Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
privacy
biblio
When Function Signature Recovery Meets Compiler Optimization
Submitted by grigby1 on Fri, 08/12/2022 - 2:10pm
security
pubcrawl
Resiliency
optimization
privacy
composability
Program processors
Metrics
Task Analysis
compiler security
biblio
A New Evolutionary Computation Framework for Privacy-Preserving Optimization
Submitted by grigby1 on Wed, 08/10/2022 - 2:46pm
Neural networks
Artificial Intelligence
pubcrawl
privacy
Cryptography
composability
Compositionality
evolutionary computation
computational intelligence
Linear programming
scheduling
Processor scheduling
privacy preserving optimization problem
rank-based cryptographic function
biblio
velink - A Blockchain-based Shared Mobility Platform for Private and Commercial Vehicles utilizing ERC-721 Tokens
Submitted by grigby1 on Thu, 08/04/2022 - 5:05pm
smart cities
trusted platform modules
Token
smart transportation
shared mobility
HSM
ERC-721
Space vehicles
smart contract
blockchain
Market research
ethereum
smart contracts
composability
privacy
Resiliency
resilience
pubcrawl
biblio
Protection Profile Bricks for Secure IoT Devices
Submitted by grigby1 on Thu, 08/04/2022 - 5:04pm
Internet of Things
security
Monitoring
pubcrawl
resilience
Resiliency
privacy
Object recognition
Communication system security
composability
Microprogramming
lighting
design for testability
trusted platform modules
biblio
Formal Synthesis of Filter Components for Use in Security-Enhancing Architectural Transformations
Submitted by grigby1 on Tue, 08/02/2022 - 4:20pm
Language theoretic security
Trustworthy Systems
tools
Systems architecture
Software algorithms
Software
Resiliency
resilience
pubcrawl
expert systems
Hardware
formal verification
formal synthesis
computer architecture
compiler security
Architecture modeling
privacy
biblio
Privacy Considerations for Risk-Based Authentication Systems
Submitted by grigby1 on Mon, 08/01/2022 - 2:45pm
security
IP networks
pubcrawl
Human behavior
Human Factors
authentication
privacy
data privacy
NIST
Browsers
password
usable security and privacy
two factor authentication
big data analysis
risk-based authentication
biblio
Secure Real-time Data Access Using Two-Factor Authentication Scheme for the Internet of Drones
Submitted by grigby1 on Mon, 08/01/2022 - 2:45pm
pubcrawl
Human behavior
Human Factors
security
authentication
privacy
internet
real-time systems
Resistance
Propagation losses
two-factor authentication
two factor authentication
Costs
UAVs
Internet of drones
Real-time information
biblio
The Influence of Mobile Operating Systems on User Security Behavior
Submitted by grigby1 on Fri, 07/29/2022 - 5:14pm
operating systems
User behavior
technology threat avoidance theory
Stakeholders
Resiliency
resilience
pubcrawl
privacy
Operating systems security
iOS Security
operating system
Mobile Security
ios
Cryptography
Conferences
appraisal
android
biblio
A Differentially Private Task Planning Framework for Spatial Crowdsourcing
Submitted by grigby1 on Fri, 07/29/2022 - 4:49pm
Metrics
outsourced database security
Task Planning
Spatial databases
spatial crowdsourcing
privacy preserving
crowdsourcing
differential privacy
Laplace equations
pubcrawl
Planning
privacy
Scalability
Conferences
Resiliency
resilience
Human behavior
biblio
A Private Statistic Query Scheme for Encrypted Electronic Medical Record System
Submitted by grigby1 on Fri, 07/29/2022 - 4:49pm
Access Control
outsourced database security
statistic query
data outsourcing
searchable encryption
differential privacy
Histograms
Metrics
Databases
pubcrawl
data privacy
Cryptography
privacy
Scalability
Conferences
Resiliency
resilience
Human behavior
« first
‹ previous
…
31
32
33
34
35
36
37
38
39
…
next ›
last »