Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
ubiquitous computing
biblio
Inference of Suspicious Co-Visitation and Co-Rating Behaviors and Abnormality Forensics for Recommender Systems
Submitted by grigby1 on Thu, 04/08/2021 - 5:10pm
Scalability
Metrics
personalized collaborative recommender systems
pervasiveness
pubcrawl
rating intention
real-world data
recommender system
recommender systems
resilience
Resiliency
Measurement
security of data
spotting anomalies
structure-based property
suspicious co-visitation behavior
suspicious nodes
suspicious ratings
time series
Time series analysis
ubiquitous computing
unified detection framework
Forensics
Anomaly Detection
association rules
Attack detection
co-rating behaviors
co-rating graphs
collaboration
Couplings
Data mining
e-commerce services
electronic commerce
abnormality forensics
forensics metrics including distribution
fundamental vulnerabilities
graph theory
historical ratings
Human behavior
inference
information forensics
malicious attack
malicious attack behaviors
malicious users
biblio
AI-driven Zero-touch Operations, Security and Trust in Multi-operator 5G Networks: a Conceptual Architecture
Submitted by grigby1 on Thu, 03/04/2021 - 3:05pm
Spectrum sharing
network services
Pervasive networking
policy-based governance
pubcrawl
QoS profiles
quality of service
resilience
Resiliency
Scalability
security
service lifecycle automation
multioperator 5G networks
telecommunication network management
telecommunication security
truly production-level stage
trust architecture
trust orchestration mechanisms
ubiquitous computing
Zero Touch Automation
zero trust
zero-touch automation
zero-touch security
computer architecture
Metrics
5G
5G initial visions
5G mobile communication
5G network solutions
AI-driven operations
Artificial Intelligence
automated end-to-end network operations
automation
cognitive network orchestration
Pervasive Computing Security
conceptual architecture
cross-domain security
distributed Artificial Intelligence
distributed ledger technologies
distributed security
Europe
highly pervasive network
Human Factors
minimal manual interventions
mobile computing
biblio
Contextually Aware Agile-Security in the Future of Systems Engineering
Submitted by grigby1 on Mon, 12/28/2020 - 12:47pm
Metrics
ubiquitous computing
systems engineering
social symbiosis
security of data
Scalability
Resiliency
resilience
pubcrawl
adaptive filtering
general systems engineering
FuSE
contextually aware agile-security
contextually aware adaptive system security
contextual-awareness
cohesion
Agile Security
biblio
BIAS: Bluetooth Impersonation AttackS
Submitted by grigby1 on Mon, 12/28/2020 - 12:27pm
attacks
wireless communication pervasive technology
slave impersonation attacks
secure connection establishment
secure authentication procedure
mandatory mutual authentication
impersonation
Bluetooth version
Bluetooth standard
Bluetooth Impersonation AttackS
Bluetooth devices
Bluetooth chips
BIAS attacks
authentication procedure
bluetooth security
wireless security
authorisation
mobile radio
ubiquitous computing
composability
standards
Protocols
Cryptography
authentication
performance evaluation
telecommunication security
Resiliency
resilience
Human behavior
pubcrawl
Bluetooth
biblio
LPA-SDP: A Lightweight Privacy-Aware Service Discovery Protocol for IoT Environments
Submitted by aekwall on Mon, 12/21/2020 - 1:27pm
service discovery
ubiquitous data access
resource-constrained environments
resource discovery protocols
resource directory
privacy consideration
manual discovery
LPA-SDT
LPA-SDP
lightweight privacy-aware service discovery protocol
IoT deployments
battlefields
Resiliency
IoT
CoAP
resource-constrained devices
IoT environments
ubiquitous computing
Healthcare
6LoWPAN
privacy
Protocols
composability
pubcrawl
Internet of Things
data privacy
biblio
Ontology-based Dynamic and Context-aware Security Assessment Automation for Critical Applications
Submitted by aekwall on Mon, 11/02/2020 - 2:46pm
ontology-based security model
Virtualization
virtualisation
ubiquitous computing
tools
testing
standards
security testing
security of data
Security Metrics
security assessment architecture
security aptitude
quantifiable security assessment process
pubcrawl
application configurations
ontology-based dynamic security assessment automation
Ontology
ontologies (artificial intelligence)
Ontologies
Metrics
metrics testing
Measurement
Dynamic Application Security Testing
critical infrastructure
context-aware security assessment automation
Business
automation
application security
biblio
Cognitive Internet of Vehicles: Motivation, Layered Architecture and Security Issues
Submitted by aekwall on Mon, 10/19/2020 - 11:46am
cutting-edge technologies
Internet of Vehicles
cyber physical systems
technological advancements
cyber-physical impact
automobile scenario
automotive
automotive ecosystem
CIoV
cloud-based artificial intelligence
Cognitive Internet of Vehicles
communication field
vehicles
industrial revolution
industrial revolution 4.0
Intelligent Transportation System
Intelligent Transportation System concept
layer abstractions
local network
prime security
smart decision
technological evolution
ubiquitous 5G mobile network
Transportation
Cloud Computing
data privacy
security
computer architecture
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
Metrics
internet
Data processing
security of data
sensors
layered architecture
edge computing
next generation networks
Human Factors
security issues
security requirements
Artificial Intelligence
ubiquitous computing
privacy issues
biblio
Resilience Enhancement through a Multi-agent Approach over Cyber-Physical Systems
Submitted by grigby1 on Tue, 10/06/2020 - 2:11pm
IPv6 test-bed
ubiquitous computing
tangible physical world
sensors
Resiliency
resilience enhancement
resilience
pubcrawl
physical disturbances
multiagent framework
multiagent approach
multi-agent systems
Monitoring
middleware
actuators
IP networks
information technology
information technologies
distributed devices
cyber-physical systems
cyber vulnerabilities
cyber space perspective
cyber physical systems
CPS resilience
control systems
computer architecture
communication platforms
biblio
Privacy-Preserving Data Collection in Context-Aware Applications
Submitted by aekwall on Mon, 09/28/2020 - 11:54am
ubiquitous computing
Computing Theory and Privacy
user data privacy preservation
three-antithetic-party game
serious privacy issues
privacy-preserving data collection scheme
privacy leakage risk
data collection game
context-awareness
Context-aware services
context-aware applications
smart devices
game model
security of data
Numerical models
Games
Data collection
privacy
pubcrawl
Human behavior
Resiliency
game theory
privacy concerns
data privacy
Scalability
biblio
Large Scale Mobile and Pervasive Augmented Reality Games
Submitted by grigby1 on Fri, 08/28/2020 - 12:32pm
quality management
multimedia data heterogeneity
network management
network middleware
pervasive augmented reality games
pervasive computing
pervasive entertainment
Pervasive networking
privacy
pubcrawl
multimedia computing
quality of service
resilience
Scalability
security
security of data
service management
telecommunication network management
telecommunication security
ubiquitous computing
entertainment
ad-hoc networking
augmented reality
computer games
consistency
Context-aware services
data distribution
Data replication
Data Security
Dynamic Configuration
Ad hoc networks
gaming
geospatial location
geospatial orientation
Hardware
Human behavior
Large-scale systems
middleware
mobile computing
mobile entertainment
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »