Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data models
biblio
Toward Automated Threat Modeling of Edge Computing Systems
Submitted by grigby1 on Fri, 08/26/2022 - 10:58am
pubcrawl
Analytical models
Automated Threat Modeling
Computational modeling
Data models
Economics
edge computing security
Edge System Modeling
expert systems
Human behavior
Industries
resilience
Resiliency
Scalability
security
Systems modeling
biblio
Challenges and Opportunities in Performance Benchmarking of Service Mesh for the Edge
Submitted by grigby1 on Fri, 08/26/2022 - 10:49am
Complexity theory
Envoy
Microservice architectures
edge
Computing Theory
benchmark
Service Mesh
Kubernetes
Istio
Compositionality
pubcrawl
Kernel
Linux
Benchmark testing
composability
Data models
Throughput
Resiliency
resilience
biblio
Two-layer Coded Gradient Aggregation with Straggling Communication Links
Submitted by grigby1 on Fri, 08/26/2022 - 10:49am
Servers
pubcrawl
resilience
Resiliency
Data models
composability
encoding
Compositionality
Distributed databases
distributed learning
Computing Theory
Coding computing
computer aided instruction
distance learning
Downlink
straggling
biblio
Trusted Model Based on Multi-dimensional Attributes in Edge Computing
Submitted by grigby1 on Fri, 08/12/2022 - 2:24pm
composability
trusted model
multi-dimensional attributes
trust evaluation
Memory
Computing Theory
trust
reliability theory
edge computing
Internet of Things
Computational modeling
Data models
Resiliency
resilience
Human behavior
pubcrawl
Servers
Adaptation models
biblio
Trust based secure routing mechanisms for wireless sensor networks: A survey
Submitted by grigby1 on Wed, 08/10/2022 - 2:41pm
wireless sensor networks
Wireless Sensor Network
Trust Routing
Trust models
security
Secure Routing
Scalability
Routing protocols
Routing
Resiliency
resilience
pubcrawl
Data models
Computational modeling
composability
attack
biblio
Modeling and Verifying Ticket-Based Authentication Scheme for IoT Using CSP
Submitted by grigby1 on Tue, 08/02/2022 - 4:21pm
Analytical models
authentication
CSP
Data models
Data Security
Internet of Things
IoT
Mobile handsets
modeling
pubcrawl
resilience
Resiliency
security
System recovery
Trustworthy Systems
verification
biblio
AI-Assisted Risk Based Two Factor Authentication Method (AIA-RB-2FA)
Submitted by grigby1 on Mon, 08/01/2022 - 2:44pm
Predictive models
security
Monitoring
pubcrawl
Human behavior
Human Factors
authentication
Data models
Artificial Intelligence
usability
two-factor authentication
two factor authentication
risk-based authentication
biblio
A Differential Privacy Collaborative Deep Learning Algorithm in Pervasive Edge Computing Environment
Submitted by grigby1 on Fri, 07/15/2022 - 12:59pm
Human Factors
Training
Scalability
Resiliency
resilience
pubcrawl
pervasive edge computing
Pervasive Computing Security
Neural networks
Metrics
Stochastic Computing Security
Human behavior
Gaussian mechanism
differential privacy
deep learning
Data models
Computational modeling
collaborative deep learning
collaboration
biblio
Detecting group shilling attacks in recommender systems based on maximum dense subtensor mining
Submitted by grigby1 on Fri, 07/15/2022 - 12:22pm
feature extraction
pubcrawl
Human behavior
resilience
Resiliency
Conferences
Scalability
Data models
Time series analysis
recommender systems
Fuses
Knowledge engineering
tensors
group shilling attacks
dual-input convolutional neural network
maximum dense subtensor mining
biblio
Attacking Black-box Recommendations via Copying Cross-domain User Profiles
Submitted by grigby1 on Fri, 07/15/2022 - 12:22pm
deep learning
Neural networks
pubcrawl
Human behavior
resilience
Resiliency
Conferences
Scalability
Data models
adversarial attacks
recommender systems
Reinforcement learning
Data engineering
data poisoning attacks
black-box attacks
cross-domain
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
…
next ›
last »