Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Business
biblio
A Distributed Interdomain Control System for Information-Centric Content Delivery
Submitted by
aekwall
on Mon, 11/30/2020 - 11:02am
automobiles
IP networks
Resiliency
Human behavior
pubcrawl
composability
Routing
Metrics
internet
content management
Business
control systems
Scalability
consumers
data planes
in-network caching
Future Internet
policy governance
content delivery
content delivery paths
content sources
control content access
cost-efficient Internet-scale content delivery
CURLING supports efficient Internet-scale content delivery
CURLING system
current Internet
distributed interdomain control system
domain-level Internet subtopologies
dynamic alternative paths
efficient content delivery
facto platform
host-centric
Information-Centric content delivery
Information-Centric Networking (ICN)
information-centric networking paradigm
interdomain hop-by-hop content resolution mechanism
IP-based Internet
large-scale content distribution
manageability
network operators
network policies
Software-defined networking (SDN)
tight coupling
Internet-scale Computing Security
biblio
An Incentive Mechanism Using Shapley Value for Blockchain-Based Medical Data Sharing
Submitted by
aekwall
on Mon, 11/23/2020 - 10:28am
security of data
Scalability
data owners
Big Data
data privacy
security
game theory
Data models
learning (artificial intelligence)
Resiliency
pubcrawl
blockchain
Business
machine learning techniques
cryptocurrencies
Distributed databases
Predictive models
medical information systems
Compositionality
Incentive mechanism
Shapley value
diseases
Medical diagnostic imaging
blockchain-based medical data sharing
computational process
cooperation model
data miners
disease diagnosis
incentive schemes
medical data sharing
Shapley value revenue distribution
topological relationships
Intelligent Data Security
Intelligent Data and Security
biblio
Towards provably-secure performance locking
Submitted by
aekwall
on Mon, 11/09/2020 - 12:32pm
security of data
security
power aware computing
Resiliency
pubcrawl
composability
policy-based governance
Business
Integrated circuit modeling
multiprocessing systems
Clocks
Electronics packaging
Degradation
IP piracy
intellectual property piracy
boolean satisfiability (sat)
FabScalar
FabScalar microprocessor
functional locking
integrated circuit thwarts attacks
performance locking
provably-secure performance locking
biblio
Situation Awareness-Oriented Cybersecurity Education
Submitted by
grigby1
on Wed, 11/04/2020 - 12:59pm
big picture
Business
computer aided instruction
computer science education
computer security
cross-layer situation knowledge reference model
Curriculum development
cyber physical systems
cybersecurity education
cybersecurity profession
educational courses
isolation problem
Knowledge engineering
microscopic perspectives
mission-driven analytics
multiple-step attack
network security course
privacy
professional aspects
pubcrawl
security of data
Servers
Situation Awareness
teaching
teaching modules
biblio
Ontology-based Dynamic and Context-aware Security Assessment Automation for Critical Applications
Submitted by
aekwall
on Mon, 11/02/2020 - 1:46pm
application configurations
application security
automation
Business
context-aware security assessment automation
critical infrastructure
Dynamic Application Security Testing
Measurement
metrics testing
Metrics
Ontologies
ontologies (artificial intelligence)
Ontology
ontology-based dynamic security assessment automation
ontology-based security model
pubcrawl
quantifiable security assessment process
security aptitude
security assessment architecture
Security Metrics
security of data
security testing
standards
testing
tools
ubiquitous computing
virtualisation
Virtualization
biblio
A Demonstration of Privacy-Preserving Aggregate Queries for Optimal Location Selection
Submitted by
aekwall
on Mon, 10/26/2020 - 10:54am
sensitive data
privacy-preserving aggregate queries
privacy preserving solutions
partially homomorphic cryptosystem
optimal location selection
mobile operators
location-based queries
enormous extent
demonstration
collected location data
mobile phones
organization
Aggregates
location information
private data
Homomorphic encryption
Compositionality
service providers
Business
query processing
Metrics
privacy
pubcrawl
Human behavior
Resiliency
mobile computing
Protocols
Cryptographic Protocols
security
data privacy
encryption
Servers
vertical businesses
wireless services
Location Privacy in Wireless Networks
biblio
Linux Security: A Survey
Submitted by
aekwall
on Mon, 10/26/2020 - 10:46am
authorisation
malware
security
invasive software
Linux
Resiliency
pubcrawl
composability
Metrics
Business
password
microsoft windows
Predictive Metrics
firewall
antivirus
File
file permissions
firewall security
Linux security
Linux Operating System Security
biblio
Common Security Criteria for Vehicular Clouds and Internet of Vehicles Evaluation and Selection
Submitted by
aekwall
on Mon, 10/19/2020 - 10:45am
Business
Cloud Computing
cloud-based vehicular cloud
computer architecture
context-based analysis pattern
cyber physical systems
data exchange
data privacy
data transfer
encryption
Evaluation and Selection
Human behavior
Human Factors
intelligent transportation system stakeholders
Intelligent Transportation Systems
Internet of Things
Internet of Vehicles
IoT-based smart city
Memory
Metrics
pubcrawl
Resiliency
security criteria
security of data
security selection criteria
Vehicular cloud
biblio
Commercial Security Scanning: Point-on-Sale (POS) Vulnerability and Mitigation Techniques
Submitted by
aekwall
on Mon, 08/24/2020 - 11:46am
security of data
Servers
security
Resiliency
pubcrawl
composability
standards
Cybersecurity
Business
testing
cyber-attacks
Industries
security measures
wireless networks
financial data processing
Human Errors
cash flow
cloud-bases POS
commercial security scanning
confidential customer payment information
expense management
labor reporting
mitigation techniques
on-premise POS
Payment Card Industry Data Security Standard
Payment Card Industry Data Security Standard (PCI DSS)
PCI DSS
penetration attacks
Point of Sale (POS)
point-on-sale vulnerability
POS system
price adjustment
Sale systems
Autonomic Security
biblio
PRADA: Protecting Against DNN Model Stealing Attacks
Submitted by
aekwall
on Mon, 08/03/2020 - 9:38am
security of data
Scalability
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
Computational modeling
Metrics
neural nets
Neural networks
query processing
Business
Training
Mathematical model
Data mining
Predictive models
Deep Neural Network
application program interfaces
model extraction
Adversarial Machine Learning
API queries
confidentiality protection
DNN model extraction attacks
DNN model stealing attacks
machine learning applications
ML models
model extraction attacks
model stealing
nontargeted adversarial examples
PRADA
prediction accuracy
prediction API
prior model extraction attacks
stolen model
transferable adversarial examples
well-defined prediction APIs
Adversary Models
1
2
3
4
5
6
next ›
last »