Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data processing
biblio
Scalable Security Event Aggregation for Situation Analysis
Submitted by grigby1 on Tue, 03/07/2017 - 1:43pm
scalable security event aggregation
on-demand aggregation
parallel processing
pattern clustering
performance evaluation
periodic aggregation
pubcrawl170109
query languages
query support
large-scale data processing
SEAS-MR
security
security analytics
Security event aggregation
security event aggregation system over MapReduce
sensors
situation analysis
stealthy hacking processes
Computer crime
Aggregates
Analytical models
APT
attack methodologies
Big Data
big-data analytics
big-data computing
big-data security analytics
advanced persistent threats
Computers
cyber-attacks
data analysis
Data processing
Database languages
Hadoop cluster
high-level query languages
large-scale data analysis
biblio
Security in Cloud-Based Cyber-Physical Systems
Submitted by grigby1 on Tue, 03/07/2017 - 1:33pm
Cloud Computing
cloud-based cyber-physical systems
Computer crime
cyber-physical systems
Data processing
information security
modern production devices
physical interaction
Production
pubcrawl170109
security
security of data
sensors
smart mobility services
biblio
"Scalable Security Event Aggregation for Situation Analysis"
Submitted by abfox on Tue, 02/14/2017 - 1:43pm
scalable security event aggregation
large-scale data processing
on-demand aggregation
parallel processing
pattern clustering
performance evaluation
periodic aggregation
pubcrawl170101
query languages
query support
large-scale data analysis
SEAS-MR
security
security analytics
Security event aggregation
security event aggregation system over MapReduce
sensors
situation analysis
stealthy hacking processes
big-data security analytics
advanced persistent threats
Aggregates
Analytical models
APT
attack methodologies
Big Data
big-data analytics
big-data computing
advanced persistent threat
Computer crime
Computers
cyber-attacks
data analysis
Data processing
Database languages
Hadoop cluster
high-level query languages
biblio
"A project-based multi-disciplinary elective on digital data processing techniques"
Submitted by grigby1 on Tue, 02/14/2017 - 12:43pm
Elliptic curves
undergraduate majors
students feedback
source coding
registration statistics
pubcrawl170102
project-based multidisciplinary elective
project based
polynomials
multi-disciplinary
Internet-of-Things
Image coding
fresh graduates
error correcting codes
encryption
assessment data
Electrical Engineering
educational courses
digital data processing techniques
Data processing
data handling
Cryptography
course outcomes
computer science
Computer Engineering
computer aided instruction
Compression
Cloud Computing
channel coding
Big Data centers
biblio
Enhancing security of Hadoop in a public cloud
Submitted by drwright on Wed, 05/04/2016 - 9:07am
internal cloud attacks
Vulnerability and Resilience Prediction Models
Virtual machine monitors
SEHadoop
security enhancement
security
resilience
public cloud
parallel processing
overloaded authentication key
least access privilege
lack of fine-grained access control
Access Control
Hadoop security mechanism
fine-grained access control
Data processing
data access
Containers
compromise resilience
Cloud Computing
authorisation
authentication key
authentication
biblio
A New Code Obfuscation Scheme for Software Protection
Submitted by BrandonB on Fri, 05/01/2015 - 7:57am
malicious reverse engineering
tampering
systems re-engineering
software protection
software engineering
Software
security attacks
reverse engineering
Resists
Resistance
nontrivial code clones
Cloning
Licenses
IT industry
Data processing
Computer crime
Complexity theory
code transformation
code patterns
code obfuscation scheme
code fragment cloning
« first
‹ previous
1
2
3
4
5