Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pubcrawl170105
biblio
"Cross-Device Consumer Identification"
Submitted by grigby1 on Thu, 02/23/2017 - 11:58am
gradient boosting decision trees
Xgboost
Training
random forest algorithm
Random Forest
pubcrawl170105
Predictive models
personal information
performance evaluation
learning (artificial intelligence)
IP networks
internet
ICDM2015 contest
advertising companies
GBM
GBDT
Ensemble
deep learning
Decision trees
Data models
cross-device consumer identification
consumer identity
consumer behaviour
Computers
Computational modeling
advertising data processing
biblio
"An Artificial Intelligence-Based Trust Model for Pervasive Computing"
Submitted by grigby1 on Thu, 02/23/2017 - 11:56am
human-like decision making
user trustworthiness
ubiquitous computing scenarios
ubiquitous computing
Trusted Computing
trust model
security
pubcrawl170105
pervasive computing
pattern classification
network interactions
naïve Bayes classifier
Itemsets
Apriori algorithm
effective trust model
Decision Making
Data mining
computers arena
computational services distribution
Computational modeling
Classification algorithms
behavioral patterns
Bayes methods
artificial intelligence-based trust model
Artificial Intelligence
biblio
"Approach to Enhancing Concurrent and Self-Reliant Access to Cloud Database: A Review"
Submitted by grigby1 on Thu, 02/23/2017 - 11:54am
encryption algorithm
storage management
Servers
self-reliant access
security
pubcrawl170105
Protected Database-as-a-Service
power station
multiple geographically distributed clients
multiple business
metadata storage
metadata
meta data
Master key
Advance Encryption Standard
encryption
Distributed databases
database-as-a-service
database management
database installation
customer services
Cryptography
confidentiality
concurrent access
concurrency (computers)
commerce
cloud database
Cloud Computing
biblio
"Bit-Level Differential Power Analysis Attack on Implementations of Advanced Encryption Standard Software Running Inside a PIC18F2420 Microcontroller"
Submitted by grigby1 on Thu, 02/23/2017 - 11:52am
Mathematical model
side channel attacks
pubcrawl170105
Power measurement
Power demand
Power Attacks
PIC18F2420 microcontroller
microcontrollers
microcontroller security
microcontroller privacy
microcontroller
advanced encryption standard software
encryption
Differential Power Analysis
Data protection
data integrity
data confidentiality
Cryptography
cryptographic algorithms
bit-level differential power analysis attack
AES
biblio
"Honeypot based unauthorized data access detection in MapReduce systems"
Submitted by grigby1 on Thu, 02/23/2017 - 11:49am
data processing capabilities
unauthorized data access detection
pubcrawl
privacy
parallel processing
on-demand scalability
MapReduce systems
honeypot
homomorphic encryption methods
general programming languages
Distributed databases
Big Data
data privacy
Data models
data encryption
data analytics tasks
data analysis
Cryptography
pubcrawl170105
Computational modeling
Cloud Computing
Big Data revolution
biblio
"P2V: Effective Website Fingerprinting Using Vector Space Representations"
Submitted by grigby1 on Thu, 02/23/2017 - 11:45am
natural language processing
word vector representations
Web sites
Web site fingerprinting attack
Web pages
Web page destination
VSM
vector space representations
users navigation privacy
Servers
real-valued vector
pubcrawl
passive traffic analysis attack
packet to vector approach
P2V
online activists
anonymous communication
Mathematical model
machine learning
learning (artificial intelligence)
language vector space models
Internet users
Fingerprint recognition
features extraction
feature extraction
data privacy
cyber security
pubcrawl170105
Context
Computer crime
Computational modeling
biblio
"Semantic-Based Searchable Encryption in Cloud: Issues and Challenges"
Submitted by grigby1 on Thu, 02/23/2017 - 11:43am
Cloud Computing
Cryptography
data privacy
encryption
Indexes
pubcrawl170105
information security
information security technique
privacy-preserving issue
pubcrawl
searchable encryption
semantic search
semantic-based searchable encryption
Semantics
Servers
biblio
"Auditing Protocols for Cloud Storage: A Survey"
Submitted by grigby1 on Thu, 02/23/2017 - 11:41am
auditing protocol
Cloud Computing
cloud storage
Computational modeling
Data models
data privacy
information science
integrity
outsourcing
protocol auditing
Protocols
pubcrawl170105
Scalability
Secure
security
biblio
"Verification for Security-Relevant Properties and Hyperproperties"
Submitted by grigby1 on Thu, 02/23/2017 - 11:37am
model checking
wireless sensor networks
verification
Time factors
security-relevant property verification
security-relevant properties
security policy
Safety
pubcrawl
program verification
privacy analysis
Access Control
liveness
hyperproperty verification
hyperproperty
fairness
embedded systems
pubcrawl170105
data privacy preservation
data privacy
Computational modeling
biblio
"Improved Detection of 1-2-4 LSB Steganography and RSA Cryptography in Color and Grayscale Images"
Submitted by grigby1 on Thu, 02/23/2017 - 11:36am
image colour analysis
Steganography
security
RSA cryptography
RSA
public key cryptography
pubcrawl170105
pubcrawl
privacy
LSB
Image edge detection
1-2-4 LSB steganography
Image color analysis
hidden knowledge
grayscale images
Gray-scale
encryption
data privacy
Cryptography
color images
Color
1
2
3
next ›
last »