Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Compositionality
biblio
Direct-Current and Alternate-Decay-Current Hybrid Integrative Power Supplies Design Applied to DC Bias Treatment
Submitted by aekwall on Mon, 11/30/2020 - 11:06am
Internet of Things
Resiliency
pubcrawl
cyber physical systems
Compositionality
ferromagnetic materials
remanence
demagnetisation
Magnetic domains
magnetic hysteresis
Magnetic flux
Saturation magnetization
magnetic material
Demagnetization
magnetisation
iron alloys
power supply
power transformers
ac demagnetization hybrid integrative power supplies
alternate-decay-current hybrid integrative magnetization
alternate-decay-current hybrid integrative power supplies design
apparent power 10 kVA
apparent power 2.0 kVA
dc bias flux
dc bias magnetic compensation mechanism
dc bias treatment
demagnetization effect
demagnetization power supplies
external magnetic field
integrated power supplies
inverter circuit
invertors
magnetic field strength
magnetic materials
material remanence
nanocomposite magnetic material
nanocomposite magnetic state adjustment
nanocomposites
negative dc magnetization
positive magnetization
rectifier circuit
rectifying circuits
single-phase rectifier circuit
single-phase transformer structure
Soft magnetic materials
transformer main core
transformer windings
Magnetic Remanence
biblio
Remanence enhancement melt-spun Nitroquench Sm2Fe17N3. M.
Submitted by aekwall on Mon, 11/30/2020 - 11:06am
Conferences
Internet of Things
Resiliency
pubcrawl
cyber physical systems
Compositionality
remanence
coercive force
coercivity
hysteresis loops
Magnetic anisotropy
magnetic hysteresis
nanostructured materials
Permanent magnets
corrosion resistance
crystal microstructure
Curie temperature
dense sintered magnets
EDX microprobe analysis
hard magnetism
interstitials
intrinsic magnetic properties
iron compounds
low-temperature gas-phase interstitial modification process
Magnetics
magnetocrystalline anisotropy
melt spinning
melt-spun material
microstructure
Mossbauer effect
Mössbauer spectra
nanocrystallite size
nitroquench powder
polymer-bonded magnets
polymers
Powders
samarium compounds
sintering
Sm2Fe17N3
spark sintering
spontaneous magnetization
Thermal stability
X-ray chemical analysis
X-ray diffraction
X-ray powder diffraction
X-ray reflections
Magnetic Remanence
biblio
Secure Data Streaming to Untrusted Road Side Units in Intelligent Transportation System
Submitted by aekwall on Mon, 11/23/2020 - 10:28am
IoT
automobiles
Monitoring
Scalability
Cryptography
Data Security
encryption
Access Control
telecommunication security
Resiliency
pubcrawl
privacy
vehicular ad hoc networks
data analysis
multi-tenancy
Data Analytics
Compositionality
Intelligent Transportation System
Intelligent Transportation Systems
key management
sensory data
data security issues
road side unit
secure data streaming
untrusted road side units
vehicle layer
vehicle-to-infrastructure communications
vehicles stream data
Intelligent Data Security
Intelligent Data and Security
biblio
An Incentive Mechanism Using Shapley Value for Blockchain-Based Medical Data Sharing
Submitted by aekwall on Mon, 11/23/2020 - 10:28am
security of data
Scalability
data owners
Big Data
data privacy
security
game theory
Data models
learning (artificial intelligence)
Resiliency
pubcrawl
blockchain
Business
machine learning techniques
cryptocurrencies
Distributed databases
Predictive models
medical information systems
Compositionality
Incentive mechanism
Shapley value
diseases
Medical diagnostic imaging
blockchain-based medical data sharing
computational process
cooperation model
data miners
disease diagnosis
incentive schemes
medical data sharing
Shapley value revenue distribution
topological relationships
Intelligent Data Security
Intelligent Data and Security
biblio
Anomaly Detection Models for Smart Home Security
Submitted by aekwall on Mon, 11/23/2020 - 10:28am
computer network security
Monitoring
Scalability
Big Data
data privacy
security
smart devices
DDoS Attacks
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
Anomaly Detection
Energy Efficiency
Data collection
sensor fusion
Intelligent sensors
Smart homes
home automation
Smart Home
smart home environment
Compositionality
privacy violations
Hidden Markov models
hidden Markov model
anomalous activities
anomaly detection models
cyber threat surface
fire accidents
HMM model
multiple sensors
network level sensor data
smart home security
smart homes devices
smart security cameras
smoke sensors
unauthorized movements
Intelligent Data Security
Intelligent Data and Security
biblio
Big Data Security Frameworks Meet the Intelligent Transportation Systems Trust Challenges
Submitted by aekwall on Mon, 11/23/2020 - 10:27am
Scalability
authorization
Big Data
Internet of Things
Trusted Computing
computer architecture
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
authentication
Data processing
Logic gates
Compositionality
Traffic Management
Intelligent Transportation System
Intelligent Transportation Systems
big data technologies
reference architecture
Big Data security frameworks
business intelligence development
coherent reference architecture
ITS trust challenges
multitier ITS security framework
security approaches
Security Classification
sustainable adoption
Intelligent Data Security
Intelligent Data and Security
biblio
Data Analysis for Anomaly Detection to Secure Rail Network
Submitted by aekwall on Mon, 11/23/2020 - 10:24am
IP networks
Scalability
telecommunication traffic
telecommunication security
Protocols
Support vector machines
Resiliency
pubcrawl
Anomaly Detection
data analysis
Compositionality
Rails
alert function
Bidirectional control
network features
network flow
packet analysis system
Rail Network Security
rail network traffic data
rail systems
railway communication
secure rail network
timely detection
Wireshark detection
Intelligent Data Security
Intelligent Data and Security
biblio
An Approach for End-to-End (E2E) Security of 5G Applications
Submitted by aekwall on Mon, 11/23/2020 - 10:23am
computer network security
Scalability
Servers
attack surface
Cryptographic Protocols
Protocols
Resiliency
pubcrawl
internet
authentication
message authentication
5G mobile communication
security threats
Elliptic curve cryptography
security operations
heterogeneous environment
Compositionality
Three-dimensional displays
confidentiality
communication complexity
computation complexity
Resistance
key management
3D PAKE protocol
5G Applications
5G protocols
attack resistance rate
dependable security mechanism
differentiated security
diffie hellman key exchange
E2E
End to End Security analysis
End-to-End data protection
end-to-end security
flexible security mechanism
heterogeneous networked society
industrial vision
Internet Security Protocols
key business driver
manifold applications
networking paradigms
next-generation mobile technology
security defensive rate
Tetrahedron property analysis
Intelligent Data Security
Intelligent Data and Security
biblio
Abnormal Bus Data Detection of Intelligent and Connected Vehicle Based on Neural Network
Submitted by aekwall on Mon, 11/23/2020 - 10:23am
Automotive engineering
security of data
intrusion detection system
Scalability
Resiliency
pubcrawl
detection
standards
neural nets
Vulnerability
data analysis
neural network
Logic gates
Floods
Compositionality
attack
Intelligent Transportation Systems
connected vehicles
data centers
abnormal bus data
abnormal bus data analysis
abnormal bus data detection
Intelligent vehicles
optimized neural network
Intelligent Data Security
Intelligent Data and Security
biblio
Web server security evaluation method based on multi-source data
Submitted by aekwall on Mon, 11/23/2020 - 10:23am
Safety
security of data
IP networks
Scalability
Servers
security
Data models
Resiliency
pubcrawl
internet
web services
information processing
analytic hierarchy process
Compositionality
XML
data sources
evaluation indicators
host security threat assessment values
multi-source data
multisource data
single data source
web security assessments
web security evaluation
web security evaluation model
web server security evaluation method
Intelligent Data Security
Intelligent Data and Security
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »