Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Business
biblio
Spam Detection Framework for Online Reviews Using Hadoop’ s Computational Capability
Submitted by aekwall on Mon, 02/25/2019 - 10:39am
retail data processing
MapReduce
MapReduce feature
metadata
NetSpam
online review
online reviews
online shopping
parallel programming
Reliability
machine learning techniques
review dataset classification
spam detection framework
spam detection methods
spam detection procedure
spam features
spam review
spam reviews
unsolicited e-mail
spam detection
Business
Big Data
feature extraction
learning (artificial intelligence)
Human behavior
pubcrawl
Metrics
pattern classification
internet
big data processing
Scalability
business decisions
Decision Making
Distribution functions
false reviews
feature type extraction
Hadoop
Hadoop computational capability
Labeling
biblio
Implementing Cyber-Security Measures in Airports to Improve Cyber-Resilience
Submitted by grigby1 on Thu, 01/31/2019 - 11:13am
Human behavior
Software
smart facilities
smart airports
security of data
Safety
Resiliency
resilience
pubcrawl
Metrics
Internet of Things
Industrial IoT Governance
Air gaps
cybersecurity measures
cybersecurity management
Cybersecurity Best Practices
Cyber-Resilience
Critical Infrastructure Protection
composability
Business
aviation sector
Airports
airport facilities
air travel passengers
biblio
Service Design Metrics to Predict IT-Based Drivers of Service Oriented Architecture Adoption
Submitted by grigby1 on Mon, 12/10/2018 - 10:42am
Resiliency
work factor metrics
Unified modeling language
structural domain level similarity
software metrics
software engineering metrics properties
SoaML
SOA modeling language
service-oriented architecture
service reuse
service oriented architecture
service interface diagram
service design metrics
Scalability
Business
resilience
pubcrawl
Protocols
Metrics
Measurement
IT-based driver
infrastructure efficiency
ervice design
design flaws
Couplings
Complexity theory
business based capabilities
biblio
Blockchain: Solving the Privacy and Research Availability Tradeoff for EHR Data: A New Disruptive Technology in Health Data Management
Submitted by grigby1 on Wed, 11/14/2018 - 12:19pm
policy maker institutions
health system developers
Human Factors
law regulations
lifelong recorded patient health data
Medical services
multisignature data access
patient data
patient privacy
Health information ecosystem
policy makers
population health management
privacy
privacy data
protective principles
pubcrawl
Scalability
secure data storing
defensive data hiding attitude
blockchain
blockchain technology
Business
cryptographically secured data storage
Cryptography
data availability
data privacy
data structures
American HIPAA regulation
disruptive technology
EHR
EHR data
electronic health records
ethical problems
expert systems
health data management
Health data storage
biblio
FADETPM: Novel approach of file assured deletion based on trusted platform module
Submitted by grigby1 on Wed, 09/12/2018 - 10:18am
Scalability
Handheld computers
integrity
internet
Memory
offline data storage
outsourced data files
privacy
pubcrawl
File Assured Deletion
SSP
storage management
storage service provider
tpm
Trusted Computing
Trusted Platform Module
VANISH
Business
file access policies
FADETPM
FADE
Ephemerizer
data privacy
data integrity
data deletion
Cryptography
cryptographic issues
computer storage space
computer storage management
computer security
cloud storage
Cloud Computing
business risk
biblio
Internet of things (IoT) design considerations for developers and manufacturers
Submitted by K_Hooper on Wed, 05/09/2018 - 9:59am
large-scale interconnectivity
smart devices
sensors
Security by Default
Security Assurance
Scalability
Resiliency
recommended design considerations
pubcrawl
Protocols
Monitoring
authentication
IoT ecosystem
IoT Design
IoT application
IoT
Internet of Things
information security
embedded systems
embedded security
computer network security
Business
biblio
Enhancing SDN Security for IoT-Related Deployments through Blockchain
Submitted by grigby1 on Mon, 03/05/2018 - 12:12pm
resilience
IoT
IoT clouds
IoT-related deployments
jurisdictional boundaries
Metrics
national boundaries
network reconfiguration
networking paradigm
policy enforcement
pubcrawl
recently introduced Blockchain paradigm
render Blockchain
Internet-of-Things-related networking elements
Resiliency
safety-critical applications
SDN
SDN security
security
significant security factor
software defined networking
Switches
thorny issue
traditional networking deployments
Virtualization
cross national boundaries
blockchain security
Business
business activity
cloud
Cloud Computing
cloud computing infrastructure
composability
computer network security
Conferences
connected nodes
connected world
blockchain
dynamic manner
dynamic networks
efficient entity interconnection
efficient monitoring
emerging networking paradigm
geographic boundaries
increased attack surface
integrated world
intercloud communication
internet
Internet of Things
biblio
Enhancing SDN Security for IoT-Related Deployments through Blockchain
Submitted by grigby1 on Mon, 03/05/2018 - 12:11pm
resilience
IoT
IoT clouds
IoT-related deployments
jurisdictional boundaries
Metrics
national boundaries
network reconfiguration
networking paradigm
policy enforcement
pubcrawl
recently introduced Blockchain paradigm
render Blockchain
Internet-of-Things-related networking elements
Resiliency
safety-critical applications
SDN
SDN security
security
significant security factor
software defined networking
Switches
thorny issue
traditional networking deployments
Virtualization
cross national boundaries
blockchain security
Business
business activity
cloud
Cloud Computing
cloud computing infrastructure
composability
computer network security
Conferences
connected nodes
connected world
blockchain
dynamic manner
dynamic networks
efficient entity interconnection
efficient monitoring
emerging networking paradigm
geographic boundaries
increased attack surface
integrated world
intercloud communication
internet
Internet of Things
biblio
Ransomware: The CryptoVirus Subverting Cloud Security
Submitted by grigby1 on Tue, 02/06/2018 - 12:54pm
security
malware
Metrics
pubcrawl
Ransomware
ransomware attack
ransomware vulnerabilities
Resiliency
Scalability
IT security specialists
security effectiveness
security threat
Servers
threats
ubiquitous computing
Ubiquitous Computing Security
ubiquitous environment
vulnerabilities
cloud threat mechanisms
business enterprises
cloud
Cloud architecture
Cloud Computing
cloud network
cloud platforms
Cloud Security
cloud technology
Business
computer architecture
computer viruses
Cryptography
CryptoVirus
disparate locations
Human behavior
Human Factors
information technology
biblio
RicherPicture: Semi-automated cyber defence using context-aware data analytics
Submitted by grigby1 on Tue, 01/23/2018 - 3:01pm
Resiliency
Electronic mail
incident response strategy
information
learning (artificial intelligence)
nonnetwork data
operational aspects
organisation
organisational data
pubcrawl
decision-making process
RicherPicture
security
security of data
Security Operation Centre environment
synthetic scenarios
technological developments
threat intelligence data
tools
visual analytics
correlating network data
attack-trend data
automated network defences
automated network-defence actions
Automated Response Actions
Business
composability
Computer crime
computer science
context-aware data analytics
attack-surface
cyber attacks detection
cyber attacks prevention
Cyber defence
cyber-threat landscape
data analysis
data sources
data visualisation
Decision Making
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »