Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Data processing
biblio
Auditable secure network overlays for multi-domain distributed applications
Submitted by grigby1 on Tue, 02/23/2021 - 1:23pm
actionable contracts
actors
auditable secure network overlays
auditing
communication fabric
composability
computer network security
contracts
Cryptography
Data collection
Data processing
data sharing
digital data market place infrastructure
internet
marketplace
Metrics
multidomain distributed applications
multidomain overlay network
network accountability
operational infrastructure
organisational boundaries
overlay network
overlay networks
Prototypes
pubcrawl
Public key
resilience
Resiliency
software stack
Virtual private networks
biblio
Big Data Security Frameworks Meet the Intelligent Transportation Systems Trust Challenges
Submitted by aekwall on Mon, 11/23/2020 - 10:27am
Scalability
authorization
Big Data
Internet of Things
Trusted Computing
computer architecture
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
authentication
Data processing
Logic gates
Compositionality
Traffic Management
Intelligent Transportation System
Intelligent Transportation Systems
big data technologies
reference architecture
Big Data security frameworks
business intelligence development
coherent reference architecture
ITS trust challenges
multitier ITS security framework
security approaches
Security Classification
sustainable adoption
Intelligent Data Security
Intelligent Data and Security
biblio
Cognitive Internet of Vehicles: Motivation, Layered Architecture and Security Issues
Submitted by aekwall on Mon, 10/19/2020 - 10:46am
security of data
Cloud Computing
data privacy
security
computer architecture
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
Metrics
internet
Data processing
Transportation
sensors
layered architecture
edge computing
next generation networks
Human Factors
security issues
security requirements
Artificial Intelligence
ubiquitous computing
privacy issues
vehicles
Internet of Vehicles
cyber physical systems
technological advancements
cyber-physical impact
automobile scenario
automotive
automotive ecosystem
CIoV
cloud-based artificial intelligence
Cognitive Internet of Vehicles
communication field
cutting-edge technologies
industrial revolution
industrial revolution 4.0
Intelligent Transportation System
Intelligent Transportation System concept
layer abstractions
local network
prime security
smart decision
technological evolution
ubiquitous 5G mobile network
biblio
An Adversarial Perturbation Approach Against CNN-based Soft Biometrics Detection
Submitted by aekwall on Mon, 10/12/2020 - 10:33am
security of data
Scalability
data privacy
learning (artificial intelligence)
Human behavior
pubcrawl
deep learning
privacy
Neural networks
convolutional neural nets
authentication
Data processing
biometrics (access control)
Human Factors
computer vision
Privacy Threats
Perturbation methods
sensitive information
authentication systems
adversarial perturbation approach
adversarial stickers
biometric approaches
biometric-based authentication systems
CNN-based soft biometrics detection
computer vision tasks
daily life consumer electronics
Gender
keystroke dynamics
subject ethnicity
unwanted soft biometrics-based identification
Expert Systems and Privacy
biblio
Edge AI and Blockchain for Privacy-Critical and Data-Sensitive Applications
Submitted by grigby1 on Fri, 08/07/2020 - 2:47pm
Logic gates
Internet of Things
feature extraction
Artificial Intelligence
IoT
blockchain
Distributed databases
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
data privacy
privacy
Medical services
Cloud Computing
edge computing
security vulnerabilities
network load
ethereum
Scalability
fog computing paradigms
AI
cloud servers
Data processing
data-sensitive applications
e-health
edge AI
edge artificial intelligence
Electrocardiography
Ethereum blockchain based architecture
Fall Detection
network architecture
privacy-critical systems
responsive systems
smarter systems
U-Health
Ubiquitous Health
biblio
Multiple Fault Diagnosis Methods Based on Multilevel Multi-Granularity PCA
Submitted by aekwall on Mon, 05/18/2020 - 9:47am
Correlation
Covariance matrices
cyber physical systems
Data models
Data processing
fault detection
fault diagnosis
Human Factors
linear correlation
Metrics
multi-granularity
multi-level
multilevel multigranularity PCA
multiple fault diagnosis
multiple fault diagnosis methods
multiple process variables
multivariate statistical analysis
principal component analysis
process fault diagnosis
process monitoring
production engineering computing
pubcrawl
Resiliency
traditional PCA fault diagnosis
biblio
Research on Industrial Internet of Things Security Architecture and Protection Strategy
Submitted by aekwall on Mon, 05/04/2020 - 10:14am
Intelligent Data and Security
Intelligent Data Security
Compositionality
Resiliency
Scalability
computer network security
cyber security threats
data acquisition
Data processing
industrial automation systems
Industrial IoT
industrial IoT information security protection technology
industrial IoT system
information security issues
intelligent environment detection
intelligent processing
intelligent transportation
Internet of Things
Internet of Things security architecture
IoT security
IoT systems
Network Security Architecture
network security threats
production engineering computing
protection strategy
Protocols
pubcrawl
security
security of data
security protection strategies
security strategy
security threats
Servers
biblio
Genoma: Distributed Provenance as a Service for IoT-based Systems
Submitted by aekwall on Mon, 03/30/2020 - 10:33am
IoT
Cloud Computing
Internet of Things
Data models
Resiliency
Human behavior
pubcrawl
composability
Metrics
bioinformatics
Provenance
data provenance
cloud
Substrates
data management
Data processing
data processing substrate
distributed IoT provenance
distributed provenance
edge
Genoma
genomics
IoT-based systems
Production facilities
provenance-as-a-service
biblio
A Novel Key-Value Based Real-Time Data Management Framework for Ship Integrated Power Cyber-Physical System
Submitted by grigby1 on Mon, 01/27/2020 - 11:27am
Big Data
Cyber Physical System
cyber-physical system
cyber-physical systems
data handling
Data models
Data processing
data-driven intelligence
delays
generation ship integrated power system
Human behavior
Human Factors
Integrated Power System
IPS
key-value data model
Key-value Store
marine engineering
Marine vehicles
Metrics
open source in-memory key-value store
power engineering computing
power system management
power systems
pubcrawl
Real-time Data Management
real-time data management prototype system
real-time data processing
real-time systems
relational data management
relational databases
resilience
Resiliency
Scalability
ship Big Data
ship integrated power cyber-physical system
ship integrated power cyber-physics system
ships
storage management
biblio
The Method of Raising Numbers, Represented in the System of Residual Classes to an Arbitrary Power of a Natural Number
Submitted by aekwall on Mon, 01/20/2020 - 10:48am
addition
arbitrary power
arithmetic operations
artificial redundancy
Complexity theory
computer systems
computer systems and components
Conferences
data compression
Data processing
digital arithmetic
exponentiation
integer arithmetic operations
Mathematical model
multiplication
natural number
natural redundancy
negative number
no-fault operations
number theory
positive number
pubcrawl
Redundancy
residual class system
residual classes
Resiliency
Scalability
subtraction
Task Analysis
1
2
3
next ›
last »