Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
ubiquitous computing
biblio
Poltergeist: Acoustic Adversarial Machine Learning against Cameras and Computer Vision
Submitted by grigby1 on Tue, 05/10/2022 - 11:54am
pubcrawl
Metrics
resilience
Resiliency
Hardware
Scalability
Detectors
Cameras
Acoustics
computer vision
Human Factors
object detection
ubiquitous computing
Inertial sensors
biblio
Design of 5G-oriented Computing Framework for The Edge Agent Used in Power IoT
Submitted by grigby1 on Tue, 05/10/2022 - 11:53am
Communication system security
power IoT
edge agent
computing framework
5G terminal access
ubiquitous computing
Human Factors
edge computing
Wireless communication
security
5G mobile communication
Scalability
performance evaluation
Resiliency
resilience
Metrics
pubcrawl
Monitoring
biblio
Secure Ubiquitous Wireless Communication Solution for Power Distribution Internet of Things in Smart Grid
Submitted by grigby1 on Tue, 05/10/2022 - 11:53am
encryption
Human Factors
Internet of Things
Metrics
network topology
power distribution
pubcrawl
resilience
Resiliency
Scalability
secure protection
Smart Grid
Smart Grids
ubiquitous computing
Wireless communication
biblio
Adaptive Security Risk Mitigation in Edge Computing: Randomized Defense Meets Prospect Theory
Submitted by grigby1 on Tue, 05/10/2022 - 11:53am
prospect theory
wireless sensor networks
ubiquitous computing
Stochastic game
Scalability
risk mitigation
Resiliency
resilience
quality of service
pubcrawl
Stochastic Computing Security
privacy
performance evaluation
Metrics
Human Factors
Games
edge computing
Dynamic scheduling
data centers
adaptive security
biblio
Efficient Security Model for Pervasive Computing Using Multi-Layer Neural Network
Submitted by grigby1 on Tue, 05/10/2022 - 11:52am
Portable computers
visualization
user experience
ubiquitous computing(ubicomp)
ubiquitous computing
Training
Scalability
Resiliency
resilience
pubcrawl
Pervasive Computing Security
pervasive computing
Metrics
machine learning
Human Factors
efficient security model
Data models
Computational modeling
Artificial Intelligence
biblio
Deepfakes Creation and Detection Using Deep Learning
Submitted by grigby1 on Mon, 04/25/2022 - 3:28pm
natural language processing
ubiquitous computing
TensorFlow
security
Scalability
Resiliency
resilience
pubcrawl
privacy
Artificial Intelligence
Metrics
machine learning
Human Factors
Detectors
DeepFake
deep learning
computer vision
biblio
Security Analysis of Blockchain-based User Authentication for Smart Grid Edge Computing Infrastructure
Submitted by grigby1 on Tue, 03/22/2022 - 12:50pm
pubcrawl
user authentication
Smart Grids
smart grid security
Smart Grid
side-channel attacks
Scalability
Resiliency
resilience
ubiquitous computing
Protocols
Metrics
Internet of Things
edge computing
blockchain
authentication
security
biblio
A Security Approach to Build a Trustworthy Ubiquitous Learning System
Submitted by aekwall on Wed, 07/07/2021 - 3:48pm
authentication
authorization
BAN logic
context awareness
Gold
Human Factors
Learning systems
Metrics
pubcrawl
Public key
Resiliency
Scalability
Servers
Systems architecture
ubiquitous computing
Ubiquitous Computing Security
biblio
Peripheral View of IoT based Miniature Devices Security Paradigm
Submitted by aekwall on Wed, 07/07/2021 - 3:47pm
Regulations
Resiliency
Metrics
Scalability
pubcrawl
Ubiquitous Computing Security
Wireless communication
wearable computers
standardization
security
Miniature devices security
Big Data
encryption
ubiquitous computing
privacy
Human Factors
Hardware
biblio
Role of Ubiquitous Computing and Mobile WSN Technologies and Implementation
Submitted by aekwall on Wed, 07/07/2021 - 3:46pm
secure communication
Resiliency
Metrics
Scalability
pubcrawl
Ubiquitous Computing Security
ubiquitous computing
Smart Home
Smart City
security
Mobile wireless sensor networks
mobile ad hoc networks
military computing
Games
data privacy
wireless sensor networks
Human Factors
Monitoring
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »