Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Big Data
biblio
Blockchain-Based Distributed Data Integrity Auditing Scheme
Submitted by aekwall on Fri, 02/25/2022 - 9:43am
blockchain
fair arbitration
decentralization
provable security
public auditing
data integrity
Predictive Metrics
component
Compositionality
security
Resiliency
pubcrawl
Conferences
smart contracts
Cloud Computing
Resists
Big Data
biblio
EntropLyzer: Android Malware Classification and Characterization Using Entropy Analysis of Dynamic Characteristics
Submitted by grigby1 on Mon, 02/07/2022 - 3:43pm
Big Data
malware characterization
entropy analysis
Android malware
Malware Analysis
malware classification
automation
data analysis
malware behavior
malware
privacy
Entropy
data privacy
batteries
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Research on Network Big Data Security Integration Algorithm Based on Machine Learning
Submitted by grigby1 on Mon, 02/07/2022 - 3:43pm
privacy
feature extraction
machine learning
pubcrawl
resilience
Resiliency
Analytical models
Access Control
Big Data
composability
statistical analysis
fuzzy clustering
Network big data
Security integration
social computing
biblio
Benchmarking Robustness of Deep Learning Classifiers Using Two-Factor Perturbation
Submitted by aekwall on Mon, 01/31/2022 - 3:33pm
Benchmark testing
visualization
Big Data
deep learning
Perturbation methods
Training
pubcrawl
Scalability
Resiliency
codes
Benchmark Metrics
Corrupted images
Imperfect images
Robust Deep Learning
work factor metrics
biblio
Privacy-Preserving Framework to Facilitate Shared Data Access for Wearable Devices
Submitted by grigby1 on Mon, 01/31/2022 - 2:49pm
Scalability
Health data sharing
wearables security
Wearable Device
wearable computers
Big Data
Protocols
Medical services
data privacy
privacy
Conferences
Resiliency
resilience
Human behavior
pubcrawl
blockchain
security
Adaptation models
biblio
Big Data Platform for Intelligence Industrial IoT Sensor Monitoring System Based on Edge Computing and AI
Submitted by grigby1 on Mon, 01/10/2022 - 3:57pm
Metrics
Temperature sensors
Temperature measurement
security
Resiliency
resilience
Real-time monitoring
pubcrawl
Monitoring
Modbus
Artificial Intelligence
InfluxDB
Industrial Internet of Thing
Human behavior
grafana
elasticsearch
Data models
composability
Big Data
artificial intelligence security
biblio
Application of Artificial Intelligence and Big Data in the Security of Regulatory Places
Submitted by grigby1 on Mon, 01/10/2022 - 3:55pm
Inspection
video surveillance
security management
Resiliency
resilience
regulatory site
pubcrawl
Metrics
law enforcement
Artificial Intelligence
information system
information management
Human behavior
control systems
composability
Big Data
artificial intelligence security
biblio
Parallel Proxy Re-Encryption Workload Distribution for Efficient Big Data Sharing in Cloud Computing
Submitted by aekwall on Mon, 01/10/2022 - 11:47am
Human behavior
Compositionality
Resiliency
Workload distribution
Proxy re-encryption
parallel computing
Big data sharing
Asymmetric Encryption
Load management
Task Analysis
Metrics
pubcrawl
Heuristic algorithms
Servers
Cloud Computing
Big Data
delays
biblio
Using MajorClust Algorithm for Sandbox-Based ATM Security
Submitted by grigby1 on Tue, 12/21/2021 - 11:38am
Online banking
Zero day attacks
Whitelists
whitelisting
tools
software security
Software algorithms
sandboxing
Resiliency
resilience
pubcrawl
ATM
Metrics
Intrusion Protection
Filtering
evolutionary computing
evolutionary computation
defense
cyber security
composability
clustering
Big Data
biblio
Toward Pinpointing Data Leakage from Advanced Persistent Threats
Submitted by aekwall on Mon, 12/20/2021 - 11:22am
Human behavior
leakage auditing
fingerprint
Digital Forensics
data leakage
APT
advanced persistent threat
Forensics
Fingerprint recognition
Organizations
Resiliency
Metrics
pubcrawl
Databases
Conferences
Computer hacking
Scalability
Big Data
« first
‹ previous
…
11
12
13
14
15
16
17
18
19
…
next ›
last »