Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data handling
biblio
Video Coding Method in a Condition of Providing Security and Promptness of Delivery
Submitted by grigby1 on Fri, 07/01/2022 - 8:28am
data handling
quantization
information resources
hiding protection
coding
video coding
Resiliency
PSNR
Availability
coding theory
security
Transform coding
Quantization (signal)
Telecommunications
Reliability
Bandwidth
Metrics
resilience
pubcrawl
biblio
A Learning-based Data Augmentation for Network Anomaly Detection
Submitted by aekwall on Mon, 03/29/2021 - 11:58am
divide-augment-combine strategy
sampling methods
class imbalance problem
network anomaly detection
attack instances
augments data
data augmentation
data instances
Divide-Augment-Combine
Gallium nitride
generative adversarial model
high-quality data
learning-based data augmentation
network traffic traces
public network datasets
statistical sampling
synthetic instances
Generative Adversarial Learning
pattern classification
Scalability
Data models
Support vector machines
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
neural nets
security of data
Anomaly Detection
network traffic
Generators
generative adversarial networks
generative adversarial network
Predictive Metrics
data handling
biblio
A service-oriented adaptive anonymity algorithm
Submitted by grigby1 on Thu, 01/28/2021 - 1:59pm
quasiidentifier attributes
Metrics
Partitioning algorithms
privacy
privacy preservation
privacy-preserving data publishing
pubcrawl
Publishing
Quasi-identifier Attributes
K-anonymity algorithms
released data
resilience
Resiliency
sensitive attributes
service-oriented adaptive anonymity algorithm
service-oriented architecture
splitting value
Adaptation models
k-anonymity
Internet of Things
Human behavior
distribution characteristics
dispersion
data privacy
data handling
contribution value differences
composability
attribute values distribution
attribute value distribution
anonymous results
anonymized data
anonymity group partition process
anonymity
biblio
Private FL-GAN: Differential Privacy Synthetic Data Generation Based on Federated Learning
Submitted by aekwall on Mon, 01/11/2021 - 1:41pm
data handling
strict privacy guarantee
realistic fake data generation
private FL-GAN
Lipschitz limit
high-quality synthetic data generation
GAN training
differential privacy synthetic data generation
differential privacy sensitivity
differential privacy generative adversarial network model
data-holders
data generation
federated learning
security of data
data sharing
differential privacy
neural nets
composability
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
information security
data privacy
Scalability
biblio
Assessing E-Security Behavior among Students in Higher Education
Submitted by aekwall on Mon, 10/12/2020 - 11:45am
behavior
Human Behavior and Cybersecurity
United Arab Emirates
Security Behavior Survey Instrument
password usage
online scam
higher educational institutions
higher education students
further education
e-security behavior assessment
E-security awareness
social engineering
Educational institutions
authorisation
data handling
Human Factors
Phishing
password
Cybersecurity
internet
Computer crime
pubcrawl
Human behavior
Electronic mail
invasive software
malware
biblio
An Algebraic Expert System with Neural Network Concepts for Cyber, Big Data and Data Migration
Submitted by aekwall on Mon, 10/12/2020 - 11:37am
Relational Database
machine learning experts system
mathematical algebraic form
neural nets
neural network
neural network computational graph structure
neural network node structure
Neural networks
output layers
pubcrawl
machine assistance approach
relational databases
Resiliency
rule probabilities
Scalability
security
structured approach
Syntactics
trees (mathematics)
value probabilities
data migration applications
algebraic expert system
Artificial Intelligence
Bayes methods
Bayesian probability tree approach
Big Data
cognition
Cyber database
data handling
data migration
False Data Detection
expert systems
Expert Systems and Security
grading decisions
Human behavior
Information Assurance
knowledge based systems
knowledge-base organization
Knowledgebase
learning (artificial intelligence)
biblio
Explaining Visual Models by Causal Attribution
Submitted by grigby1 on Fri, 08/28/2020 - 12:23pm
factor alteration
visualization
visual models
Rain
pubcrawl
Metrics
machine learning
learning
intervened causal model
image generative models
Human behavior
Generators
feature extraction
attribution
Face
explanation
deep
Data models
data handling
data distribution
counterfactuals
Computational modeling
composability
causal counterfactuals
causal attribution
Causal
biblio
Securing User Access at IoT Middleware Using Attribute Based Access Control
Submitted by aekwall on Mon, 08/17/2020 - 11:42am
pubcrawl
user access control
typical IoT system model
middleware layer
IoT system architecture
IoT gateway
device data
attribute based access control
IoT middleware
data handling
internetworking
middleware
Logic gates
authentication
policy-based governance
security
Human behavior
data encryption
IoT devices
Internet of Things
attribute-based encryption
Cryptography
authorization
authorisation
Access Control
ciphertext-policy attribute-based encryption
Scalability
computer network security
IoT
biblio
Hadoop-based Dark Web Threat Intelligence Analysis Framework
Submitted by grigby1 on Fri, 07/10/2020 - 11:54am
Hadoop
Tor
threat intelligence information
threat intelligence
pubcrawl
network services
internet
Human Factors
Human behavior
HBase-based distributed database
Hadoop-based dark web threat intelligence analysis framework
anonymous messaging
Distributed databases
data privacy
data handling
dark-net threat intelligence
dark web
dark network research
dark network criminal networks
crime messages
anonymous user communication
anonymous TOR tool
biblio
Provenance Data in the Machine Learning Lifecycle in Computational Science and Engineering
Submitted by aekwall on Mon, 03/30/2020 - 11:33am
PROV-ML
workflow provenance
workflow management software
scientific information systems
Resiliency
query processing
pubcrawl
provenance tracking solutions
provenance queries
provenance data representation
Provenance
composability
parallel architectures
ML lifecycle
Metrics
machine learning lifecycle
learning (artificial intelligence)
Human behavior
data handling
CUDA cores
CSE
computational science and engineering
1
2
3
4
next ›
last »