Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data mining
biblio
Is Cryptojacking Dead After Coinhive Shutdown?
Submitted by grigby1 on Wed, 02/10/2021 - 1:11pm
cryptocurrency
victims
malicious scripts
legal mining service
legal mining scripts
in-browser mining activities
in-browser mining
cryptojacking dead
cryptocurrency mining
coinhive shutdown
coinhive scripts
cryptomining
cryptojacking
Data mining
cyberattack
malicious script
Web sites
online front-ends
Computer crime
internet
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Are You a Favorite Target For Cryptojacking? A Case-Control Study On The Cryptojacking Ecosystem
Submitted by grigby1 on Wed, 02/10/2021 - 1:10pm
Web sites
risk assessment
CryptoJacking websites
cryptojacking ecosystem
cryptojacking campaigns
compromised websites
Case-control study
browser-based mining
cryptojacking
cryptocurrency
Web servers
Hash functions
Cryptography
bitcoin
Semantics
privacy
Ecosystems
Resiliency
resilience
Metrics
Human behavior
pubcrawl
cryptocurrencies
Data mining
biblio
Behavior-Based Detection of Cryptojacking Malware
Submitted by grigby1 on Wed, 02/10/2021 - 1:10pm
behavioral analysis
virtual machine environment
malicious mining
illegitimate profit
executable-type cryptojacking
detection program
decision tree algorithm
cybercriminals
cryptojacking malware
Cryptojacking detection
cryptojacking
CPU load
complex detection technique
browser-based cryptojacking
Data mining
behavior-based detection
Ransomware
Cybercrime
Decision trees
invasive software
Computer crime
internet
Resiliency
resilience
Metrics
Human behavior
pubcrawl
cryptocurrencies
biblio
Inner edge detection of PET bottle opening based on the Balloon Snake
Submitted by grigby1 on Mon, 02/08/2021 - 2:03pm
inner edge detection
security
Scalability
Resiliency
resilience
pubcrawl
Positron emission tomography
Polyethylene
Pipelines
PET bottle opening
Noise figure
Metrics
machine vision
automation
Image edge detection
Grayscale weighting average method
Gray-scale
feature extraction
edge detection
Data mining
computer vision
composability
center location methods
bottles
balloon snake
biblio
Variable load image steganography using multiple edge detection and minimum error replacement method
Submitted by grigby1 on Mon, 02/08/2021 - 2:02pm
MER method
visual qualities
variable load image steganography
Variable embedding ratio
Steganography
security
Scalability
Resiliency
resilience
pubcrawl
PSNR
multiple edge detection
minimum error replacement method
Minimum error replacement
Metrics
canny operator
Image edge detection
Image coding
human visual system
human eyes
embedding ratio
edge pixels
edge detection
digital images
Data mining
data hiding capacity
Cryptography
Conferences
composability
biblio
Investigation on Privacy Preserving using K-Anonymity Techniques
Submitted by grigby1 on Thu, 01/28/2021 - 2:00pm
medical conditions
UML
Resiliency
resilience
Repository
pubcrawl
Privacy-preserving
privacy preserving
Portals
personal information
person-identifiable information
online portals
Metrics
anonymity
k-anonymity techniques
k-anonymity
Human behavior
data repository
data privacy
Data mining
data encryption
Cryptography
credit card information
computing device pervasiveness
composability
component
biblio
DeCrypto Pro: Deep Learning Based Cryptomining Malware Detection Using Performance Counters
Submitted by grigby1 on Fri, 01/22/2021 - 2:38pm
DeCrypto Pro
LSTM
defense mechanisms
advanced persistent threats
antivirus applications
APTs
behavior profiling
benign compression
classification model
collaborative attacks
computational resources
cryptographic operations
cryptojacking
cryptomining
Long short-term memory
DeCrypto Profiler framework
deep cryptomining profiler
mission-critical cybersystems
model selection
operating context profiling system
performance counters
Ransomware
system features
system functionalities
Trojan Laziok
utility function
Windows performance counters
cyberattacks
Predictive models
machine learning
Data mining
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Data models
Computational modeling
random forests
recurrent neural nets
Cryptography
deep learning
pattern classification
malware
invasive software
malware detection
nearest neighbour methods
k-nearest neighbors
Random Forest
advanced persistent threat
APT
deep neural networks
encoding
biblio
CryptoExplorer: An Interactive Web Platform Supporting Secure Use of Cryptography APIs
Submitted by grigby1 on Wed, 01/20/2021 - 4:20pm
interactive systems
software engineering
security
Resiliency
resilience
pubcrawl
online information sources
Java Cryptography Architecture
Java
internet
interactive Web platform
API
Data mining
Cryptography
cryptographic APIs
CryptoExplorer
Compositionality
code analysis
application programming interface
application program interfaces
APIs
biblio
Experimenting and Assessing a Distributed Privacy-Preserving OLAP over Big Data Framework: Principles, Practice, and Experiences
Submitted by grigby1 on Mon, 12/28/2020 - 12:38pm
smart cities
privacy-preserving OLAP-based big data analytics
OLAP-based Big Data Analytics
OLAP data cubes
OLAP analysis
OLAP aggregate privacy
Experiments and Analysis over Big Datasets
Emerging Big Data Applications
distributed privacy-preserving OLAP framework
Distributed Privacy-Preserving OLAP
big data framework
authoritative analytical tool
bioinformatics
big data privacy
social networks
Distributed databases
tools
Social network services
privacy preservation
Measurement
Big Data
privacy
Scalability
data privacy
Resiliency
resilience
Metrics
Human behavior
pubcrawl
Data mining
data analysis
security of data
biblio
The privacy paradigm : An overview of privacy in Business Analytics and Big Data
Submitted by grigby1 on Mon, 12/28/2020 - 12:37pm
Big Data
Technology management
privacy paradigm
GPDR
data mining technologies
dados
business analytics
analytics
big data privacy
Google
Data protection
Companies
privacy
information technology
data privacy
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
business data processing
Data mining
data analysis
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »