Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Big Data
biblio
Structure and Metrics of Emerging Computing
Submitted by grigby1 on Tue, 04/27/2021 - 1:39pm
Big Data
computing model
cyber-physical space
cyber-social computing
Emerging computing
interactive computing
Metrics
pubcrawl
resilience
Resiliency
Scalability
security
biblio
Performance Evaluation of Classification Algorithms in the Design of Apache Spark based Intrusion Detection System
Submitted by grigby1 on Tue, 04/27/2021 - 1:39pm
Big Data
Chi-square
Intrusion Detection System (IDS)
Knowledge Discovery in Database (KDD)
Metrics
pubcrawl
resilience
Resiliency
Scalability
security
support vector machine (SVM)
biblio
Adaptive Margin Based Deep Adversarial Metric Learning
Submitted by grigby1 on Tue, 04/27/2021 - 1:38pm
Adaptive Margin
adversarial learning
Big Data
deep metric learning
Deep Neural Network
Metrics
pubcrawl
resilience
Resiliency
Scalability
security
biblio
Machine Learning based Intrusion Detection System for Web-Based Attacks
Submitted by grigby1 on Tue, 04/27/2021 - 1:38pm
machine learning
Resiliency
composability
privacy
Big Data
detection
feature extraction
Metrics
pubcrawl
resilience
Scalability
security
web-based attacks
biblio
What is the Value of Data Value in Practical Security Applications
Submitted by grigby1 on Tue, 04/27/2021 - 1:38pm
Big Data
data quality
data value
Metrics
privacy protection
pubcrawl
resilience
Resiliency
Scalability
security
Security Evaluation
biblio
Web Browser Extension User-Script XSS Vulnerabilities
Submitted by grigby1 on Tue, 04/27/2021 - 1:14pm
Human behavior
Web Browser Security
Vulnerability
security
Resiliency
resilience
pubcrawl
plugin
Metrics
Autonomic Security
extension
exploit
Ecosystems
Compositionality
Browsers
Browser Security
browser
Big Data
biblio
Construction of Audit Internal Control System Based on Online Big Data Mining and Decentralized Model
Submitted by aekwall on Tue, 04/27/2021 - 12:29pm
Scalability
Big Data
security
Task Analysis
Data models
Resiliency
Human behavior
pubcrawl
Data mining
control systems
Information systems
Security Audits
data stream
decentralized model
Internal Control
biblio
Design and Implementation of Distributed Government Audit System Based on Multidimensional Online Analysis
Submitted by aekwall on Tue, 04/27/2021 - 12:28pm
Scalability
Big Data
programming
Data models
Resiliency
Human behavior
pubcrawl
Distributed databases
Analytical models
Government
Sparks
Security Audits
Design and implementation
Distributed government audit
multidimensional online analysis
biblio
Transparent IDS Offloading for Split-Memory Virtual Machines
Submitted by grigby1 on Fri, 04/09/2021 - 10:35am
IDS
VMemTrans
VM migration
VM introspection
transparent IDS offloading
split-memory VM
split-memory virtual machines
split migration
remote hosts
offloaded IDS
multiple hosts
large-memory VM
IDS offloading
exchanges memory data
access VM remote memory
security of data
Instruction sets
resilience
virtual machines
Virtual machining
maintenance engineering
Memory management
Runtime
composability
Big Data
Resiliency
pubcrawl
Intrusion Detection Systems
Monitoring
biblio
Analysis of Computer Network Information Security under the Background of Big Data
Submitted by grigby1 on Fri, 04/09/2021 - 10:24am
policy-based governance
Internet era
large-scale network environment
large-scale network security situational awareness
Metrics
mining
network security
OWL
parallel computing
people
internet
pubcrawl
Quality function deployment
resilience
Resiliency
Scalability
security perception
Situation Awareness
Smart Grids
Xenon
data acquisition
big data acquisition
big data analysis platform
Big Data technology
collaboration
composability
comprehensive arrival
computer network information security
computer network security
Conferences
Big Data
data analysis
data subject
distributed computing
Frequency locked loops
Hafnium compounds
Human behavior
Information Assurance
information security assurance services
information system
« first
‹ previous
…
15
16
17
18
19
20
21
22
23
…
next ›
last »