Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
personal information
biblio
Mobile APP Personal Information Security Detection and Analysis
Submitted by grigby1 on Fri, 11/18/2022 - 1:17pm
information security
pubcrawl
policy-based governance
collaboration
privacy
static analysis
Manuals
Force
personal information
information science
Software Testing
Security Policies Analysis
Memory
Mobile app
biblio
PIDS: An Essential Personal Information Detection System for Small Business Enterprise
Submitted by grigby1 on Thu, 02/24/2022 - 11:22am
security
Scalability
pubcrawl
Privacy Policies
Privacy Agent
personal information
mechatronics
Human behavior
Data protection
Data mining
data leakage
Costs
collaboration
Business
biblio
Investigation on Privacy Preserving using K-Anonymity Techniques
Submitted by grigby1 on Thu, 01/28/2021 - 1:00pm
medical conditions
UML
Resiliency
resilience
Repository
pubcrawl
Privacy-preserving
privacy preserving
Portals
personal information
person-identifiable information
online portals
Metrics
anonymity
k-anonymity techniques
k-anonymity
Human behavior
data repository
data privacy
Data mining
data encryption
Cryptography
credit card information
computing device pervasiveness
composability
component
biblio
De-identification and Privacy Issues on Bigdata Transformation
Submitted by grigby1 on Mon, 12/28/2020 - 11:39am
ICT industry
t-closeness
Scalability
Resiliency
resilience
pubcrawl
privacy attacks
privacy
personal information
Metrics
l-Diversity
k-anonymity
Industries
Big Data
Human behavior
Guidelines
government sectors
diseases
de-identification processes
data privacy
Data models
data analysis
controllable privacy level
Big Data transformation
big data privacy
biblio
Differential Inference Testing: A Practical Approach to Evaluate Sanitizations of Datasets
Submitted by grigby1 on Thu, 07/09/2020 - 12:57pm
Predictive models
testing
Sociology
sensitive information
sensitive attribute
Scalability
sanitized data
sanitization techniques
sanitization
Resiliency
resilience
pubcrawl
privacy models
privacy
Compositionality
personal information
machine learning
l-Diversity
k-anonymity
Inferences
inference mechanisms
Human Factors
Human behavior
differential privacy
differential inference testing
Data Sanitization
data privacy
data deletion
biblio
Improvement in Phishing Websites Detection Using Meta Classifiers
Submitted by grigby1 on Fri, 06/19/2020 - 10:49am
Phishing
WEKA
Web sites
trusted Web pages
Trusted Computing
smart devices
single classifier model
Scalability
Resiliency
resilience
pubcrawl
Policy-Governed Secure Collaboration
policy-based governance
Phishing Websites Detection
phishing Websites
Accuracy
personal information
pattern classification
modern computers
meta classifiers
Meta Classifier
Internet security
internet
fraudulent websites
fraudulent practices
false trust
F-measure
ensemble classifiers
Computer crime
biblio
A Forensics Activity Logger to Extract User Activity from Mobile Devices
Submitted by grigby1 on Wed, 06/03/2020 - 11:03am
mobile devices
user activity
tools
tool
smartphone
Scalability
Resiliency
resilience
register
pubcrawl
personal tracker
personal information
performance evaluation
Oxygen
Mobile handsets
activity
mobile computing
mobile
Metrics
information forensics
information filtering
Human Factors
Human behavior
forensics activity logger
Forensics
Digital Forensics
Data mining
daily activities
android
biblio
Optimized Data de-Identification Using Multidimensional k-Anonymity
Submitted by aekwall on Mon, 04/20/2020 - 9:24am
data quality
privacy models and measurement
privacy protection mechanism
privacy preserving
privacy leak risk
priority weight-adjusted method
personal privacy
personal information
optimized multidimensional method
multidimensional k-anonymity
mean difference recommending tree method
MDR tree method
k-anonymity
information loss rate
globalized knowledge economy
de-identification
Big Data
data authenticity preservation
big data analysis
anonymization-based de-identification method
information loss
greedy algorithms
Big Data Analytics
Numerical models
data privacy
Measurement
data analysis
Data protection
Metrics
privacy
pubcrawl
Data models
biblio
Optimized Data de-Identification Using Multidimensional k-Anonymity
Submitted by aekwall on Mon, 04/20/2020 - 9:24am
data quality
privacy models and measurement
privacy protection mechanism
privacy preserving
privacy leak risk
priority weight-adjusted method
personal privacy
personal information
optimized multidimensional method
multidimensional k-anonymity
mean difference recommending tree method
MDR tree method
k-anonymity
information loss rate
globalized knowledge economy
de-identification
Big Data
data authenticity preservation
big data analysis
anonymization-based de-identification method
information loss
greedy algorithms
Big Data Analytics
Numerical models
data privacy
Measurement
data analysis
Data protection
Metrics
privacy
pubcrawl
Data models
biblio
An Approach for Sending a Confidential Message to the Restricted Users in Defence Based Organization
Submitted by grigby1 on Wed, 03/18/2020 - 11:27am
group key
Secure File Sharing
resilience
Resiliency
pubcrawl
user list
untrusted cloud storages
third-party applications
storage node
spammer
security problem
secure platform
profiling users
personal information
group member communication
Group Manager
Cryptography
file transfer
file sharing process
dynamic broadcasting encryption
defense-based organization
defense networks
defense network
defence based organization
decryption
confidential message
storage management
Organizations
Public key
Cloud Computing
Access Control
encryption
1
2
3
next ›
last »