Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data deletion
biblio
Predicting and Preventing Malware in Machine Learning Model
Submitted by grigby1 on Thu, 07/09/2020 - 12:57pm
Random Forest
machine learning model
malware prediction
malware prevention
pattern classification
Predictive models
privacy
privacy preserving technique
pubcrawl
machine learning algorithms
random forests
resilience
Resiliency
Scalability
security
support vector machine
Support vector machines
Training
Decision Tree
Algorithm robustness enhancement
Causative attack
Classification algorithms
Compositionality
data deletion
Data models
data privacy
Data Sanitization
AdaBoost
Decision trees
exploratory attack
Human behavior
Human Factors
invasive software
K-nearest-neighbors classifier
KNN classifier
machine learning
biblio
Detecting Input Sanitization Errors in Scala
Submitted by grigby1 on Thu, 07/09/2020 - 12:57pm
program diagnostics
taint analysis
static types
sensitive sink methods
security of data
ScalaTaint
Scalability
Scala programming language
Scala Compiler
Scala applications
Resiliency
resilience
pubcrawl
programming languages
Compositionality
privacy
object-oriented programming
input sanitization errors
Input Sanitization
Human Factors
Human behavior
high-level language
functional programming
Error
dynamic taint analyzer
Data Sanitization
data deletion
biblio
Differential Inference Testing: A Practical Approach to Evaluate Sanitizations of Datasets
Submitted by grigby1 on Thu, 07/09/2020 - 12:57pm
Predictive models
testing
Sociology
sensitive information
sensitive attribute
Scalability
sanitized data
sanitization techniques
sanitization
Resiliency
resilience
pubcrawl
privacy models
privacy
Compositionality
personal information
machine learning
l-Diversity
k-anonymity
Inferences
inference mechanisms
Human Factors
Human behavior
differential privacy
differential inference testing
Data Sanitization
data privacy
data deletion
biblio
PRETSA: Event Log Sanitization for Privacy-aware Process Discovery
Submitted by grigby1 on Thu, 07/09/2020 - 12:57pm
PRETSA
sensitive information
security of data
Scalability
Resiliency
resilience
pubcrawl
pseudonymized employee information
process model discovery
process execution
process discovery
privacy-disclosure attacks
Privacy-aware Process Mining
privacy-aware process discovery
privacy guarantees
privacy
Analytical models
Personnel
performance-annotated process model
Information systems
Human Factors
Human behavior
event log sanitization
event data
differential privacy
Data Sanitization
data privacy
Data mining
data deletion
Compositionality
business data processing
Business
biblio
CloudDLP: Transparent and Automatic Data Sanitization for Browser-Based Cloud Storage
Submitted by grigby1 on Thu, 07/09/2020 - 12:57pm
Human Factors
user data privacy
transparent data sanitization
textual documents
sensitive information
sensitive image documents
sensitive data
Scalability
Resiliency
resilience
pubcrawl
Protocols
privacy
learning (artificial intelligence)
automatic data sanitization
Human behavior
encryption
document image processing
deep learning
Data Sanitization
data privacy
data deletion
Compositionality
CloudDLP
cloud services
Cloud Computing
Browsers
browser-based cloud storage
biblio
Toward Instantaneous Sanitization through Disturbance-induced Errors and Recycling Programming over 3D Flash Memory
Submitted by grigby1 on Thu, 07/09/2020 - 12:56pm
Human behavior
three-dimensional integrated circuits
Scalability
sanitization functionalities
sanitization
Resiliency
resilience
recycling programming design
pubcrawl
programming disturbance properties
programming
privacy
NAND circuits
instantaneous data sanitization scheme
Human Factors
3D NAND flash memory chips
flash memory
flash memories
error correction codes
error correction code
encryption techniques
disturbance-induced errors
disturbance overheads
Data Security
data sanitization techniques
Data Sanitization
data deletion
Compositionality
3D NAND flash-memory-based devices
biblio
Proving Erasure
Submitted by grigby1 on Tue, 06/02/2020 - 10:55am
privacy amplification.
users
storage management
Servers
server hosting data
Scalability
Resiliency
resilience
remote hosting service
remote data storage
Quantum mechanics
quantum cryptography
pubcrawl
provable deletion
Protocols
privacy delegation
data deletion
policy-based governance
Metrics
information-theoretically
information-theoretic security
information theoretic security
Human Factors
Human behavior
encryption
eavesdropping
definite deletion
data storage
data privacy
Cryptography
BB84-like protocol
biblio
An Efficient Memory Zeroization Technique Under Side-Channel Attacks
Submitted by aekwall on Mon, 02/24/2020 - 9:55am
built-in self test
volatile memories
side-channel attacks
Side-channel attack
security violations
secured data content
secret data
random-access storage
private memory contents
on-chip memory contents
Memory Zeroization
memory security
memory built-in-self-test hardware
MBIST based content zeroization approach
efficient memory zeroization technique
content protection
security of data
Temperature sensors
cryptographic keys
remanence
Compositionality
Engines
Random access memory
data deletion
security attacks
pubcrawl
Resiliency
system-on-chip
security
Memory management
Hardware
Cryptography
biblio
FlashGhost: Data Sanitization with Privacy Protection Based on Frequent Colliding Hash Table
Submitted by aekwall on Mon, 12/16/2019 - 12:46pm
Indexes
threshold cryptography
system reliability
Servers
secret sharing
resilience
pubcrawl
privacy protection
privacy
Mathematical model
life cycle
internet
Instant messaging
data deletion
Human behavior
hash collision
frequent colliding hash table
FlashGhost
data self destructing
Data Sanitization
data privacy
Cryptography
computer network security
computer network reliability
Compositionality
automatic data sanitization system
biblio
Deleted Data Attribution in Cloud Computing Platforms
Submitted by aekwall on Mon, 03/04/2019 - 9:46am
human-in-the-loop security center paradigm
Cloud Computing
Human behavior
pubcrawl
composability
Metrics
metadata
attribution
cloud forensic
data acquisition
data deletion
digital forensic
Digital Forensics
file attribution
NIST
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »