Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Spark
biblio
Big Data and its Analyzing Tools : A Perspective
Submitted by aekwall on Tue, 08/17/2021 - 4:10pm
Fault tolerant systems
Storms
Sparks
Spark
Kerberos Mechanism
Java
HDFS
Hadoop
Bull-eye
BIGDATA
security
fault tolerance
Human behavior
Resiliency
Metrics
pubcrawl
Kerberos
tools
Cryptography
biblio
Clustering Analysis for Big Data in Network Security Domain Using a Spark-Based Method
Submitted by grigby1 on Wed, 06/30/2021 - 3:38pm
k-means
Sparks
Spark
security
Scalability
Resiliency
resilience
pubcrawl
network security
Network Security Architecture
intelligent data
Distributed databases
Compositionality
Communication networks
clustering analysis
Clustering algorithms
Big Data
arrays
biblio
Discovery of Society Structure in A Social Network Using Distributed Cache Memory
Submitted by grigby1 on Tue, 02/18/2020 - 11:56am
optimization
Web Caching
Sparks
SPARK tools
Spark
society structure
social networking (online)
social network
social media
Scalability
Resiliency
resilience
process nodes
Cache memory
Metrics
Mathematical model
mapping-reduction model
distributed memory systems
distributed cache memory
computational nodes
Computational modeling
community structure detection
community detection
Clustering algorithms
pubcrawl
cache storage
biblio
Identifying Peer-to-Peer Botnets Through Periodicity Behavior Analysis
Submitted by grigby1 on Tue, 11/26/2019 - 3:38pm
P2P bots
Spark
security
Scalability
Resiliency
resilience
pubcrawl
Periodicity Behavior Analysis
periodicity behavior
PeerGrep
Peer-to-peer computing
peer-to-peer botnets
peer to peer security
P2P hosts
P2P communications
botnet
P2P botnet
network security
Monitoring
Metrics
IP networks
IP addresses
invasive software
Human Factors
human factor
Human behavior
feature extraction
Conferences
computer network security
Botnet detection
biblio
Detection of Distributed Denial of Service (DDoS) Attacks Using Artificial Intelligence on Cloud
Submitted by grigby1 on Fri, 02/08/2019 - 4:14pm
Detectors
Spark
signature-based approach
signature
Resiliency
pubcrawl
neural nets
Neural
Metrics
Intrusion Detection
Human behavior
feature extraction
distributed denial of service attacks
digital signatures
Amazon public cloud
DDoS attack detection
DDoS
computer network security
Computer hacking
Computer crime
composability
Cloud Computing
cloud
Artificial Neural Networks
artificial intelligence security
Artificial Intelligence
anomaly-based distributed artificial neural networks
Anomaly
biblio
Survey of Data Intensive Computing Technologies Application to to Security Log Data Management
Submitted by grigby1 on Mon, 04/24/2017 - 11:42am
Big Data
big data security
big data security in the cloud
composability
computational intelligence
data intensive computing
Hadoop
Human behavior
pubcrawl
Resiliency
security event log information management
Spark
biblio
Educational Data Mining with Python and Apache Spark: A Hands-on Tutorial
Submitted by grigby1 on Tue, 03/07/2017 - 1:50pm
Big Data
Data mining
educational data mining
exploratory data analysis
learning analytics
machine learning
parallel computing
Predictive Analytics
pubcrawl170201
Python
simulation
Spark
visualization
biblio
A Big Data Architecture for Large Scale Security Monitoring
Submitted by BrandonB on Tue, 05/05/2015 - 9:23am
IP networks
transport protocols
telecommunication traffic
storage management
Spark
security
scalable distributed data storage
scalable distributed data management
network traffic
network intrusion prevention
network intrusion detection
NetFlow records
Monitoring
local enterprise networks
large scale security monitoring
Big Data
HTTP traffic
honeypot data
Hadoop
forensic analysis
DNS data
distributed system
Distributed databases
Digital Forensics
Data mining
data exploitation
data correlation schemes
Correlation
computer network security
Big Data architecture