Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
groupware
biblio
Combining Tensor Decompositions and Graph Analytics to Provide Cyber Situational Awareness at HPC Scale
Submitted by grigby1 on Mon, 02/17/2020 - 5:16pm
resilience
metadata
Metrics
multidimensional anomaly detection fusing HPC Analytics and Tensors
network topology
parallel processing
parallelized graph analysis
pattern clustering
pubcrawl
MADHAT
Resiliency
security of data
sensor fusion
situational awareness
structured network sensor logs
Tensile stress
tensors
tools
groupware
Security Metrics
clustering methods
composability
data structures
Detectors
Electronic mail
graph analytics
graph theory
Computing Theory
high-performance packages
HPC architecture for cyber situational awareness
HPC resources
HPC scale
integrated workflow
IP networks
large-scale sparse tensor decompositions
biblio
Computational Intelligence in Maritime Security and Defense: Challenges and Opportunities
Submitted by grigby1 on Mon, 12/09/2019 - 2:01pm
military computing
Training
simulated annealing
Security & Defense applications
security
review CI applications
pubcrawl
Oceans
neural nets
NATO Nations
Artificial Intelligence
maritime domain
knowledge based systems
groupware
evolutionary computation
Cryptography
computational intelligence
Compositionality
composability
CI techniques
biblio
CCA Secure Proxy Re-Encryption Scheme for Secure Sharing of Files through Cloud Storage
Submitted by grigby1 on Thu, 09/26/2019 - 10:43am
resilience
Peer-to-peer computing
Proxy Reencryption
pubcrawl
Public key
public key cryptography
quantum computing
quantum computing algorithms
random oracle model
random processes
Metrics
Resiliency
ring-lwe
robust file storage capability
search problem
search problems
secure data sharing
Secure File Sharing
secure file sharing scheme
security issues
decryption time
chosen ciphertext secure
Cloud Computing
cloud storage security
cloud storage service
Collaborative Work
composability
computing technologies
confidentiality
CSS
CCA secure proxy re-encryption scheme
encrypted files
encryption
groupware
Human behavior
Human Factors
lattice based cryptography
Lattices
malicious insiders
biblio
A management framework for secure multiparty computation in dynamic environments
Submitted by aekwall on Wed, 09/04/2019 - 11:16am
Robustness
Metadata Discovery Problem
trust establishment
SMC session
privacy-preserving collaborative computation
orchestration
management overhead
management framework
groupware
dynamic environments
Logic gates
secure multiparty computation
metadata
security of data
Cryptography
Peer-to-peer computing
privacy
composability
pubcrawl
Resiliency
computer architecture
Trusted Computing
Protocols
Internet of Things
data privacy
Scalability
biblio
Privacy Preserving Distributed Computation of Private Attributes for Collaborative Privacy Aware Usage Control Systems
Submitted by grigby1 on Thu, 03/28/2019 - 3:17pm
Metrics
usage control
smart-grid use case
smart-environment management
smart power grids
Smart Grid Privacy
Smart Grid
secure multiparty computation
pubcrawl
private attributes
privacy sensitive data
privacy preserving distributed computation
privacy
power engineering computing
authorization
IoT security
Internet of Things
Human behavior
groupware
energy consumption
distributed multitier framework
data privacy
control systems
computer architecture
composability
collaborative smart services
collaborative privacy aware usage control systems
Buildings
biblio
Towards Collaborative Trust Management
Submitted by grigby1 on Thu, 08/23/2018 - 11:46am
Peer-to-peer computing
Trusted Computing
trust profiles
trust management operations
Trust management
trust
taxonomy
Software Architecture
reference architecture
reconfigurable trust management operations
quality of service
pubcrawl
Personalized Trust
Cloud Computing
Human Factors
Human behavior
hardcoded trust computations
groupware
customizable trust management operations
contemporary trust management solutions
computer theory
computer architecture
Complexity theory
Collaborative Trust Computing
collaborative personalized trust management system
collaboration
biblio
Zero-Day Attack Identification in Streaming Data Using Semantics and Spark
Submitted by grigby1 on Mon, 03/26/2018 - 1:13pm
semantic reasoning
MRMR feature selection algorithm
parallel detection
pattern classification
pubcrawl
Resiliency
security of data
semantic learning
Semantic learning and reasoning
semantic link networks
minimum redundancy maximum relevance feature selection algorithm
Semantics
SLN
Spark Streaming
Spark streaming platform
Sparks
Training
Zero day attacks
zero-day attack identification
feature extraction
cognition
collaborative classification methods
Collaborative mining
composability
Computer hacking
Data Streaming
defense
dynamic semantic graph generation
Anomaly Detection
Feature Selection
Flow Creation
graph theory
groupware
IDS
Intrusion Detection Systems
learning (artificial intelligence)
Metrics
biblio
A Tamper-Resistant Digital Token-Based Rights Management System
Submitted by grigby1 on Tue, 02/06/2018 - 1:54pm
rights management system
message authentication
Metrics
Peer-to-peer computing
peer-to-peer manner
Protocols
pubcrawl
public key cryptography
Resiliency
internet
Scalability
Symmetric Key Cryptography
Tamper-Resistance
tamper-resistant digital token
tamper-resistant digital tokens
token owner
Ubiquitous Computing Security
Access Control
Human Factors
Human behavior
hardware-software collaboration
Hardware
groupware
eTRON architecture
digital token
Digital rights management
Cryptography
computer architecture
authorisation
authentication
asymmetric cryptography
APIs
API
biblio
Collaborative Ensemble-Learning Based Intrusion Detection Systems for Clouds
Submitted by grigby1 on Thu, 12/28/2017 - 1:21pm
fuzzy classifiers
VM failures
virtual machines
Training
security of data
Resiliency
pubcrawl
pattern classification
Learning systems
learning (artificial intelligence)
KDD99
intrusion tolerance
Intrusion Detection Systems
Intrusion Detection
IDS
groupware
Anomaly Detection
fuzzy classifier
Fault-Tolerance
fault tolerant computing
Ensemble Learning
Decision trees
Decision Tree
dataset segmentation
composability
Collaborative Systems
collaborative ensemble-learning
collaboration
cloud-based distributed system
Cloud Computing
Bagging
biblio
Cybersecurity for product lifecycle management a research roadmap
Submitted by grigby1 on Wed, 03/08/2017 - 2:30pm
encryption
three-dimensional printing
supply chain management
secure supply chains
secure collaboration techniques
research roadmap
remote 3D printing
pubcrawl170112
product lifecycle management
product life cycle management
PLM
insider threat
groupware
Access Control
embedded systems
DBSAFE
Data Security
Cybersecurity
critical protection techniques
computer security
compliance techniques
Companies
collaboration
authorisation
access control systems
« first
‹ previous
1
2
3
next ›
last »