Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
data privacy
biblio
Flow Table Security in SDN: Adversarial Reconnaissance and Intelligent Attacks
Submitted by grigby1 on Tue, 02/23/2021 - 1:55pm
adversarial reconnaissance
attack parameters
cache inference
cache storage
caching flow rules
communication bottleneck
computer network security
computer networks
control systems
data privacy
denial of service attack
distributed processing
easy target
flow table security
Government
intelligent attacks
Interference
IP networks
Network reconnaissance
performance-driven design
power consumption
Probes
pubcrawl
Reconnaissance
resilience
Resiliency
Scalability
SDN architectures
security of data
security vulnerabilities
simplistic attack models
software defined networking
specific cache-like behaviors
Switches
target flow table
telecommunication security
underlying storage medium
biblio
Data Provenance Assurance for Cloud Storage Using Blockchain
Submitted by grigby1 on Tue, 02/23/2021 - 1:26pm
AWS S3
AWS S3 storage
blockchain network
Cloud Computing
cloud data object
cloud forensics
cloud infrastructures
cloud storage
cloud storage forensics
cloud-based data provenance
composability
confidential files
contracts
Cryptography
data accountability
data integrity
data privacy
data provenance assurance
Data Provenances
data record operations
Digital Forensics
Distributed databases
ethereum
Ethereum blockchain
Forensics
IPFS
metadata
Metrics
network accountability
privacy
pubcrawl
resilience
Resiliency
SLA-violations
storage management
storage privacy
biblio
Smart e-Health Security and Safety Monitoring with Machine Learning Services
Submitted by grigby1 on Tue, 02/23/2021 - 1:25pm
Accountability Solution
composability
Cryptography
data privacy
Distributed databases
e-health blockchains
EU-GDPR
health and safety
health care
Healthcare
HIPAA
HITECH
Intelligent Analytics
intelligent monitoring
Keywords- e-Health Blockchain
learning (artificial intelligence)
machine learning
machine learning services
medical information systems
Medical services
medical treatment process
Metrics
Monitoring
network accountability
patient monitoring
patient treatment
patient treatment medication safety issues
Privacy Requirements
Protocols
pubcrawl
regional regulations
resilience
Resiliency
Safety
safety monitoring
security monitoring
service providers
smart e-health security
transaction flows
trust health information environment
Trusted Computing
biblio
An Analysis of Pre-installed Android Software
Submitted by grigby1 on Tue, 02/23/2021 - 1:24pm
Android (operating system)
Android devices
Android ecosystem
Android OS
Android's open source model
Androids
composability
Computer crime
crowd-sourcing methods
data privacy
data-driven services
device manufacturers
device vendors
Ecosystems
Humanoid robots
internet
Libraries
Metrics
Microprogramming
mobile computing
mobile network operators
network accountability
open-source nature
potentially harmful behavior
potentially invasive private data collection practices
pre-installed Android software
pre-installed software
preinstalled apps
preinstalled software
privacy implications
product differentiation
pubcrawl
real-world Android firmware
resilience
Resiliency
security
sensitive data
smart phones
social network platforms
social networking (online)
Software
Supply Chain
tracking services
unwanted behavior
biblio
Self-organization of Network Communities via Blockchain Technology: Reputation Systems and Limits of Digital Democracy
Submitted by grigby1 on Tue, 02/23/2021 - 1:23pm
blockchain
blockchain technology
blockchain-based reputation system
blockchain-oracles
civil society
composability
data privacy
digital democracy
digital technologies
Economics
Games
Government
government control
government data processing
internet
Metrics
multi-agent systems
network accountability
network communities reputation
network members reputation
Oracle
organisational aspects
political institutionalization
politics
pubcrawl
public accountability
reputation assessment system
reputation system
reputation systems
resilience
Resiliency
security of data
self-organization
social networking (online)
tools
traditional reputation systems
virtual network communities
biblio
I/O Efficient Approximate Nearest Neighbour Search based on Learned Functions
Submitted by aekwall on Mon, 02/22/2021 - 12:46pm
data privacy
nearest neighbour methods
learning (artificial intelligence)
pubcrawl
neural nets
query processing
Measurement
Predictive Metrics
file organisation
search problems
nearest neighbor search
ANNS
approximate nearest neighbour search
data-sensitive hashing-based methods
data-sensitive indexing
external memory
external storage scenarios
function approximation
high dimensional space
I/O efficiency
indexing
input-output programs
learned functions
learned hashing
learned index structure
multimedia database
biblio
Sparser: Secure Nearest Neighbor Search with Space-filling Curves
Submitted by aekwall on Mon, 02/22/2021 - 12:45pm
Cryptography
encrypted data
data privacy
nearest neighbour methods
pubcrawl
query processing
Measurement
Curve fitting
Predictive Metrics
approximation theory
space-filling curves
nearest neighbor search
order-preserving encryption
approximate nearest neighbor search solution
approximate nearest neighbors
logarithmic time
nearest neighbor queries
perturbation
secure nearest neighbor search
Space-filling curve
space-filling perturbation
Sparser pre-processes plaintext data
strengthening privacy
biblio
Fast and Secure kNN Query Processing in Cloud Computing
Submitted by aekwall on Mon, 02/22/2021 - 12:44pm
Cloud Computing
Cryptography
encrypted data
data privacy
Protocols
nearest neighbour methods
pubcrawl
query processing
data structures
Measurement
Indexes
Predictive Metrics
location-based services
location based services
nearest neighbor search
RBF
Geospatial analysis
commercial public clouds
data structure
fast and secure kNN query processing
fast location-based query
FSkNN
geospatial data storage
LSPs
process location-based queries
random Bloom filter
secure index
secure location-based query
secure range query protocol
tracking technology
untrusted cloud
biblio
Enhanced Privacy and Data Protection using Natural Language Processing and Artificial Intelligence
Submitted by aekwall on Mon, 02/22/2021 - 12:39pm
Artificial Intelligence
artificial intelligence systems
artificial intelligence training
data obfuscation procedures
data privacy
Data protection
digital documents
Human behavior
knowledge transfer
machine learning
Medical services
natural language processing
physical documents
privacy
privacy preservation
pubcrawl
Resiliency
Scalability
Sensitive Data Extraction
sensitive information
specific-domain knowledge data sets
Task Analysis
text analysis
unlabeled domain-specific documents corpora
unsupervised machine learning
biblio
Fusion of Named Data Networking and Blockchain for Resilient Internet-of-Battlefield-Things
Submitted by aekwall on Mon, 02/22/2021 - 12:36pm
computer network security
Scalability
data privacy
Internet of Things
Resiliency
Human behavior
pubcrawl
internet
named data networking
NDN
storage resources
data exchange
electronic data interchange
blockchain technologies
Blockchain for IoBT
immutable trustworthy-distributed ledger feature
Internet-of-Battlefield-Things
iobt
IoBT environment
IoBT network
IoBT setting
named data network data-centric approach
NDN for IoBT
proof of common interest
resource-constrained nodes
1
2
3
4
5
6
7
8
9
…
next ›
last »