Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
big data security
biblio
Edge Computing for User-Centric Secure Search on Cloud-Based Encrypted Big Data
Submitted by aekwall on Mon, 07/13/2020 - 10:06am
sensitive data
multisource Big Data search space
pattern clustering
Privacy-Preserving Big Data
pruning system
pubcrawl
Resiliency
Scalability
semantic search
Metrics
user privacy in the cloud
User-based Sampling
user-centric cloud services
user-centric search ability
user-centric search system
user-centric secure search
user-side encryption
big data security
markov chain
encryption
Encrypted Clustering
edge computing
data structures
data privacy
data control
Cryptography
cloud-based solutions
cloud service providers
cloud provider
Cloud Computing
big dataset clustering
big data encryption
Big Data
biblio
The Anti-Data-Mining (ADM) Framework - Better Privacy on Online Social Networks and Beyond
Submitted by aekwall on Mon, 07/13/2020 - 10:06am
New Paradigms for Privacy
big data security
Cloud Privacy
data centers
deception
eavesdropping governments
enhanced privacy
enormous growth
Financial Terminal Privacy
financial terminal providers
Financial Terminal Security
Future of Privacy
information accumulators
big data privacy
Obfuscation for Privacy
Privacy against Ad Networks
Privacy against timing attacks
Search Engine Privacy
sensitive data suppression
social network
social-bots
unprecedented growth
user privacy
users privacy
user privacy in the cloud
obfuscation
Big Data
data privacy
security
Resiliency
pubcrawl
privacy
Facebook
online social networks
social networking (online)
Metrics
Data mining
Scalability
Cloud Computing
Cloud Security
search engines
disinformation
ADM
Adversarial Face Detection
Adversarial Face Recognition
Adversarial Machine Learning
adversaries
Advertising Privacy
Anti-Data-Mining
anti-data-mining principle
biblio
Enhancing Big Data Security using Elliptic Curve Cryptography
Submitted by grigby1 on Fri, 06/26/2020 - 11:55am
map reduce Hadoop
Servers
security of data
security and privacy
Scalability
Resiliency
resilience
public key cryptography
pubcrawl
Metrics
Big Data
Indium tin oxide
Elliptic curve cryptography
data processing technology
data distribution
data configuration
data analysis
big data security
big data analytics.
biblio
Security of Medical Big Data Images using Decoy Technique
Submitted by aekwall on Mon, 06/01/2020 - 9:42am
MRI reports
honey-pot
honeypot intrusion detection
Human Factors
Intrusion Detection
Medical Big Data
medical Big Data image security
medical image processing
Medical services
honey pots
pubcrawl
radiology
Resiliency
Scalability
security
security of data
teleradiology
X-rays
Databases
automation
Big Data
Biomedical imaging
biomedical MRI
biomedical telemetry
Cloud Computing
computerised tomography
CT scans
big data security
Decoy
decoy technique
diagnostic radiography
EHR security
electronic health records
health care
healthcare cloud
healthcare units
biblio
A Framework for Integrating Big Data Security Into Agricultural Supply Chain
Submitted by grigby1 on Thu, 03/12/2020 - 11:08am
Scalability
perishable products
Productivity
pubcrawl
Real time control
real-time systems
reliability system
resilience
Resiliency
Monitoring
security
security of data
supply chain management
supply chain security
supply chains
sustainability requirements
waste reduction
advanced monitoring systems
Internet of Things
Human behavior
food waste reduction
food waste
food supply chain system
food safety
food production
food processing industry
Data integration
big data security
Big Data
Agriculture
Agricultural supply chains
agricultural supply chain management system
agricultural products
biblio
An Efficient Framework for Big Data Security Based on Selection Encryption on Amazonec2
Submitted by grigby1 on Tue, 01/07/2020 - 9:54am
encryption
unimportant portion
Toss-A-Coin method
Selective Encryption
selection encryption
security framework
Resiliency
resilience
pubcrawl
ordinary encryption methods
Indexes
encryption time
encryption method
Amazon EC2
efficient encryption
cyber physical systems
Cyber Physical System
Cryptography
computer science
composability
Cloud Computing
cloud
Ciphers
big data security
Big Data
biblio
Anomaly Detection in Cyber Security Attacks on Networks Using MLP Deep Learning
Submitted by grigby1 on Fri, 03/22/2019 - 12:01pm
J48
WEKA
Scalability
Resiliency
resilience
pubcrawl
multilayer perceptrons
Multilayer Perceptron (MLP)
Multilayer Perceptron
MLP deep learning
Metrics
malware data
malware attacks
malware
machine learning
learning (artificial intelligence)
Advanced Security Network Metrics \\& NonPayload-Based Obfuscations
invasive software
information security
ID3
feature extraction
deep learning
Decision trees
cyber security threats
cyber security attacks
cyber security
Correlation
computer network security
C4.5
big data security
Big Data
Anomaly Detection
biblio
Service Oriented Resilience Strategy for Cloud Data Center
Submitted by grigby1 on Fri, 03/22/2019 - 12:01pm
Measurement
system resilience
Stochastic processes
service oriented resilience
Servers
Scalability
Resilience strategy
resilience metric
resilience
quality of service
pubcrawl
Petri nets
Metrics
Resilient Security Architectures
maintenance engineering
IT architecture
hierarchical colored generalized stochastic petri net
fault tolerance
data centers
computer networks
computer centres
cloud data center
Cloud Computing
big data security
Big Data
Resiliency
biblio
Novel Anomaly Detection and Classification Schemes for Machine-to-Machine Uplink
Submitted by grigby1 on Fri, 03/22/2019 - 12:01pm
Monte Carlo methods
low-false alarm rate
low-volume sophisticated attacks
M2M
M2M emergency
machine-to-machine communications
machine-to-machine networks
machine-to-machine uplink
Measurement
Metrics
modified Canberra distance metric
low-complexity
Monte-Carlo simulations
pubcrawl
resilience
Resiliency
Scalability
sensors
standard information technology systems
terminal device failures
volumetric anomaly detection
emergency scenarios
anomaly detection schemes
big data security
classification schemes
Computer crime
computer network security
cyber-attacks
cyber-vulnerabilities
DDoS Attack
Device failures
distributed denial-of-service attacks
Anomaly Detection
Engines
feature extraction
feature-based detection schemes
general M2M uplink
high false-alarm rate
internet
intrusion detection schemes
IT networks
legitimate M2M connections
biblio
Behavioral Based Trust Metrics and the Smart Grid
Submitted by grigby1 on Fri, 03/22/2019 - 12:00pm
Smart Grid
pubcrawl
resilience
Resiliency
Routing
Scalability
security
security of data
service level strategies
power system security
smart power grids
statistical analysis
substation protection
Substations
telecommunication network routing
trust levels
trust measurements
Trusted Communications
learning (artificial intelligence)
behavioral pattern analysis
big data security
communication routing
critical components
electrical grid
Entropy
Grid Security
Grid Trust
behavioral based trust metrics
Mathematical model
Metrics
microsoft windows
Monitoring
network anomaly detection
network security
power engineering computing
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »