Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Provenance
biblio
Reenactment for Read-Committed Snapshot Isolation
Submitted by grigby1 on Tue, 05/16/2017 - 12:41pm
composability
Human behavior
Metrics
Provenance
pubcrawl
read-committed snapshot isolation
reenactment
Resiliency
transaction
biblio
ReproZip: Computational Reproducibility With Ease
Submitted by grigby1 on Tue, 05/16/2017 - 12:41pm
composability
computational reproducibility
Human behavior
Metrics
Provenance
pubcrawl
reprozip
Resiliency
biblio
On the Origin of Mobile Apps: Network Provenance for Android Applications
Submitted by grigby1 on Tue, 05/16/2017 - 12:41pm
advertising security
app authentication
composability
Human behavior
Metrics
mobile advertising
Mobile Security
Provenance
pubcrawl
Resiliency
biblio
ProvUSB: Block-level Provenance-Based Data Protection for USB Storage Devices
Submitted by grigby1 on Tue, 05/16/2017 - 12:41pm
composability
Embedded Systems Security
Human behavior
Metrics
network accountability
Provenance
pubcrawl
Resiliency
tpm
USB
USB storage devices
biblio
Clustering Provenance Facilitating Provenance Exploration Through Data Abstraction
Submitted by grigby1 on Tue, 05/16/2017 - 12:40pm
composability
Human behavior
large-scale graphs
Metrics
Provenance
pubcrawl
Resiliency
visualisation
biblio
Privacy-Preserving Mining of Sequential Association Rules from Provenance Workflows
Submitted by grigby1 on Tue, 05/16/2017 - 12:40pm
composability
differential privacy
Human behavior
Metrics
Provenance
pubcrawl
Resiliency
Security Heuristics
biblio
The Good, the Bad, and the Differences: Better Network Diagnostics with Differential Provenance
Submitted by grigby1 on Tue, 05/16/2017 - 12:40pm
composability
debugging
Human behavior
Metrics
Network diagnostics
Provenance
pubcrawl
Resiliency
biblio
Provenance: On and Behind the Screens
Submitted by grigby1 on Tue, 05/16/2017 - 12:40pm
composability
data provenance
Human behavior
Metrics
Provenance
provenance visualization
pubcrawl
Resiliency
tutorial
workflow provenance
biblio
A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol
Submitted by grigby1 on Mon, 04/24/2017 - 11:38am
anonymity
anonymity in wireless networks
anonymous messaging
composability
distance bounding
Human behavior
Metrics
privacy protection
provable security
proven security
Provenance
pubcrawl
Resiliency
biblio
Information Security in Big Data: Privacy and Data Mining
Submitted by BrandonB on Tue, 05/05/2015 - 9:34am
decision maker
tracking
sensitive information
security of data
Provenance
privacypreserving data mining
privacy-preserving data mining
privacy preserving data mining
privacy auction
privacy
PPDM
information security
information protection
game theory
Algorithm design and analysis
data publishing
data provider
Data protection
data privacy
Data mining
data miner
data collector
data acquisition
computer security
Big Data
anti-tracking
anonymization
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »