Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mining
biblio
Execution of Big Data Analytics in Automotive Industry using Hortonworks Sandbox
Submitted by grigby1 on Wed, 05/05/2021 - 12:57pm
Databases
Social network services
Scalability
sandboxing
pubcrawl
policy-based governance
mining
Map Reduce
Industries
automobile industry
composability
collaboration agreements
collaboration
Business
Big Data
Automotive engineering
automobiles
biblio
Analysis of Computer Network Information Security under the Background of Big Data
Submitted by grigby1 on Fri, 04/09/2021 - 11:24am
policy-based governance
Internet era
large-scale network environment
large-scale network security situational awareness
Metrics
mining
network security
OWL
parallel computing
people
internet
pubcrawl
Quality function deployment
resilience
Resiliency
Scalability
security perception
Situation Awareness
Smart Grids
Xenon
data acquisition
big data acquisition
big data analysis platform
Big Data technology
collaboration
composability
comprehensive arrival
computer network information security
computer network security
Conferences
Big Data
data analysis
data subject
distributed computing
Frequency locked loops
Hafnium compounds
Human behavior
Information Assurance
information security assurance services
information system
biblio
Safety and Damage Assessment Method of Transmission Line Tower in Goaf Based on Artificial Intelligence
Submitted by grigby1 on Tue, 02/16/2021 - 1:41pm
structural engineering computing
damage identification
finite element simulation model
foundations
geometric model
Goaf
mining industry
operation safety
random forest algorithm
damage assessment method
structural reliability model
surface subsidence
tower collapse
tower foundation interaction
transmission line tower
transmission line tower safety
Damage Assessment
Forestry
coal seam
coal mine goaf
coal
Transmission line measurements
mining
Poles and towers
power transmission lines
finite element analysis
Reliability
random forests
Safety
Resiliency
resilience
pubcrawl
Artificial Intelligence
biblio
Effective Scheme against 51% Attack on Proof-of-Work Blockchain with History Weighted Information
Submitted by aekwall on Mon, 09/28/2020 - 11:41am
blockchain security
proof-of-work blockchain
PoW blockchains
mining
history weighted information
hash power
double-spending problems
double-spending attack
Double spending attack
blockchain systems
51% Attack
Switches
security of data
cryptocurrencies
Data mining
blockchain
Cryptography
Peer-to-peer computing
pubcrawl
Resiliency
Protocols
History
Cryptographic Protocols
Scalability
biblio
Same App, Different Countries: A Preliminary User Reviews Study on Most Downloaded iOS Apps
Submitted by grigby1 on Thu, 07/30/2020 - 2:33pm
iOS Security
User Reviews Analysis
US App Store
Text Mining
software maintenance
software evolution
requirement engineering
preliminary user reviews study on most downloaded iOS apps
mobile app reviews
mining
differentiate reviews
App Store Analytics
analyzing user reviews
643 user reviews
300 user reviews
15 most downloaded iOS apps
security
Google
Software algorithms
operating systems (computers)
Compositionality
Metrics
mobile computing
software quality
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
Forestry
Data mining
biblio
On the Strategy and Behavior of Bitcoin Mining with N-attackers
Submitted by aekwall on Mon, 03/18/2019 - 9:51am
Scalability
Human behavior
pubcrawl
bitcoin
mining
n-attackers
selfish mining
bitcoin security
biblio
Digging into Browser-Based Crypto Mining
Submitted by grigby1 on Mon, 11/19/2018 - 12:16pm
blockchain
cryptocurrency
cryptojacking
Human behavior
malware
Metrics
mining
Monero
pubcrawl
resilience
Resiliency
Wasm
Webassembly
biblio
MMM: May I Mine Your Mind
Submitted by grigby1 on Mon, 11/19/2018 - 12:16pm
cryptocurrency
cryptojacking
Human behavior
Metrics
mining
pubcrawl
resilience
Resiliency
reward system
security
biblio
MineSweeper: An In-Depth Look into Drive-by Cryptocurrency Mining and Its Defense
Submitted by grigby1 on Mon, 11/19/2018 - 12:16pm
cryptocurrency
cryptojacking
drive-by attacks
Human behavior
malware
Metrics
mining
pubcrawl
resilience
Resiliency
biblio
A First Look at Browser-Based Cryptojacking
Submitted by grigby1 on Mon, 11/19/2018 - 12:15pm
Monero
Google
Human behavior
internet
Java
JavaScript code
marketing data processing
Metrics
mining
financial data processing
online front-ends
pubcrawl
resilience
Resiliency
source code (software)
Web sites
website
cryptocurrency
bitcoin
blockchain
botnet
browser mining
browser-based mining
Browsers
Central Processing Unit
Coinhive
advertisement revenue
cryptocurrency Monero
Cryptography
cryptojacking
Data mining
data privacy
electronic money
ethics
1
2
next ›
last »