Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
streaming data
biblio
Decentralized Data Marketplace to Enable Trusted Machine Economy
Submitted by aekwall on Mon, 09/21/2020 - 3:40pm
streaming data
data marketplaces
decentralization
decentralized architecture
decentralized data marketplace
encrypted message channel
Evolutionary Game Theory
matching process
refunding processes
strategic decision-making
Data marketplace
trade records
trading policies
trading process
trusted data streams
trusted machine economy
trustless architecture
verifiable Auth-compliant request
Computer Theory and Trust
data providers
data privacy
data integrity
distributed processing
game theory
computer network management
pubcrawl
composability
Decision Making
Cryptography
Compositionality
transaction processing
financial data processing
distributed ledgers
transaction process
IoT data
contract-oriented interactions
customer experiences
biblio
Enhancing First Story Detection Using Word Embeddings
Submitted by grigby1 on Wed, 08/02/2017 - 1:28pm
document expansion
locality sensitive hashing
Metrics
nearest neighbor search
nearest neighbour search
paraphrase
pubcrawl
streaming data
Twitter
biblio
"SNAPS: Semantic network traffic analysis through projection and selection"
Submitted by abfox on Tue, 02/14/2017 - 1:40pm
semantic network traffic analysis through projection and selection
online monitoring tasks
packet inspection
parse data analysis
Payloads
post-traffic analysis
Protocols
pubcrawl170101
security breaches
network traffic analysis
Semantic Networks
Semantics
SNAPS
streaming data
telecommunication computing
telecommunication security
telecommunication traffic
Interaction
advanced persistent threats
Anomaly Detection
bottom-up pixel-oriented approach
Context
Data visualization
high-level flow-based message properties
Histograms
Image color analysis
advanced persistent threat
Iterative methods
learning (artificial intelligence)
low-level anomalies
machine learning
malicious activity
multivariate analysis
network level security risk