Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Big Data technology
biblio
Big Data Analytics for Smart Education
Submitted by grigby1 on Tue, 06/14/2022 - 1:11pm
Organizations
pubcrawl
resilience
Resiliency
Scalability
Big Data
Data Security
Data visualization
Performance
education
big data security metrics
Memory
Productivity
Analysis of Learning
Big Data technology
biblio
Research on the Application of Computer Big Data Technology in Cloud Storage Security
Submitted by grigby1 on Mon, 06/13/2022 - 3:36pm
computer architecture
Cloud Computing
pubcrawl
resilience
Resiliency
Conferences
Scalability
cloud storage
Data Security
Metrics
big data security in the cloud
Computer applications
Big Data technology
Memory
computer
Costs
biblio
Analysis of Computer Network Information Security under the Background of Big Data
Submitted by grigby1 on Fri, 04/09/2021 - 11:24am
policy-based governance
Internet era
large-scale network environment
large-scale network security situational awareness
Metrics
mining
network security
OWL
parallel computing
people
internet
pubcrawl
Quality function deployment
resilience
Resiliency
Scalability
security perception
Situation Awareness
Smart Grids
Xenon
data acquisition
big data acquisition
big data analysis platform
Big Data technology
collaboration
composability
comprehensive arrival
computer network information security
computer network security
Conferences
Big Data
data analysis
data subject
distributed computing
Frequency locked loops
Hafnium compounds
Human behavior
Information Assurance
information security assurance services
information system
biblio
Software Defined Security Architecture with Deep Learning-Based Network Anomaly Detection Module
Submitted by aekwall on Mon, 03/16/2020 - 10:34am
learning (artificial intelligence)
Software Defined Security
software defined networking
security protection methods
security data platform
Scalable Security
scalable network anomaly detection module
Scalability
Resiliency
real-time online detection
real-time online anomaly detection
pubcrawl
Network Security Architecture
network data
network attack technology
network anomaly detection technology
Metrics
internet
hypermedia
deep learning-based network anomaly detection module
deep learning
data-driven software defined security architecture
data-driven security business orchestration
data-driven orchestration engine
data driven security business orchestration
computer network security
Big Data technology
Big Data
anomaly detection algorithm module
Dynamic Networks and Security
composability
biblio
Fine-Grained Big Data Security Method Based on Zero Trust Model
Submitted by grigby1 on Mon, 08/05/2019 - 11:40am
fine-grained big data security method
zero trust model
zero trust
security of data
Scalability
risky data access
Resiliency
resilience
pubcrawl
policy-based governance
legacy security technologies
Human Factors
Human behavior
fine-grained data access authentication control
Big Data
drugs
data security risks
data security domain
Data Security
data processing capacity
data privacy
data access audit
Conferences
big data usage
Big Data technology
big data security control
big data environment
biblio
Policy Design Based on Risk at Big Data Era: Case Study of Privacy Invasion in South Korea
Submitted by BrandonB on Tue, 05/05/2015 - 9:24am
risk avoidance
impact level
individual ICT risk
individualism group
intensive ICT risk
Moon
personal data
privacy
privacy invasion
probability level
risk acceptance
ICT security
risk management
risk mitigation
risk transfer
security
severe ICT risk
social science perspective
South Korea
strong ICT risk
technological risk
data spill accident case analysis
Big Data
Big Data characteristics
Big Data laws
Big Data market
Big Data norms
Big Data technology
cultural types
culture type
data privacy
Accidents
data variety
data velocity
data volume
egalitarianism group
fatalism group
hierarchy group
ICT policy
ICT risk based policy design
ICT risk management