Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data collection
biblio
Aggregating Crowd Wisdom via Blockchain: A Private, Correct, and Robust Realization
Submitted by grigby1 on Thu, 07/09/2020 - 1:58pm
Security Properties
Human behavior
Human Factors
mobile client
mobile computing
privacy
pubcrawl
public blockchain
resilience
Resiliency
Scalability
hardware-assisted transparent enclave
sensor-rich mobile devices
SGX-enabled server
smart contract
smart contracts
Task Analysis
third-party platform
transparent blockchain
trusted hardware
zero-knowledge proof
data confidentiality
blockchain
Compositionality
crowd wisdom
crowd wisdom aggregation
Crowdsensing
crowdsensing systems
Cryptography
data aggregation
Data collection
Aggregates
data deletion
data privacy
Data Sanitization
data sensing
decentralized blockchain technology
differential privacy
Distributed databases
ethereum
faulty data providers
biblio
Invited Paper: The Applications of Machine Learning in Privacy Notice and Choice
Submitted by grigby1 on Fri, 04/03/2020 - 12:34pm
Privacy Policies
World Wide Web
user interactions
taxonomy
privacy stakeholders
privacy notice
privacy landscape
privacy awareness
online privacy practices
General Data Protection Regulation
privacy
Companies
Scalability
data privacy
Human behavior
pubcrawl
machine learning
Data collection
learning (artificial intelligence)
biblio
Enhancing Cyber Situational Awareness for Cyber-Physical Systems through Digital Twins
Submitted by grigby1 on Mon, 02/17/2020 - 5:16pm
information security
visualization
Topology
situational awareness
security of data
security
Resiliency
resilience
pubcrawl
Monitoring
Metrics
composability
digital twins
Data collection
cyber-physical systems
cyber situational awareness framework
cyber situational awareness
cyber situation
cyber defense
Cyber Attacks
CPSS
biblio
Scalable and Configurable End-to-End Collection and Analysis of IoT Security Data : Towards End-to-End Security in IoT Systems
Submitted by grigby1 on Mon, 02/17/2020 - 5:05pm
scalable infrastructures
machine learning
modelling security data
Monitoring
Probes
pubcrawl
Scalability
scalable data collection infrastructure
scalable end-to-end collection
leverage machine learning
Scalable Security
security
security analytics
security data collection systems
security data modelling
security scalability
towards end-to-rnd security
deep learning techniques
complex IoT deployments
Compositionality
computer architecture
computer network security
configurable data collection infrastructure
configurable end-to-end collection
Data collection
data-driven IoT security
collecting processing security-related datasets
effective security analytics algorithms
Internet of Things
IoT platforms
IoT security
IoT security data
IoT systems
learning (artificial intelligence)
biblio
Wireless Sensor Networks Security: Case study
Submitted by aekwall on Mon, 02/17/2020 - 2:33pm
sensor security
wireless sensor networks security
sensor data detection
Sensor
network physical devices
live monitoring
data exchange
data
Network
power consumption
wireless
Elliptic curve cryptography
Data collection
IoT
secure communication
Metrics
wireless sensor networks
composability
pubcrawl
Human behavior
Resiliency
telecommunication security
Internet of Things
encryption
Cloud Computing
biblio
Machine Learning Based Insider Threat Modelling and Detection
Submitted by grigby1 on Tue, 01/21/2020 - 11:23am
machine learning
user-centered machine learning
security of data
security
Resiliency
resilience
pubcrawl
policy-based governance
Organizations
multiple data granularity levels
Metrics
malicious insider attacks
machine learning algorithms
Cyber-security
Logistics
learning (artificial intelligence)
insider threat modelling
insider threat detection system
insider threat
insider scenario specific results
Human behavior
feature extraction
Data collection
damaging threats
collaboration
biblio
Attribute Based Trust Evaluation for Secure RPL Protocol in IoT Environment
Submitted by aekwall on Mon, 01/13/2020 - 12:05pm
Resiliency
location based service authentication
Low-Power and Lossy Networks
Medical services
memory requirements
personal area networks
physical objects
Protocols
pubcrawl
Public key
location based service
Routing
Routing protocols
RPL
secure RPL Protocol
security
security attacks
smart health care system
Symmetric matrices
Data collection
6LoWPAN networks
ABTE
advanced automation technology
attribute based trust evaluation
authentication
composability
computer network reliability
computer network security
critical data transfer reliability
6LoWPAN
energy constraint networks
energy consumption
Internet of Things
IoT constrained environments
IPv6 Routing Protocol
LBS
lightweight LBS authentication
LL networks
biblio
Privacy at Scale: Local Differential Privacy in Practice
Submitted by aekwall on Mon, 01/06/2020 - 10:34am
Scalability
Resiliency
pubcrawl
composability
privacy
Data collection
differential privacy
local differential privacy
biblio
Towards a Conversational Agent for Remote Robot-Human Teaming
Submitted by aekwall on Mon, 12/16/2019 - 2:27pm
Oils
telerobotics
Task Analysis
Scalability
Robot control
remote robots
remote robot-human teaming
pubcrawl
Poles and towers
operator situation awareness
operator control
conversational agents
Metrics
human-robot interaction
Human behavior
Furhat robot
Data collection
conversational agent
conversation agents
control engineering computing
autonomous systems
biblio
Security Weaknesses and Attacks on the Internet of Things Applications
Submitted by aekwall on Mon, 08/26/2019 - 10:07am
privacy
wireless sensor networks
Smart homes
Smart Home
smart farm
smart car
smart campus
security weaknesses
security of data
security
resilience
pubcrawl
Protocols
Data collection
policy-based governance
objects information
Metrics
IoT environment
IoT devices
IoT attacks
IoT applications
Internet of Things applications
Internet of Things
internet
Human behavior
Healthcare
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »