Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
internet
biblio
An Internet of Vehicles Intrusion Detection System Based on a Convolutional Neural Network
Submitted by
aekwall
on Mon, 10/19/2020 - 10:48am
automobiles
car network
computer network security
convolution
convolutional neural nets
convolutional neural network
convolutional neural network (CNN)
convolutional neural networks
Cryptography
cyber physical systems
feature extraction
Human behavior
Human Factors
IDS
information security
internet
Internet of Vehicle
Internet of Vehicles
Internet of Vehicles intrusion detection system
Intrusion Detection
Intrusion Detection System (IDS)
Kernel
low-powered embedded vehicle terminal
Metrics
network attacks
packet header analysis
pubcrawl
Resiliency
security issues
telecommunication traffic
vehicular ad hoc networks
wireless sensor networks
biblio
An Efficient Secured Routing Protocol for Software Defined Internet of Vehicles
Submitted by
aekwall
on Mon, 10/19/2020 - 10:48am
computer network security
Internet of Things
security
Software
software defined networking
Resiliency
Human behavior
pubcrawl
Routing protocols
Routing
telecommunication power management
vehicular ad hoc networks
Metrics
internet
attacks
network lifetime
delays
telecommunication network topology
Software Defined Networks
Human Factors
vehicular ad hoc network
Intelligent Transportation Systems
Internet of Vehicles
IoV
cyber physical systems
Routing Protocol
dynamic topology
central point coordination
Energy efficient secured routing protocol
intelligence secure routing
intelligent transport system
network intelligence
RBM
restricted Boltzmann algorithm
software defined Internet of Vehicles
vehicle dynamics
biblio
Cognitive Internet of Vehicles: Motivation, Layered Architecture and Security Issues
Submitted by
aekwall
on Mon, 10/19/2020 - 10:46am
security of data
Cloud Computing
data privacy
security
computer architecture
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
Metrics
internet
Data processing
Transportation
sensors
layered architecture
edge computing
next generation networks
Human Factors
security issues
security requirements
Artificial Intelligence
ubiquitous computing
privacy issues
vehicles
Internet of Vehicles
cyber physical systems
technological advancements
cyber-physical impact
automobile scenario
automotive
automotive ecosystem
CIoV
cloud-based artificial intelligence
Cognitive Internet of Vehicles
communication field
cutting-edge technologies
industrial revolution
industrial revolution 4.0
Intelligent Transportation System
Intelligent Transportation System concept
layer abstractions
local network
prime security
smart decision
technological evolution
ubiquitous 5G mobile network
biblio
A Decentralized Reputation Management System for Securing the Internet of Vehicles
Submitted by
aekwall
on Mon, 10/19/2020 - 10:45am
Acceleration
communication protocols
communication security
Computational modeling
computer network security
Cryptography
cryptography techniques
cyber physical systems
decentralized reputation
decentralized reputation management system
faulty vehicles
fully decentralized fashion
Human behavior
Human Factors
Industries
interconnected vehicular system
internet
Internet of Vehicles
Internet of Vehicles paradigm
IoV network
locally-perceived behavioral reputation parameters
malicious vehicles
Metrics
networking model
Peer-to-peer computing
Protocols
pubcrawl
reputation metrics
reputation system
reputation-based security approaches
Resiliency
road conditions
road safety
Roads
security
VANET environment
VANET Security
vehicular ad hoc networks
biblio
Industrial Control Intrusion Detection Model Based on S7 Protocol
Submitted by
grigby1
on Fri, 10/16/2020 - 10:32am
abnormal behavior detection
abnormal S7 protocol packet detection
Anomaly Detection
communication process
Companies
composite intrusion detection method
computer network security
deep analysis algorithm
Heuristic algorithms
ICs
industrial control
industrial control intrusion detection model
industrial control network security
industrial control system
Industrial Control Systems
internet
internet technology
Intrusion Detection
national Industrial 4.0 strategy
networked control systems
power systems
private industrial control protocols
production engineering computing
protocol analysis
protocol parsing technology
Protocols
pubcrawl
resilience
Resiliency
S7 data packet analysis
S7 protocol
Scalability
Siemens Company
static white list configuration complexity
static white list configuration portability
tradtonal protocol parsing technology
Unsupervised Learning
white list detection
white list self-learning
white list self-learning algorithm
biblio
Total e-Governance: Pros Cons
Submitted by
grigby1
on Fri, 10/16/2020 - 10:22am
Big Data
collaboration
computer security
Cybersecurity
data center
Databases
E-Governance
E-Government
economical turmoil
ERP
finance
good governance
Government
government data processing
information technology
internet
policy-based governance
political turmoil
politics
pubcrawl
resilience
Resiliency
security
biblio
E-Government Documents Authentication and Security by Utilizing Video Crypto-Steganography
Submitted by
grigby1
on Fri, 10/16/2020 - 10:22am
authentication
collaboration
Conferences
cover image
Cryptography
Cybersecurity
data encapsulation
data hiding procedure
data hiding scheme
E-Government
e-government documents authentication
e-government process
Electronic government
encryption
Image color analysis
image encryption scheme
internet
key security parameters
policy-based governance
pubcrawl
RDH
resilience
Resiliency
reversible data hiding
secret data
security
Steganography
video coding
video crypto-steganography
biblio
Identity theft on e-government/e-governance digital forensics
Submitted by
grigby1
on Fri, 10/16/2020 - 10:22am
blockchain technology
collaboration
Computer crime
corporate users
credit card fraud
credit card transactions
Credit cards
credit transactions
cyber-threats
Cybercrime
Cybersecurity
cyberspace-low entry barriers
Digital Forensics
E-Governance
E-Government
electronic commerce
Electronic government
financial fraud
fraud
fraudulent transactions
genetic algorithms
Government
government data processing
governments
identity theft
internet
Law
malicious online activity
Neural networks
policy-based governance
product reviews
pubcrawl
resilience
Resiliency
system intrusions
time 13.0 month
user anonymity
biblio
Inclusive Security Models To Building E-Government Trust
Submitted by
grigby1
on Fri, 10/16/2020 - 10:14am
Access Control
authentication
authorisation
authorization
collaboration
Cybersecurity
data privacy
e-gov
E-Government
e-government trust
government data processing
Human behavior
inclusive security
inclusive security model
internet
message authentication
nonrepudiation properties
policy-based governance
privacy
privacy properties
privacy relationships
Privacy Requirements
pubcrawl
resilience
Resiliency
security perspective
security requirements
security threats
trust
trust of government
Trusted Computing
trusted security solution
biblio
A Study on The Factors Affecting The Continuous Use of E-Government Services - Focused on Privacy and Security Concerns-
Submitted by
grigby1
on Fri, 10/16/2020 - 10:10am
4th Industrial Revolution
Acceptance intention of E-government
collaboration
continuous use intention
Cybersecurity
data privacy
E-Government
e-government service
e-government services
Electronic government
government data processing
Human behavior
information and communication technology
information quality
information system
Information systems
internet
IS access model
Personnel
policy-based governance
privacy
privacy concerns
pubcrawl
quality factors
Quality of E-Government Services
quality of service
Reliability of E-government
resilience
Resiliency
risk factors
security
security concerns
service quality
Smart PLS
SPSS
system quality
TAM
technology acceptance model
user satisfaction
User satisfaction of E-Government Services
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »