Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data quality
biblio
A Zero Trust Model Based Framework For Data Quality Assessment
Submitted by grigby1 on Fri, 12/02/2022 - 11:09am
Human behavior
zero trust
Trusted Data
scientific computing
Resiliency
resilience
pubcrawl
Organizations
Industries
Human Factors
Acoustic Fingerprints
Data quality dimensions
data quality assessment
data quality
Data models
data integrity
Costs
Computational modeling
composability
biblio
FairFed: Cross-Device Fair Federated Learning
Submitted by aekwall on Thu, 06/24/2021 - 11:51am
Training
AI Poisoning
Model Development
data quality
federated learning
fairness
deep learning
differential privacy
machine learning
Scalability
Neural networks
Sociology
outlier detection
pubcrawl
Human behavior
Resiliency
Protocols
performance evaluation
biblio
Automatic Error Correction Technology for the Same Field in the Same Kind of Power Equipment Account Data
Submitted by grigby1 on Wed, 05/05/2021 - 12:42pm
Human Factors
Technological innovation
Safe Coding
Resiliency
resilience
pubcrawl
Production
power systems
policy-based governance
Metrics
account data
Human behavior
Hardware
Gears
error correction
electrical power system
data quality
collaboration
Business
automatic error correction
biblio
What is the Value of Data Value in Practical Security Applications
Submitted by grigby1 on Tue, 04/27/2021 - 2:38pm
Big Data
data quality
data value
Metrics
privacy protection
pubcrawl
resilience
Resiliency
Scalability
security
Security Evaluation
biblio
Information-Centric Cyberattack Analysis and Spatiotemporal Networks Applied to Cyber-Physical Systems
Submitted by grigby1 on Fri, 04/09/2021 - 11:23am
resilience
information-centric cyberattack analysis
intelligence exploitation
internet
markov chain
Measurement
Metrics
networks
policy-based governance
pubcrawl
information security
Resiliency
Scalability
situational awareness
spatiotemporal dynamic graphs
spatiotemporal networks
Spatiotemporal phenomena
statistically-characterized dynamic graphs
system vulnerabilities
tools
cybersecurity capabilities
composability
computer network security
CPS
CPS resilience
cyber threat
cyber-physical systems
cyberattack
cyberattack resilience
Cybersecurity
collaboration
cybersecurity risks
data quality
Entropy
entropy-centric algorithm
graphs
Heuristic algorithms
Human behavior
Information Assurance
biblio
Provenance-based Classification Policy based on Encrypted Search
Submitted by aekwall on Mon, 03/22/2021 - 1:08pm
Predictive Metrics
Encrypted Search
encryption
encryption audits
Games
information retrieval
integrity data
keyword searching
Offline Guessing Attack
pattern classification
encrypted provenance
Privacy Third Party Auditing
provenance-based classification policy
pubcrawl
Public key
security
security protection
semantic security
sensitive information
storage management
cloud document classification
Human behavior
Metrics
Resiliency
composability
Access Control
Adaptation models
authorisation
Cloud Computing
cloud data
Provenance
cloud storage
Compositionality
Cryptography
data integrity
data quality
digital provenance
digital signatures
document category
document handling
biblio
A Blockchain Framework for Ensuring Data Quality in Multi-Organizational Clinical Trials
Submitted by aekwall on Mon, 11/16/2020 - 1:11pm
multi-site trial management
activity-specific private channels
channel-specific smart contracts
clinical trial
data management infrastructure
high-throughput transactions
human subject protection
Institutional Review Board amendments
IRB
data quality
multiorganizational clinical trials
multiple organizations
multisite clinical trials
outsourcing trial management
pharmaceutical companies
pharmaceutical industry
site monitoring
distributed ledger
Resiliency
pubcrawl
composability
Metrics
blockchain
organisational aspects
cryptocurrencies
Distributed databases
data privacy
medical information systems
outsourcing
contracts
smart contract
Outsourced Database Integrity
permissioned blockchain
blockchain network
biblio
AIS Transmission Data Quality: Identification of Attack Vectors
Submitted by grigby1 on Fri, 08/28/2020 - 12:02pm
security
obstacle avoidance
potential attack vectors
Protocols
pubcrawl
Receivers
resilience
Resiliency
Scalability
maritime sector
security of data
Signal resolution
standards
state agencies
timing
transmission data quality
Vectors
AIS
marine navigation
marine communication
legislation
Human behavior
governments
Europe
data quality
conceptual countermeasures
collision avoidance
Coast Guard
automatic identification system
Attack vectors
Artificial Intelligence
AIS networks
AIS data
biblio
Optimized Data de-Identification Using Multidimensional k-Anonymity
Submitted by aekwall on Mon, 04/20/2020 - 10:24am
data quality
privacy models and measurement
privacy protection mechanism
privacy preserving
privacy leak risk
priority weight-adjusted method
personal privacy
personal information
optimized multidimensional method
multidimensional k-anonymity
mean difference recommending tree method
MDR tree method
k-anonymity
information loss rate
globalized knowledge economy
de-identification
Big Data
data authenticity preservation
big data analysis
anonymization-based de-identification method
information loss
greedy algorithms
Big Data Analytics
Numerical models
data privacy
Measurement
data analysis
Data protection
Metrics
privacy
pubcrawl
Data models
biblio
Optimized Data de-Identification Using Multidimensional k-Anonymity
Submitted by aekwall on Mon, 04/20/2020 - 10:24am
data quality
privacy models and measurement
privacy protection mechanism
privacy preserving
privacy leak risk
priority weight-adjusted method
personal privacy
personal information
optimized multidimensional method
multidimensional k-anonymity
mean difference recommending tree method
MDR tree method
k-anonymity
information loss rate
globalized knowledge economy
de-identification
Big Data
data authenticity preservation
big data analysis
anonymization-based de-identification method
information loss
greedy algorithms
Big Data Analytics
Numerical models
data privacy
Measurement
data analysis
Data protection
Metrics
privacy
pubcrawl
Data models
1
2
3
next ›
last »