Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Policy
biblio
An improved differential privacy algorithm to protect re-identification of data
Submitted by grigby1 on Wed, 01/10/2018 - 11:38am
Human behavior
ε-differential privacy
two-layer privacy
sanitized data
Resiliency
re-identification risk
Publishing
pubcrawl
privacy
Policy
Partitioning algorithms
mining trends
Medical services
machine learning algorithms
improved differential privacy algorithm
Human Factors
Algorithm design and analysis
healthcare organizations
decision-making systems
data sharing
data set
data sanitization algorithm
Data Sanitization
data repositories
data privacy
Data mining
data donors
data custodians
customer service
credible information
Compositionality
collaboration
biblio
SAFE and Secure: Deeply Integrating Security in a New Hazard Analysis
Submitted by grigby1 on Wed, 01/10/2018 - 11:20am
collaboration
Component-Based Systems
composability
hazard analysis
Human behavior
human factor
information theoretic security
Metrics
Policy
pubcrawl
Resiliency
Scalability
security
System Theoretic Process Analysis
Systematic Analysis of Faults and Errors
biblio
PHY-layer Security is No Alternative to Cryptography
Submitted by grigby1 on Wed, 01/10/2018 - 11:20am
collaboration
composability
Cross Layer Security
Cryptography
Human behavior
human factor
information theoretic security
Metrics
opinion
PHY-layer security
Policy
pubcrawl
Resiliency
Scalability
theoretical cryptography
biblio
Sensitive and Scalable Online Evaluation with Theoretical Guarantees
Submitted by grigby1 on Wed, 01/10/2018 - 11:20am
pubcrawl
Resiliency
Human behavior
composability
Scalability
information retrieval
Metrics
collaboration
human factor
multileaving
online evaluation
ranker evaluation
theoretical guarantees
information theoretic security
Policy
biblio
Secure Data Provenance for the Internet of Things
Submitted by grigby1 on Wed, 01/10/2018 - 11:20am
Networked Control Systems Security
collaboration
composability
data provenance
Human behavior
human factor
information theoretic security
IoT security
Metrics
Policy
pubcrawl
Resiliency
Scalability
theoretical cryptography
biblio
Strategic Aspects of Cyber Risk Information Sharing
Submitted by grigby1 on Wed, 01/10/2018 - 11:20am
collaboration
composability
cyber risk management
Human behavior
human factor
information theoretic security
Metrics
Policy
pubcrawl
Resiliency
Scalability
Security information sharing
biblio
Secure Group Information Exchange Scheme for Vehicular Ad Hoc Networks
Submitted by grigby1 on Wed, 01/10/2018 - 11:20am
collaboration
composability
Direction rotation alignment
Group information exchange
Human behavior
human factor
information theoretic security
Metrics
physical layer security
Policy
pubcrawl
Resiliency
Scalability
VANETs
biblio
Geometric group key-sharing scheme using euclidean distance
Submitted by grigby1 on Wed, 01/10/2018 - 11:20am
information theoretic security
wireless sensor networks
Wireless Sensor Network
sensor network
Scalability
Resiliency
pubcrawl
Policy
multicast communication
Metrics
Internet of Things
information-theoretic security
Broadcasting
human factor
Human behavior
group key sharing
geometric group key-sharing scheme
Euclidean distance
Elliptic curve cryptography
Cryptography
computational complexity
composability
collaboration
biblio
Interactive message transmission over adversarial wiretap channel II
Submitted by grigby1 on Wed, 01/10/2018 - 11:20am
Scalability
Policy
Protocols
pubcrawl
public key infrastructure
quantum computers
Random variables
Reliability
Resiliency
perfectly secure protocol family
security
telecommunication security
two-way wiretap II channel
Upper bound
wireless channels
wireless setting
Wyner wiretap II model
information theoretic security
adversarial noise
adversarial wiretap channel II
collaboration
composability
Conferences
Cryptographic Protocols
Human behavior
human factor
active adversary
interactive message transmission
interactive protocols
Jamming
jamming signal
Metrics
Mobile communication
perfect information theoretic security
biblio
Towards Information-Theoretic Security in Optical Networks
Submitted by grigby1 on Wed, 01/10/2018 - 11:20am
collaboration
composability
Human behavior
human factor
information theoretic security
Metrics
Policy
pubcrawl
Resiliency
Scalability
« first
‹ previous
…
11
12
13
14
15
16
17
18
19
…
next ›
last »