Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Fog computing
biblio
Data Management Portfolio for Improvement of Privacy in Fog-to-cloud Computing Systems
Submitted by aekwall on Mon, 09/28/2020 - 12:01pm
edge devices
Computing Theory and Privacy
sample data models
privacy architecture
practical data model
Message Queuing Telemetry Transport
fog-to-cloud computing systems
fog architecture
DPPforF2C
data service model
Data Privacy for Fog-to-Cloud (DPPforF2C)
data portfolio
data management portfolio
Advanced Message Queuing Protocol
telemetry
queueing theory
IoT
fog nodes
data management
Data models
Fog computing
Data Transmission
middleware
Protocols
pubcrawl
Human behavior
Resiliency
Internet of Things
privacy concerns
data privacy
Scalability
Cloud Computing
biblio
Trajectory Protection Scheme Based on Fog Computing and K-anonymity in IoT
Submitted by grigby1 on Thu, 08/13/2020 - 5:33pm
maximum entropy methods
probability
anonymity
Trajectory
k-anonymity
cloud computing technology
k-anonymity-based dummy generation algorithms
location based services
location-based services
maximum entropy
Metrics
offline trajectory data protection
offline trajectory protection
online trajectory protection
real-time trajectory privacy protection
time-dependent query probability
trajectory protection
trajectory protection scheme
trajectory publication
transition probability
Cloud Computing
security of data
Servers
IoT
pubcrawl
Human behavior
resilience
Resiliency
security
privacy
Internet of Things
Computational modeling
Entropy
composability
mobile computing
edge computing
Fog computing
Data protection
Security analysis
biblio
Agent Based Fog Architecture using NDN and Trust Management for IoT
Submitted by grigby1 on Fri, 05/29/2020 - 3:53pm
robust system
IoT generation
multi-agent systems
Named Data Network Security
Named Data Network(NDN)
NDN
present-day network infrastructure
pubcrawl
resilience
Resiliency
IoT devices
Scalability
secured named data network protocol
secured system
security
Servers
service-oriented architecture
traffic usage reduction
Trust management
drastic rate
agent based composition model
agent society
caching layer
Cloud Computing
Computational modeling
computer architecture
computer network security
Data models
Agent Based Communication
edge computing
fog architecture
fog based agent model
Fog computing
fog layer
Human behavior
Internet of Things
Internet of Things (IoT)
biblio
Performance Modeling and Assessment of Unified Video Surveillance System Based on Ubiquitous SG-eIoT
Submitted by aekwall on Mon, 04/13/2020 - 10:27am
Fog computing
video terminals
unified video surveillance system
ubiquitous SG-eIoT
service latency parameters
service latency
Performance modeling
network load
electric Internet of Things(eIoT)
edge eIoT agent
video surveillance
Streaming media
Cloud Computing
Logic gates
Cameras
video signal processing
edge computing
delays
Metrics
pubcrawl
Human behavior
Resiliency
power aware computing
Internet of Things
biblio
Process Provenance-based Trust Management in Collaborative Fog Environment
Submitted by aekwall on Mon, 03/30/2020 - 11:33am
Cloud Computing
Servers
History
Resiliency
Human behavior
pubcrawl
composability
Metrics
Reliability
trust
collaboration
edge computing
Fog computing
Provenance
collaborative
process provenance
biblio
Binarized Multi-Factor Cognitive Detection of Bio-Modality Spoofing in Fog Based Medical Cyber-Physical System
Submitted by aekwall on Mon, 02/10/2020 - 12:04pm
heavy-weight detection mechanisms
bio-modality detection sensors
bio-modality detection systems
bio-modality spoofing
Biomedical imaging
Feature Selection
fingerprint identification
fog based architectures
fog node
fog-based security application
binarized multifactor cognitive detection
image synthesis
Iris recognition
MCPS
resource-constrained sensors
secure user authentication
Sensor management
spoofing bio-identifiable property
spoofing detection
cyber-physical systems
telecommunication security
computer architecture
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
wireless sensor networks
Metrics
authentication
security of data
sensors
biometrics (access control)
Human Factors
face recognition
Fog computing
Ensemble Learning
medical cyber-physical systems
multifactor authentication
biblio
Addressing Privacy and Security in Connected Health with Fog Computing | Proceedings of the 5th EAI International Conference on Smart Objects and Technologies for Social Good
Submitted by grigby1 on Tue, 01/21/2020 - 11:39am
Fog computing
pubcrawl
resilience
Resiliency
Scalability
security
biblio
Using Machine Learning for Handover Optimization in Vehicular Fog Computing
Submitted by grigby1 on Tue, 01/21/2020 - 11:39am
Fog computing
fog request distribution
handover optimization
Neural networks
pubcrawl
resilience
Resiliency
Scalability
security
vehicular networks
biblio
Research on Security Protection Technology System of Power Internet of Things
Submitted by grigby1 on Tue, 01/21/2020 - 11:39am
real-time security monitoring
power grid transmission
power grids
power Internet of Things
Power system protection
power system security
privacy protection
production links
Protocols
pubcrawl
power engineering computing
resilience
Resiliency
Scalability
security
security monitoring
security protection technology system
sensor security
sensors
terminal identity authentication
edge area autonomy
application security risks
authentication
authority control
Cloud Computing
computer architecture
computer network management
computer network security
data communication
data transmission protection
application layer cloud fog security management
edge computing
fog calculation
Fog computing
Human behavior
internet
Internet of Things
Metrics
network security
Network Security Architecture
biblio
Fog-Based Secure Communications for Low-Power IoT Devices
Submitted by grigby1 on Tue, 01/21/2020 - 11:39am
authorization
confidentiality
encryption
Fog computing
Internet-of-Things
Proxy re-encryption
pubcrawl
Publish/Subscribe
resilience
Resiliency
Scalability
secure communications
security
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »