Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
user privacy protection
biblio
Assisting the Development of Secure Mobile Apps with Natural Language Processing
Submitted by aekwall on Mon, 05/18/2020 - 9:53am
Androids
data privacy
Human behavior
Humanoid robots
largest worldwide market share
mobile computing
mobile devices
Mobile Security
natural language processing
pubcrawl
rapid growth
recommender systems
Resiliency
Scalability
secure mobile apps development
tools
user privacy protection
biblio
User Privacy Protection for Cloud Computing Based Smart Grid
Submitted by grigby1 on Mon, 03/09/2020 - 1:58pm
chunk relationship confusion
Cloud Computing
collaboration
composability
Conferences
data chunk storage
data combination privacy
data insertion
data privacy
data searching
data security issue
electric system efficiency
electric system reliability
electric system safety
electrical safety
Human behavior
Human Factors
Metrics
policy-based governance
power engineering computing
power system reliability
power system security
privacy
privacy protection
pubcrawl
Reliability
resilience
Resiliency
Scalability
security
Smart Grid
smart grid communication system
Smart Grid Privacy
Smart Grids
smart meter system
smart meters
smart power grids
user privacy protection
biblio
An Empirical Study on the Data Security and Privacy Awareness to Use Health Care Wearable Devices
Submitted by aekwall on Mon, 02/17/2020 - 1:56pm
security of data
Scalability
Data Security
Resiliency
Human behavior
pubcrawl
privacy
Data protection
health care
user privacy protection
privacy protection
National security
medical data
psychology
health applications
health care wearable devices
medical market
multilayer medical resources
patient monitoring
personal health data
physical negative effects
privacy awareness
private businesses
psychological effects
security attitude
Security Awareness
security conduct
security knowledge
security practice
structural equation analysis
wearables security
biblio
A Novel Moving Target Defense Technique to Secure Communication Links in Software-Defined Networks
Submitted by aekwall on Mon, 09/09/2019 - 9:47am
computer network security
IP networks
Receivers
security
computer network management
Data models
Resiliency
pubcrawl
Routing
Data protection
software-defined networking
OpenFlow
Scalability
network management
Software-Defined Networks
moving target defense
centralized orientation
communication environment
communication links
Computer Network Attacks
computer networking
message transmission
moving target defense (MTD)
MTD model
MTD-based security model
network architecture
Network Control
network device
network intruders
novel moving target defense technique
SDN security model
secure communication
secure communication links
security solution
sensitive data leakages
Software-defined networking (SDN)
Switches
transmitted messages
user identities
user privacy protection
work-in-progress research
Predictive Metrics
biblio
Covert Communication Under Channel Uncertainty and Noise Uncertainty
Submitted by grigby1 on Thu, 09/05/2019 - 10:25am
average probability
average probability of detection error
Channel estimation
channel gain
channel uncertainty
Compositionality
covert channels
covert communication
covert throughput gain
covert throughput loss
Data protection
eavesdropper
error statistics
fading channels
Gain
low probability of detection communication
noise power
noise uncertainty
Probability density function
Rayleigh channels
Rayleigh fading channel
receive SNR
resilience
Scalability
Signal to noise ratio
signal transmission
telecommunication security
Throughput
uncertainty
user privacy protection
biblio
Investigating the Value of Privacy within the Internet of Things
Submitted by grigby1 on Wed, 09/05/2018 - 9:39am
Android (operating system)
Android operating system
Companies
Computing Theory
data privacy
Data protection
game theory
game-theoretic concept
Human behavior
human factor
Internet of Things
IoT devices
IoT transaction privacy
Mobile communication
mobile computing
operating systems
personal data exchange
personal information
phones
privacy
PrivacyGate
pubcrawl
resilience
Resiliency
Scalability
user privacy protection
biblio
Right to silence: Establishing map-based Silent Zones for participatory sensing
Submitted by BrandonB on Mon, 05/04/2015 - 1:16pm
ban zones
Buildings
cartography
Cities and towns
data privacy
dynamic map-based blinding out
embedded sensors
habitat density
k-anonymity
large-scale sensing systems
location data
map-based silent zones
Mobile communication
mobile computing
mobile devices
Mobile handsets
mobile phones
participatory sensing
performance evaluation
privacy
privacy level
security of data
sensors
user privacy protection
wireless sensor networks