Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Privacy Threats
biblio
Methods of Deepfake Detection Based on Machine Learning
Submitted by grigby1 on Fri, 01/15/2021 - 11:01am
face recognition
Privacy Threats
fraudulence
face swapping indicators
face swapping algorithms
DeepFake video recognition
deepfake detection
Information integrity
faces
DeepFake
video signal processing
Videos
Gallium nitride
feature extraction
learning (artificial intelligence)
resilience
deep learning
Scalability
data privacy
Conferences
Resiliency
Metrics
Human Factors
Human behavior
pubcrawl
Neural networks
machine learning
biblio
An Adversarial Perturbation Approach Against CNN-based Soft Biometrics Detection
Submitted by aekwall on Mon, 10/12/2020 - 10:33am
Privacy Threats
Expert Systems and Privacy
unwanted soft biometrics-based identification
subject ethnicity
keystroke dynamics
Gender
daily life consumer electronics
computer vision tasks
CNN-based soft biometrics detection
biometric-based authentication systems
biometric approaches
adversarial stickers
adversarial perturbation approach
authentication systems
sensitive information
Perturbation methods
security of data
computer vision
Human Factors
biometrics (access control)
Data processing
authentication
convolutional neural nets
Neural networks
privacy
deep learning
pubcrawl
Human behavior
learning (artificial intelligence)
data privacy
Scalability
biblio
Cognitive Cybersecurity for CPS-IoT Enabled Healthcare Ecosystems
Submitted by aekwall on Mon, 09/28/2020 - 11:16am
innovative cognitive cybersecurity
health care
Healthcare
healthcare ecosystem
Human behavior
Human Behavior and Cybersecurity
human cognitive behaviour
Human Factors
human life
infrastructures
emerging cybersecurity
Internet of Things
machine learning
Medical services
privacy
Privacy Threats
pubcrawl
security of data
sophisticated attack methods
computer security
Adaptation models
Artificial Intelligence
artificial intelligent
cognition
Cognitive cybersecurity
cognitive cybersecurity framework
cognitive methods
cognitive techniques
CPS Privacy
CPS-IoT
CPS-IoT enabled healthcare services
critical infrastructure systems
critical infrastructures
cyber physical systems
cyber-attacks
cybersecurity specialists
data privacy
biblio
Context-Aware Privacy Preservation in a Hierarchical Fog Computing System
Submitted by aekwall on Mon, 09/28/2020 - 11:02am
quality of service
Computing Theory and Privacy
multiple fog node communication
hierarchical infrastructure
hierarchical fog computing system
FOG computing environment
dynamic MDP-based privacy-preserving model
decentralized infrastructure
context-aware privacy preservation
content-aware applications
zero-sum game
Ethernet
Privacy Threats
Topology
security of data
Redundancy
network topology
pubcrawl
Human behavior
Resiliency
real-time systems
game theory
Protocols
distributed processing
Internet of Things
data privacy
Scalability
biblio
Threat Extraction in IoT-Based Systems Focusing on Smart Cities
Submitted by aekwall on Mon, 07/06/2020 - 8:57am
smart cities
waste management
threat root causes
threat instances
threat extraction
smart city scenario
IoT-based system
IoT-based services
e-health system
distinct threat types
car parking
Smart City
complex systems
Privacy Threats
security
cryptology
medical information systems
Security analysis
threat extraction method
Metrics
policy-based governance
pubcrawl
Human behavior
Resiliency
Internet of Things
Scalability
computer network security
Threat Modeling
biblio
Adaptive Security and Privacy in Smart Grids: A Software Engineering Vision
Submitted by grigby1 on Mon, 03/09/2020 - 1:58pm
security requirements failures
pubcrawl
reconfiguring system controls
resilience
Resiliency
Runtime
Scalability
security
security and privacy
security requirements
Privacy Threats
security threats
Smart Grid
Smart Grid Privacy
Smart Grids
smart grids adaptive security
smart grids privacy
smart power grids
software engineering
software engineering vision
Human Factors
automating prevention
collaboration
composability
computer architecture
data privacy
energy producers
engineering adaptive security
failure analysis
Human behavior
Adaptive software
Metrics
Monitoring
NIST
policy-based governance
power engineering computing
power system security
privacy
privacy requirements failures
biblio
IoT Data Management and Lineage Traceability: A Blockchain-based Solution
Submitted by aekwall on Mon, 11/25/2019 - 1:12pm
Internet of Things
untrusted IoT devices
unauthorized access
Trusted Computing
smart contracts
Servers
security threats
pubcrawl
program diagnostics
Privacy Threats
privacy
open systems
lineage traceability
IoT data management
interoperability
Internet of Things (IoT)
Outsourced Database Integrity
fog nodes
edge clouds
Distributed databases
data provenance
data privacy
data management
data integrity
Cryptography
Cloud Computing
blockchain-based data management
blockchain
authorization
Resiliency
composability
Metrics
biblio
Performance Evaluation of the Policy Enforcement Fog Module for Protecting Privacy of IoT Data
Submitted by aekwall on Mon, 11/11/2019 - 10:47am
policy enforcement
active data bundles
cloud
data privacy-penalties
data sources
fog
fog computing infrastructure
local IoT applications
PEFM
active bundles
policy enforcement fog module
privacy controls
Privacy Threats
privacy violations
real-time IoT applications
self-protecting mechanism
sensitive IoT data protection
smart home proof-of-concept scenario
Human behavior
security of data
Cloud Computing
Scalability
data owners
data privacy
Internet of Things
performance evaluation
real-time systems
IoT
pubcrawl
privacy
edge computing
Smart Home
Privacy Policies
Privacy Policy
privacy protection
biblio
Privacy-preserving fog computing paradigm
Submitted by grigby1 on Fri, 10/26/2018 - 3:46pm
Privacy in Fog
Software Architecture
security of data
security assessment
security
Scalability
Resiliency
pubcrawl
privacy-preserving fog computing paradigm
Privacy Threats
Cloud Computing
privacy
IoT
Intelligent sensors
fog nodes
fog computing architecture
Fog computing
edge computing
data privacy
computer architecture