Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cancer
biblio
DANTE: Predicting Insider Threat using LSTM on system logs
Submitted by aekwall on Mon, 11/08/2021 - 2:22pm
Cancer
CERT dataset
data privacy
information and communication technology
insider threat
logs
LSTM
Measurement
Natural languages
Predictive models
privacy
pubcrawl
Recurrent neural networks
RNN
security
threat vectors
biblio
Private Identity-Based Encryption For Key Management
Submitted by grigby1 on Mon, 03/29/2021 - 1:23pm
Cancer
computer science
encryption
Human behavior
Identity management
Identity-based encryption
key management
Lung
Private Identity
Protocols
pubcrawl
resilience
Resiliency
Scalability
biblio
Adding Noise Trajectory for Providing Privacy in Data Publishing by Vectorization
Submitted by grigby1 on Mon, 12/28/2020 - 11:40am
Metrics
vector-based grid environment
Trajectory
scientific research
Scalability
Resiliency
resilience
Publishing
pubcrawl
privacy protection
privacy
noise trajectory
-Privacy-Publishing-Data
Keywords-—-Noise-trajectory
Human behavior
grid computing
Databases
data utility
data publishing
data privacy
Cancer
business purpose
big data privacy
-Surrogate-Vector
biblio
An approach of dredging the interconnected nodes and repudiating attacks in cloud network
Submitted by aekwall on Mon, 07/20/2020 - 9:46am
cloud data transmission
cloud environment
authorization
security challenges
security models
cloud computing environment
cloud service providers
Cancer
cloud computing network
pubcrawl
cloud networks attack
interconnected nodes
malignant nodes
mallicious nodes
repudiating attacks
secure transaction
white box cryptography
Peer-to-peer computing
authorisation
data privacy
telecommunication security
Cryptographic Protocols
Protocols
Resiliency
composability
security attacks
Cloud Computing
Cryptography
Metrics
privacy
Probabilistic logic
probability
security mechanisms
authentication
biblio
APT Attack Behavior Pattern Mining Using the FP-Growth Algorithm
Submitted by grigby1 on Mon, 03/19/2018 - 12:55pm
host PC security technologies
signature-based intrusion detection systems
Scalability
Resiliency
resilience
pubcrawl
PE files
Pattern Mining
pattern matching
Metrics
malware
Intrusion Detection
Human behavior
advanced persistent threat attacks
FP-growth algorithm
firewalls
digital signatures
Data mining
Conferences
Cancer
APT attack behavior pattern mining
APT attack
application program interfaces
API files
advanced persistent threats
biblio
Identifying Personal DNA Methylation Profiles by Genotype Inference
Submitted by grigby1 on Tue, 01/23/2018 - 1:54pm
Human behavior
whole-genome sequencing
Resiliency
pubcrawl
privacy-sensitive data
privacy
predictive medicine
personalized medicine
personal DNA methylation profiles
Metrics
medical computing
Law
inference mechanisms
human health
bioinformatics
health care
genotype inference
genomics
genomic data
epigenetic element
DNA methylation data
DNA cryptography
DNA
data privacy
Cryptography
cryptographic scheme
Cancer
biomedical research community
biblio
Security with privacy - A research agenda
Submitted by BrandonB on Tue, 05/05/2015 - 8:35am
PE applications
social media
security of data
security
Research Agenda
privacy-preserving data management
privacy-preserving data analysis
privacy-enhancing techniques
privacy
PII
personally identifiable information
PE techniques
Big Data
outsourced data
Media
encryption
Electronic mail
data sources
data privacy
cloud environment
Cloud Computing
Cancer
business intelligence
big data analysis