Mon, 10/03/2022 - 12:48pm
wireless networks
time slot assignment
relay selection
Backtracking
Location Privacy in Wireless Networks
source location privacy
location privacy
Position measurement
underwater acoustic sensor networks
Interference
simulation
pubcrawl
Compositionality
Routing
composability
privacy
Safety
Resiliency
resilience
Metrics
Human behavior
biblio
A robust fixed path-based routing scheme for protecting the source location privacy in WSNs
Submitted by grigby1 on Mon, 10/03/2022 - 12:47pm
energy consumption
location privacy protection
fixed path
Backtracking
Location Privacy in Wireless Networks
location privacy
Degradation
surveillance
Routing Protocol
Wireless Sensor Network
wireless networks
pubcrawl
Compositionality
composability
Wireless communication
wireless sensor networks
privacy
Resiliency
resilience
Metrics
Human behavior
biblio
Energy Balancing and Source Node Privacy Protection in Event Monitoring Wireless Networks
Submitted by grigby1 on Mon, 10/03/2022 - 12:47pm
Routing
energy balance.
Location Privacy in Wireless Networks
source location privacy
location privacy
Position measurement
Routing Protocol
Wireless Sensor Network
wireless networks
Compositionality
Monitoring
composability
Protocols
privacy
Energy Efficiency
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Virtual Private Mobile Network with Multiple Gateways for B5G Location Privacy
Submitted by grigby1 on Mon, 10/03/2022 - 12:46pm
data privacy
Location Privacy. Routing. Virtual Private Mobile Network
Location Privacy in Wireless Networks
location privacy
Vehicular and wireless technologies
wireless networks
Compositionality
composability
Cellular networks
Logic gates
privacy
performance evaluation
Conferences
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Enhancing Source-Location Privacy in IoT Wireless Sensor Networks Routing
Submitted by grigby1 on Mon, 10/03/2022 - 12:46pm
Routing
Source Location Privavy
Costs
Location Privacy in Wireless Networks
location privacy
WSN
evaluation
wireless networks
energy consumption
Compositionality
component
encryption
composability
Wireless communication
wireless sensor networks
Protocols
privacy
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Location Based Privacy Protection Data Interference Method
Submitted by grigby1 on Mon, 10/03/2022 - 12:46pm
Compositionality
Data interference
Soft sensors
Location Privacy in Wireless Networks
location privacy
Phantoms
privacy protection
Publishing
wireless networks
energy consumption
pubcrawl
composability
wireless sensor networks
data privacy
privacy
Resiliency
resilience
Metrics
Human behavior
« first
‹ previous
…
25
26
27
28
29
30
31
32
33
…
next ›
last »