Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
internet
biblio
A Novel Personalized Recommendation Algorithm Based on Trust Relevancy Degree
Submitted by aekwall on Mon, 11/23/2020 - 10:39am
Trusted Computing
pubcrawl
collaborative filtering
Social network services
social networking (online)
internet
Prediction algorithms
Training
Filtering
Data mining
trust
collaboration
data science
data sparsity
recommender systems
electronic commerce
Matrix decomposition
Human behavior
human trust
Dianping datasets
ecommerce
matrix factorization
novel personalized recommendation algorithm
personal characteristics
personalized recommendation
personalized recommendation technology
social network information
Social trust
trust relevancy degree
biblio
An Approach for End-to-End (E2E) Security of 5G Applications
Submitted by aekwall on Mon, 11/23/2020 - 10:23am
computer network security
Scalability
Servers
attack surface
Cryptographic Protocols
Protocols
Resiliency
pubcrawl
internet
authentication
message authentication
5G mobile communication
security threats
Elliptic curve cryptography
security operations
heterogeneous environment
Compositionality
Three-dimensional displays
confidentiality
communication complexity
computation complexity
Resistance
key management
3D PAKE protocol
5G Applications
5G protocols
attack resistance rate
dependable security mechanism
differentiated security
diffie hellman key exchange
E2E
End to End Security analysis
End-to-End data protection
end-to-end security
flexible security mechanism
heterogeneous networked society
industrial vision
Internet Security Protocols
key business driver
manifold applications
networking paradigms
next-generation mobile technology
security defensive rate
Tetrahedron property analysis
Intelligent Data Security
Intelligent Data and Security
biblio
Web server security evaluation method based on multi-source data
Submitted by aekwall on Mon, 11/23/2020 - 10:23am
Safety
security of data
IP networks
Scalability
Servers
security
Data models
Resiliency
pubcrawl
internet
web services
information processing
analytic hierarchy process
Compositionality
XML
data sources
evaluation indicators
host security threat assessment values
multi-source data
multisource data
single data source
web security assessments
web security evaluation
web security evaluation model
web server security evaluation method
Intelligent Data Security
Intelligent Data and Security
biblio
Design of Intelligent Home Security Monitoring System Based on Android
Submitted by aekwall on Mon, 11/23/2020 - 10:22am
security
Scalability
Internet of Things
embedded systems
Linux
Resiliency
pubcrawl
neural nets
Neurons
internet
telecommunication network routing
condition monitoring
microcontrollers
network nodes
computerised monitoring
Logic gates
control engineering computing
home computing
internetworking
Neural networks
Android (operating system)
Compositionality
Androids
Humanoid robots
carrier transmission on power lines
Water heating
embedded Linux
remote monitoring
Temperature distribution
intelligent devices
Android remote operation
domestic appliances
health status monitoring
intelligent electrical appliances
Intelligent home
intelligent home condition monitoring
intelligent home drivers development
intelligent home safety assessment
intelligent home security monitoring system
intelligent home-based remote monitoring system
Internet-based Internet-of-Things technology
MVP mode
MVP model
network congestion
network data model
Operational Data
Power Line Communication
power line communication network
routing nodes
S3C2440A microcontrollers
safety monitoring
system data
Intelligent Data Security
Intelligent Data and Security
biblio
HTTP security headers analysis of top one million websites
Submitted by grigby1 on Fri, 11/20/2020 - 1:15pm
tools
security of data
security
pubcrawl
policy-based governance
collaboration
internet
Protocols
Databases
World Wide Web
Web sites
HTTPs
websites
Uniform resource locators
transport protocols
X.509 Certificate
Alexa top one million list
Charge coupled devices
content security policy
content-security-policy
HTTP headers
HTTP response headers analysis
HTTP security headers analysis
HTTP strict transport security
HTTP/2
HTTPS requests
hypermedia
redirections
referrer-policy
server
set-cookie
strict- transport-security
top one million websites survey
web security
web security policies
www subdomain
X-content-type
X-frame-options
X-XSS-protection
Security Policies Analysis
biblio
A Secure and Efficient Renewable Energy Trading Scheme Based on Blockchain in Smart Grid
Submitted by grigby1 on Fri, 11/20/2020 - 1:05pm
Cryptography
privacy
security
blockchain
Distributed databases
pubcrawl
Human behavior
Metrics
policy-based governance
collaboration
resilience
Resiliency
Indexes
data privacy
Scalability
internet
Computational modeling
distributed power generation
power engineering computing
power system security
Smart Grid
smart power grids
composability
green computing
Smart Grids
Security analysis
power system interconnection
renewable energy sources
power markets
credibility-based equity proof mechanism
distributed energy sources
Distributed energy trading
distributed energy trading schemes
efficient energy renewable trading scheme
electricity market trading model
energy internet
Energy storage
Energy systems
energy trading market
privacy protection
secure energy renewable trading scheme
smart grid consumer privacy
biblio
Enhancing Internet of Battle Things using Ultrasonic assisted Non-Destructive Testing (Technical solution)
Submitted by grigby1 on Tue, 11/17/2020 - 2:00pm
Acoustics
computer architecture
defence industry
embedded systems
embedded technology
Human Factors
information technology
Inspection
Intelligent sensors
internet
Internet of Battle of Things
Internet of Military of Things
Internet of Things
iobt
IoBT NDT and Machine Intelligence
IoMT
machine intelligence
materials defect analysis
military computing
military equipment
network technology
Probes
pubcrawl
resilience
Resiliency
Scalability
smart things
testing
ultrasonic based nondestructive testing
ultrasonic materials testing
ultrasonic waves
biblio
Game theoretic modeling of cyber deception in the Internet of Battlefield Things
Submitted by grigby1 on Tue, 11/17/2020 - 1:59pm
battlefield services
command and control
command and control systems
Computational modeling
cyber deception
cyberattack
game theoretic modeling
game theory
Games
Human Factors
information technology
internet
Internet of battlefield things
Internet of Things
iobt
IoBT control
IoBT systems
Monitoring
pubcrawl
Reconnaissance
resilience
Resiliency
Scalability
security counter measure
security of data
biblio
A Dynamic Transport Overlay System for Mission-Oriented Dispersed Computing Over IoBT
Submitted by grigby1 on Tue, 11/17/2020 - 1:50pm
application traffic
dispersed computing
dispersed computing applications
dynamic overlay system
dynamic path optimization
dynamic transport overlay system
Human Factors
internet
Internet of battlefield things
Internet of Things
iobt
IP networks
mission-oriented dispersed computing
Nebula's overlay system
Network Backhaul Layered Architecture system
network computation points
network discovery
networking conditions
NRL CORE network emulator
online learning
overlay
overlay tunnels
Path optimization
planner
protocol synthesis
pubcrawl
QoS monitoring
quality of service
Scalability
Software Architecture
telecommunication traffic
transport protocols
transport service needs
tunnel transport protocol optimization
tunnels
biblio
2019 IEEE International Conference on Industrial Internet (ICII)
Submitted by grigby1 on Tue, 11/17/2020 - 1:49pm
blockchain
blockchain enabled IoBT scenarios
communication resources
Computational modeling
Cryptography
Decentralized Consensus
drones
FastChain simulator
Heuristic algorithms
Human Factors
internet
Internet of battlefield things
Internet of Things
Internet-of-Battlefield-Things
iobt
IoBT devices
lightweight blockchain
military applications
military communication
military computing
Mission critical systems
mission-critical IoBT environment
networked battlefield scenario
NS-3 Simulation
pubcrawl
Scalability
Sharding
sharding approach
visualization
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »