Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Conferences
biblio
Trust and Big Data: A Roadmap for Research
Submitted by BrandonB on Tue, 05/05/2015 - 9:31am
Big Data
Cloud Computing
computer science
Conferences
Context
Data mining
data-driven approaches
focal issues
FORSEC project
next generation online trust
reputation
reputation-based trust management
security
trust
trust-related data
Trusted Computing
biblio
Load balancing for privacy-preserving access to big data in cloud
Submitted by BrandonB on Tue, 05/05/2015 - 9:23am
random data placement algorithm
geo-distributed cloud site
information retrieval
load balanced storage system
low-complexity algorithm
NP-hardness
ORAM algorithm
privacy preserving access
Random access memory
file servers
random processes
resource allocation
responsiveness
security
Servers
storage management
storage server
data placement problem
Cloud Computing
cloud storage
computational complexity
Conferences
data availability
data content protection
data maintenance cost reduction
data management
Big Data
data privacy
Data protection
Data Security
Distributed databases
distributed file system
encryption
file server
biblio
Security configuration analytics using video games
Submitted by BrandonB on Mon, 05/04/2015 - 2:26pm
security of data
NetMaze
network configuration verification problem
network topology
provable mapping
provable verification
security
Security analysis
security configuration analytics
security configuration settings
Human Factors
security property
simulation tool
special languages
specification languages
system robustness
Topology
user interfaces
video games
Vulnerability
crowdsourcing
attack analysis
attack attribution
Communication networks
Computational modeling
computer games
computing systems
Conferences
configuration conflict
courseware
3D game object
educational software
formal methods
formal verification
game educational value
game interface
gameplay scenario
Games
human factor
biblio
A fast human detection algorithm of video surveillance in emergencies
Submitted by BrandonB on Fri, 05/01/2015 - 9:37am
frame subtraction
video surveillance
target mask
single Guassian model
object detection
Moving Target
Image edge detection
IEEE Computer Society
human detection algorithm
Gaussian processes
Gaussian filter
background subtraction
fame subtraction
estimation
emergencies
Electronic mail
Educational institutions
edge tracking of head
edge detection
dilation
detection algorithms
Conferences
biblio
M2M technologies: Enablers for a pervasive Internet of Things
Submitted by BrandonB on Thu, 04/30/2015 - 2:15pm
Communications technology
Conferences
context-awareness
European FP7 project BUTLER
Internet of Things
Internet of Things security
M2M service layer standardization
M2M technology
pervasive Internet of Things
security
Smart homes
Telecommunication standards
ubiquitous computing
Wireless communications
biblio
HVSTO: Efficient privacy preserving hybrid storage in cloud data center
Submitted by BrandonB on Thu, 04/30/2015 - 2:12pm
privacy preserving hybrid storage
Virtualization
virtualisation
Virtual machining
virtual machines
virtual machine storage
solid state disk
service infrastructure
Servers
security
privacy preserving shared storage system
Cloud Computing
large-scale cloud data center
Indexes
I/O latency performance improvement
hybrid VM storage
HVSTO
distributed structure
distributed storage
data privacy
Conferences
computer centres
biblio
Using sentiment to detect bots on Twitter: Are humans more opinionated than bots?
Submitted by BrandonB on Thu, 04/30/2015 - 1:42pm
Twitter network
Twitter applications
Twitter
Trusted Computing
Syntactics
social networking (online)
sentiment-related factors
Semantics
principal component analysis
Nominations and elections
Indian election
Conferences
bot detection
AUROC
area under the ROC curve
biblio
A novel trust evaluation method for Ubiquitous Healthcare based on cloud computational theory
Submitted by BrandonB on Thu, 04/30/2015 - 1:33pm
Pragmatics
user profile attributes
uncertainty handling
uncertain reasoning
UH environment
ubiquitous healthcare
ubiquitous computing
TV
Trusted Computing
trust evaluation method
cloud computational theory
MIMICs
Medical services
MATLAB software
MATLAB
health care
Generators
Conferences
cloud theory
Cloud Computing
biblio
Mobile agent based intrusion detection system
Submitted by BrandonB on Thu, 04/30/2015 - 1:26pm
mobile agent
suspicious patterns identification
signal processing
security of data
NIDS
network-based system
network activity
mobile agents
mobile agent based intrusion detection system
Anomaly Detection
misuse detection
Intrusion Detection
internet
Informatics
host-based system
cyber attack
Conferences
Computers
biblio
User behaviour modelling based DDoS attack detection
Submitted by BrandonB on Thu, 04/30/2015 - 1:16pm
expectation maximization
user modelling
user modeling
user behaviour modelling
telecommunication traffic
signal processing
network system
Mathematical model
IP networks
Human Factors
Adaptation models
EM
distributed denial of service
destination IP traffic
DDoS attack detection
DDoS
Conferences
computer network security
Computer crime
Anomaly Detection
« first
‹ previous
…
73
74
75
76
77
78
79
80
81