Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
business data processing
biblio
Data supply chain in Industrial Internet
Submitted by grigby1 on Wed, 03/08/2017 - 1:28pm
Metals
Web Protocol
visionary data supply chain
supply chains
standards
Punching
pubcrawl170112
Protocols
Production facilities
Open Messaging Interface
business data processing
IoT
internet
industry business activities
industrial Internet application architecture
industrial internet
Data processing
Data collection
data analysis
computer architecture
biblio
Privacy Principles for Sharing Cyber Security Data
Submitted by grigby1 on Thu, 02/23/2017 - 1:26pm
pubcrawl170106
organizational risk
Organizations
personal information exposure
poker queries
privacy
privacy balancing
privacy preservation
privacy principles
privacy risks
organizational boundaries
qualitative evaluation
queries
query processing
risk management
security information
security of data
trust requirements
Trusted Computing
engineering approaches
computer security
cyber security
cyber security data sharing
data confinement
data exposure
data privacy
data sharing
Distributed databases
distributed security system
business data processing
forward progress
internal information
Law
least disclosure
minimal requisite fidelity
moderated queries
network traffic
organisational aspects
biblio
"Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data"
Submitted by abfox on Tue, 02/14/2017 - 11:41am
internet
Web proxy logs
system-on-chip
Servers
security products
pubcrawl170101
malware strains
malware
Los Alamos National Lab
large-scale log data mining
LANL
IP networks
invasive software
advanced persistent threat
graph theory
Electronic mail
early-stage enterprise infection detection
early-stage APT infection
DNS logs
Data mining
data analysis
business data processing
belief propagation
belief networks
APT infection attacks
advanced persistent threats
biblio
"Ctracer: Uncover C amp;amp;C in Advanced Persistent Threats Based on Scalable Framework for Enterprise Log Data"
Submitted by abfox on Tue, 02/14/2017 - 11:05am
scalable framework
internet
invasive software
Itemsets
malware
MapReduce
network signature
networking logs
pubcrawl170101
hackers
Security Operations Center
Servers
SoC
stealthy activities detection
stealthy command and control channel detection
targeted attacks
traffic data
Computer crime
Advanced Persistent Threat (APT)
APT attack
business data processing
C&C channel
C&C sessions
C)
Command and Control (C&
command and control systems
advanced persistent threat
Computers
Ctracer
Digital Forensics
digital signatures
Electronic mail
enterprise log data
forensic report
biblio
Privacy Issues in Identity Verification
Submitted by BrandonB on Wed, 05/06/2015 - 12:25pm
identity proofing
wide-scale identity systems
verification
trust creation
privacy issues
privacy
national identity systems
knowledge-based authentication
knowledge management
KBA
imposter fraud
identity verification
identity scoring
biometrics
Identity management
identity fraud
identity document security
identity document fraud
identity credential
Identification
economic system
data privacy
computer security
commercial applications
business data processing
biometrics (access control)
biblio
DeepQA Jeopardy! Gamification: A Machine-Learning Perspective
Submitted by BrandonB on Tue, 05/05/2015 - 12:29pm
real-world business problems
Newton-Raphson logistic regression
NLP algorithms
NLP question-and-answer system
nongame play
Pattern recognition
Pipelines
positive-to-negative ratio
question answering (information retrieval)
question-and-answer pairs
natural language processing (NLP)
regularization term
Structured Data
text analysis
Training
training instances
true-false labels
Unstructured Data
Watson gamification
Watson machine-learning pipelines
Games
algorithm engineering
business data processing
business domain
computer games
configuration settings
data engineering techniques
DeepQA Jeopardy! gamification
domain gamification
extreme class imbalance
Accuracy
Gamification
ingested corpus sets
large-scale natural language processing question-and-answer system
learning (artificial intelligence)
Logistics
machine learning
machine learning algorithms
machine-learning process
natural language processing
biblio
A Group File Encryption Method using Dynamic System Environment Key
Submitted by BrandonB on Tue, 05/05/2015 - 7:38am
dynamic system environment key
system environment key
Servers
security level
security
message authentication
group file encryption
GEMS
file organisation
encryption
eavesdropping attack
auditing security scheme
DRM
decryption method
Cryptography
Computers
Cloud Computing
business data processing
autocrypt
authorization
authorisation
authentication
biblio
An Open S-BPM Runtime Environment Based on Abstract State Machines
Submitted by BrandonB on Fri, 05/01/2015 - 7:10am
finite state machines
workflow management software
workflow engine
Subject-oriented Business Process Management
subject-oriented BPM
Semantics
S-BPM tools
S-BPM model
program interpreters
Open-S-BPM
Open S-BPM runtime environment
Mathematical model
abstract interpreter model
executable workflow engine
Engines
CoreASM
business process modeling
business data processing
Business
ASM approach
Analytical models
Abstracts
abstract state machine interpreter
Abstract State Machine
« first
‹ previous
1
2
3
4
5