Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data mining
biblio
A Differential Privacy-Based Protecting Data Preprocessing Method for Big Data Mining
Submitted by aekwall on Mon, 01/06/2020 - 10:35am
data privacy
Resiliency
privacy protection
privacy disclosure issue
privacy
precise clustering results
pattern clustering
Human behavior
distortion
distancebased clustering
distance-based clustering
differential privacy-based protecting data preprocessing method
differential privacy budget parameter
differential privacy
big data privacy
Data preprocessing
Data mining
data distortion technique
composability
Clustering algorithms
big data mining
adaptive privacy budget parameter adjustment mechanism
adaptive mechanism
Metrics
Scalability
resilience
Human Factors
pubcrawl
biblio
A Multiple Objective PSO-Based Approach for Data Sanitization
Submitted by aekwall on Mon, 12/16/2019 - 1:47pm
resilience
privacy-preserving and security
nondominated solutions
multiple objective PSO-based approach
multiple objective
multiobjective particle swarm optimization-based framework
grid-based algorithm
Itemsets
genetic algorithms
Data Sanitization
Compositionality
security
probability
privacy
Data mining
particle swarm optimization
particle swarm optimisation
optimization
pubcrawl
Human behavior
Task Analysis
biblio
A Swarm-based Data Sanitization Algorithm in Privacy-Preserving Data Mining
Submitted by aekwall on Mon, 12/16/2019 - 1:47pm
artificial cost
swarm-based data sanitization algorithm
privacy-preserving data mining
PPDM
Pareto solutions
multiobjective PSO
multiobjective
missing cost
Itemsets
hierarchical clustering methods
hierarchical clustering method
hiding failure
genetic algorithms
clustering methods
data privacy
Data Sanitization
Compositionality
resilience
pattern clustering
privacy
Data mining
Clustering algorithms
Data protection
PSO
optimization
particle swarm optimisation
pubcrawl
Human behavior
biblio
Info-Trust: A Multi-Criteria and Adaptive Trustworthiness Calculation Mechanism for Information Sources
Submitted by aekwall on Mon, 12/09/2019 - 12:23pm
relation-based trust
behavior-based trust
fake information sources
identity-based trust
Info-Trust
Multi-criteria
multicriteria properties
multicriteria trustworthiness calculation mechanism
network information
ordered weighted averaging and weighted moving average combination algorithm
adaptive weight
Sina Weibo
trust calculation technology
trust factors
trust relationships
trustworthiness identification
trustworthy social media system
untrustworthy information sources
Computing Theory and Trust
Decision Making
History
Trusted Computing
Adaptation models
pubcrawl
composability
resource management
Social network services
Computational modeling
social networking (online)
security of data
Data mining
social computing
social media
information sources
Complexity theory
Compositionality
trust calculation mechanism
adaptive trustworthiness calculation mechanism
biblio
An Evaluation of the Security of the Bitcoin Peer-To-Peer Network
Submitted by grigby1 on Tue, 11/26/2019 - 3:38pm
Human Factors
transaction confirmation process
Software
service attacks
Security Evaluation
Scalability
Resiliency
resilience
pubcrawl
Protocols
Peer-to-peer computing
peer to peer security
P2P network
network protocol
network message exchanges
Metrics
bitcoin
human factor
Human behavior
distributed denial of service attacks
denial of service
DDoS Attacks
Data mining
Cryptographic Protocols
cryptocurrencies
computer network security
Computer crime
blockchain
Bitcoin peer-to-peer network
bitcoin mining process
bitcoin message exchanges
bitcoin core software
biblio
A Temporal Work Transference Event Log Trace Classification Algorithm and Its Experimental Analysis
Submitted by aekwall on Mon, 11/25/2019 - 2:00pm
pattern classification
Workflow Event Log
workflow enactment event log
Trace Classification
Temporal Work Transference Pattern
temporal work transference event log trace classification algorithm
system memory
pubcrawl
process mining
Planning
Analogies and Transference
Organizations
Information systems
information system
Human Factors
Human behavior
hospitals
History
Data mining
Classification algorithms
biblio
Mining Software Repositories for Predictive Modelling of Defects in SDN Controller
Submitted by grigby1 on Tue, 11/12/2019 - 4:26pm
predictive modelling
Stochastic processes
software release management
software metrics
software development management
software defined networking control plane
software defined networking
software defect metrics
Software
security
Reliability
public domain software
pubcrawl
Protocols
program debugging
production grade SDN controller
predictive security metrics
OpenDaylight architecture
open source SDN controller platform
network operating system
mining software repositories
Metrics
Git version control system
Data mining
control systems
Configuration Management
computer network management
Computer bugs
bug repository
bug removal rates
bug manifestation
bug characteristics
biblio
Towards Modelling Insiders Behaviour as Rare Behaviour to Detect Malicious RDBMS Access
Submitted by aekwall on Mon, 11/04/2019 - 11:23am
Insider Threats
access control mechanisms
and Data mining
anomaly-based Intrusion Detection Systems
application data
data leakage
Database intrusion detection
Database monitoring
detect malicious RDBMS access
relational database security
malicious access
malicious RDBMS accesses
persistent concern
RDBMS
relational database management systems
SQL queries
towards modelling insiders
unauthorized employees
Metrics
authorisation
Big Data
Organizations
Data models
Resiliency
Human behavior
pubcrawl
composability
security of data
query processing
SQL
Training
Data mining
malicious insiders
insider attacks
relational databases
biblio
Fine-Grained Provenance for Matching ETL
Submitted by aekwall on Mon, 09/23/2019 - 10:40am
provenance APIs
data provenance tools
data science tasks
data types
data warehouses
database provenance tools
database-style provenance techniques
matching computations
matching tasks
Provenance
data objects
provenance-driven troubleshooting tool
PROVision
Record linking
support optimization
track provenance
tuple-level provenance
workflow
workflow management software
workflow provenance systems
Data mining
Resiliency
Human behavior
pubcrawl
composability
Metrics
optimization
ETL
tools
data analysis
Task Analysis
database management systems
application program interfaces
Instruments
Semantics
algebra
arbitrary code
code versions
common ETL
biblio
Towards Distributed Network Covert Channels Detection Using Data Mining-Based Approach
Submitted by grigby1 on Thu, 09/05/2019 - 11:26am
Compositionality
covert channels
data hiding
Data mining
Information hiding
resilience
Scalability
« first
‹ previous
…
17
18
19
20
21
22
23
24
25
…
next ›
last »