Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
SQL queries
biblio
Chorus: a Programming Framework for Building Scalable Differential Privacy Mechanisms
Submitted by aekwall on Mon, 01/11/2021 - 12:43pm
data privacy protection
weighted PINQ
scalable differential privacy mechanisms
scalability requirements
real-world queries
query rewriting
programming
MWEM
matrix mechanism
high-performance production database management system
Chorus
DBMS
security
SQL queries
differential privacy
database management systems
statistical analysis
privacy
Data protection
composability
pubcrawl
Human behavior
Resiliency
Scalability
biblio
Machine Learning and Social Media to Mine and Disseminate Big Scientific Data
Submitted by grigby1 on Fri, 05/22/2020 - 1:43pm
social media
ORNL
pubcrawl
query processing
relational databases
resilience
Resiliency
Scalability
scientific data mining
scientific databases
Oak Ridge National Laboratory
social media interaction
social networking (online)
SQL
SQL language
SQL queries
stream pipelining
structured databases
Structured Query Language
Twitter
Databases
big scientific data
Data discovery
data dissemination
Data mining
data retrieval
data streams
data-intensive projects
Database languages
database queries
atmospheric radiation measurement data center
easy search
environmental data centers
Human behavior
information dissemination
Laboratories
learning (artificial intelligence)
machine learning
machine learning framework
natural language processing
biblio
Automatic Whitelist Generation for SQL Queries Using Web Application Tests
Submitted by grigby1 on Mon, 02/10/2020 - 10:26am
severe vulnerability issue
query patterns
query processing
Registers
relational databases
relational database security
research and development
resilience
Resiliency
security of data
query detection
SQL
SQL detection
SQL injection
SQL queries
Web application test
Web application tests
Whitelist
Whitelists
development process
automated generation
Automatic testing
automatic whitelist generation
blacklisting
collaboration
composability
confidential information
Database Security
Databases
application-specific implementations
Human behavior
internet
large-scale Web applications
legitimate queries
Metrics
policy-based governance
privacy
pubcrawl
biblio
ServeDB: Secure, Verifiable, and Efficient Range Queries on Outsourced Database
Submitted by aekwall on Mon, 11/25/2019 - 1:12pm
secure scheme
Outsourced Database
outsourcing
privacy
privacy concerns
pubcrawl
query processing
query results
result integrity
scalable scheme
one-dimensional query
secure tree index
Servers
SQL
SQL queries
sublinear query time
tree data structures
verifiability
verifiable range queries
database management systems
Metrics
composability
Resiliency
cloud adoption
Cryptography
data encryption
data outsourcing
data privacy
Outsourced Database Integrity
efficiency
efficient range queries
encrypted data
formal security analysis
Indexes
Multi-dimensional range query
multidimensional data records
multidimensional range query
biblio
Towards Modelling Insiders Behaviour as Rare Behaviour to Detect Malicious RDBMS Access
Submitted by aekwall on Mon, 11/04/2019 - 10:23am
Insider Threats
access control mechanisms
and Data mining
anomaly-based Intrusion Detection Systems
application data
data leakage
Database intrusion detection
Database monitoring
detect malicious RDBMS access
relational database security
malicious access
malicious RDBMS accesses
persistent concern
RDBMS
relational database management systems
SQL queries
towards modelling insiders
unauthorized employees
Metrics
authorisation
Big Data
Organizations
Data models
Resiliency
Human behavior
pubcrawl
composability
security of data
query processing
SQL
Training
Data mining
malicious insiders
insider attacks
relational databases
biblio
SQL injection attack detection using fingerprints and pattern matching technique
Submitted by grigby1 on Thu, 06/07/2018 - 2:13pm
Policy
Web-based applications
String Search
SQL queries
SQL injection detection approaches
SQL Injection attacks
SQL injection attack detection framework
SQL Injection Attack Detection
SQL injection
SQL
Resiliency
pubcrawl
programming
privacy
Policy-Governed Secure Collaboration
policy-based governance
attack signatures
pattern matching technique
pattern matching
password
OWASP
Open Web Application Security Project Top Ten Cheat sheet
intranet
internet
Human behavior
fingerprinting method
Fingerprint recognition
fingerprint method
Engines
Databases
computer network security
collaboration
biblio
DDOS Attack Detection System Based on Analysis of Users' Behaviors for Application Layer
Submitted by grigby1 on Tue, 01/16/2018 - 5:24pm
pubcrawl
feature extraction
Human behavior
internal attackers
internal threats detection
Intrusion Detection
Law
Markov processes
Metrics
DTMC
query processing
Resiliency
Servers
SQL
SQL queries
User behavior
users behaviors analysis
database system
Anomaly Detection
anomaly detection system
Application Layer
behavior features extraction
composability
Computer crime
computer network security
database management systems
anomaly behavior
Databases
DDoS attack detection
DDOS attack detection system
discrete-time markov chain
discrete-time Markov chains
distributed denial of service attack
distributed denial of service attacks