Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data processing
biblio
Research of Classical Machine Learning Methods and Deep Learning Models Effectiveness in Detecting Anomalies of Industrial Control System
Submitted by grigby1 on Mon, 06/10/2019 - 1:56pm
resilience
machine learning algorithms
machine learning methods
modern industrial control systems
neural nets
Neural networks
privacy
production engineering computing
pubcrawl
machine learning
Resiliency
security
security of data
signal correlations
Support vector machines
Tennessee Eastman process simulation data
Training
Anomaly Detection
linear algorithms
learning (artificial intelligence)
industrial process anomaly detection task
industrial control
ICS security
ICs
Feeds
deep learning models
deep learning
Decision trees
Data processing
Cyber Attacks
control engineering computing
composability
anomaly detection evaluation dataset
biblio
Protecting Agents from Malicious Hosts using Trusted Platform Modules (TPM)
Submitted by aekwall on Mon, 03/11/2019 - 10:37am
mobile agent system
Trusted Platfrom Modules
trusted platform modules
tpm
Task Analysis
software agents
software agent usage approach
security of data
security mechanisms
security experts
secure protocol
Resiliency
pubcrawl
Protocols
mobile agents
agent based system builders
malicious host
Java agent development framework
Java
JADE
Hardware Protection
eminent scientific community
Data processing
Cryptography
Conferences
computing problems
computing paradigm
composability
Agent Protection
biblio
Design and implementation of HDFS data encryption scheme using ARIA algorithm on Hadoop
Submitted by grigby1 on Fri, 09/28/2018 - 4:21pm
k-means
encryption
Hadoop distributed computing
Hadoop Encryption Codec
Hadoop Security
HDFS block-splitting component
HDFS Data Encryption
HDFS data encryption scheme
hierarchical clustering
efficient encryption
Korean government
pubcrawl
resilience
Resiliency
Sorting
standards
variable-length data processing
word counting
Cryptography
AES international standard data encryption algorithm
Algorithm design and analysis
ARIA algorithm
ARIA Encryption Algorithm
ARIA/AES encryption
Big Data
Codecs
composability
AES algorithms
cyber physical systems
data block
data encryption
Data processing
distributed data processing platform
Distributed databases
domestic usages
biblio
An Optimal Fully Homomorphic Encryption Scheme
Submitted by grigby1 on Wed, 09/05/2018 - 10:39am
Kronecker product
user data protection
tensor theory
system analysis and design
security concern
Scalability
Resiliency
resilience
pubcrawl
privacy concern
privacy
optimal fully homomorphic encryption scheme
O-FHE scheme
Mathematical model
Algorithm design and analysis
KP
human factor
Human behavior
fully homomorphic encryption
FHE scheme
encryption
distributed computing
Data processing
Cybersecurity
Cryptography
Computing Theory
Cloud Computing
biblio
Accountable Internet of Things? Outline of the IoT databox model
Submitted by grigby1 on Mon, 06/11/2018 - 3:40pm
IoT databox model
US
trust
social arrangements
Resiliency
resilience
pubcrawl
process control
network accountability
Metrics
legislation
accountability
IoT Databox
Internet of Things (IoT)
Internet of Things
Europe
data protection legislation
Data protection
Data processing
Computational modeling
composability
biblio
An architecture model for smart city using Cognitive Internet of Things (CIoT)
Submitted by grigby1 on Wed, 05/16/2018 - 1:41pm
smart cities
MEMS
Protocols
pubcrawl
radio frequency identification
resilience
Resiliency
RFID
RFIDs
Servers
massive volume
Smart City
smart devices
smart features
social aspects of automation
Temperature measurement
Temperature sensors
Wireless Sensor Network
wireless sensor networks
Data integration
central server
centralized server
CIoT
cognitive Internet of Things
cognitive radio
communication protocol
data analysis
Data collection
architecture model
Data processing
distributed architecture
heatmap
Human behavior
human factor
Internet of Things
IoT
IoT data
biblio
Implementing A Framework for Big Data Anonymity and Analytics Access Control
Submitted by grigby1 on Mon, 04/02/2018 - 12:30pm
Data processing
tools
Sensitivity
Resiliency
resilience
pubcrawl
privacy protection
Metrics
MapReduce
k-anonymity
Human behavior
Hadoop ecosystems
framework standardization
data suppression
Access Control
data privacy
data management
data anonymization methods
data analysis
composability
Big Data anonymity framework
Big Data
authorization
authorisation
anonymization
anonymity
analytics access control
biblio
Proactive DDoS attack detection and isolation
Submitted by grigby1 on Tue, 01/16/2018 - 6:24pm
legitimate clients
Servers
security controls
resource allocation
Resiliency
pubcrawl
proxy level
proactive DDoS attack isolation
proactive DDoS attack detection
MTD
Monitoring
Migration
Metrics
Load management
load balancing
Attack proxy
IP networks
insider-assisted DDoS attack mitigation
Insider-assisted DDoS attack
Human behavior
EDIP
early detection-and-isolation policy
distributed denial of service
DDoS attack detection
Data processing
cyber threat
Cyber Attacks
computer network security
Computer crime
composability
biblio
Deploying Honeypots and Honeynets: Issue of Privacy
Submitted by grigby1 on Wed, 03/08/2017 - 2:38pm
IP networks
security
pubcrawl170114
privacy
network security
network forensics
Monitoring
legal issues
legal framework
Law
Data collection
honeypots
honeypot
honeynets
honeynet
EU law
Digital Forensics
data retention
Data processing
data privacy
biblio
Data supply chain in Industrial Internet
Submitted by grigby1 on Wed, 03/08/2017 - 2:28pm
Metals
Web Protocol
visionary data supply chain
supply chains
standards
Punching
pubcrawl170112
Protocols
Production facilities
Open Messaging Interface
business data processing
IoT
internet
industry business activities
industrial Internet application architecture
industrial internet
Data processing
Data collection
data analysis
computer architecture
« first
‹ previous
1
2
3
4
5
next ›
last »