Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Big Data
biblio
Big Data Security and Privacy: Current Challenges and Future Research perspective in Cloud Environment
Submitted by grigby1 on Mon, 12/28/2020 - 11:40am
Metrics
Unstructured Data
Structured Data
storage management
Servers
sensitive data storage
semistructured data
security threats
security of data
Scalability
Resiliency
resilience
pubcrawl
Organizations
Big Data
internet
Human behavior
data structures
data storage
data security challenges
Data Security
data privacy
cloud server
cloud environment
Cloud Computing
big data security
Big data privacy top
big data privacy
biblio
De-identification and Privacy Issues on Bigdata Transformation
Submitted by grigby1 on Mon, 12/28/2020 - 11:39am
ICT industry
t-closeness
Scalability
Resiliency
resilience
pubcrawl
privacy attacks
privacy
personal information
Metrics
l-Diversity
k-anonymity
Industries
Big Data
Human behavior
Guidelines
government sectors
diseases
de-identification processes
data privacy
Data models
data analysis
controllable privacy level
Big Data transformation
big data privacy
biblio
Big Data Encryption Technology Based on ASCII And Application On Credit Supervision
Submitted by grigby1 on Mon, 12/28/2020 - 11:39am
data utilization
user privacy
user payment information
Scalability
Resiliency
resilience
pubcrawl
Metrics
market supervision business
Licenses
Internet of Things
Human behavior
financial data processing
Electronic mail
electronic data interchange
Desensitization
Artificial Intelligence
data privacy
data leakage
Data Governance
data desensitization technology
Cryptography
Cross-Platform
credit supervision application
Credit Supervision
credit construction
Conferences
BIGDATA
big data privacy
Big Data encryption technology
Big Data
ASCII
biblio
Experimenting and Assessing a Distributed Privacy-Preserving OLAP over Big Data Framework: Principles, Practice, and Experiences
Submitted by grigby1 on Mon, 12/28/2020 - 11:38am
smart cities
privacy-preserving OLAP-based big data analytics
OLAP-based Big Data Analytics
OLAP data cubes
OLAP analysis
OLAP aggregate privacy
Experiments and Analysis over Big Datasets
Emerging Big Data Applications
distributed privacy-preserving OLAP framework
Distributed Privacy-Preserving OLAP
big data framework
authoritative analytical tool
bioinformatics
big data privacy
social networks
Distributed databases
tools
Social network services
privacy preservation
Measurement
Big Data
privacy
Scalability
data privacy
Resiliency
resilience
Metrics
Human behavior
pubcrawl
Data mining
data analysis
security of data
biblio
Application of Differential Privacy in Location Trajectory Big Data
Submitted by grigby1 on Mon, 12/28/2020 - 11:38am
differential privacy protection technology
social software
resilience
position trajectory
mobile Internet technology
mobile computing
Metrics
location trajectory privacy protection
location trajectory Big Data
location trajectory
location based services
internet
GPS technology
Global Positioning System
differential privacy
differential privacy protection
Data protection
data privacy
Big Data privacy protection
big data privacy
Big Data
Algorithm
Human behavior
Resiliency
Scalability
composability
pubcrawl
biblio
The privacy paradigm : An overview of privacy in Business Analytics and Big Data
Submitted by grigby1 on Mon, 12/28/2020 - 11:37am
Big Data
Technology management
privacy paradigm
GPDR
data mining technologies
dados
business analytics
analytics
big data privacy
Google
Data protection
Companies
privacy
information technology
data privacy
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
business data processing
Data mining
data analysis
biblio
On Secrecy Key of a class of Secure Asymmetric Multilevel Diversity Coding System
Submitted by grigby1 on Tue, 12/15/2020 - 12:27pm
secrecy key size
Asymmetric
Codecs
exact secure rate region
Gaussian processes
key size
key size characterization
multilevel diversity coding
multilevel diversity coding systems
S-AMDCS
5G wireless networks
secure asymmetric MDCS
secure asymmetric multilevel diversity coding system
source-separate coding
superposition secure rate region
symmetric
wiretap channel
wiretap channels
wiretapped messages
Cryptography
pubcrawl
Metrics
resilience
Resiliency
private key cryptography
telecommunication security
security
data privacy
Internet of Things
5G mobile communication
Big Data
Compositionality
Communication networks
secrecy
linear codes
network coding
coding theory
biblio
Artificial Intelligence and Internet of Things for Robotic Disaster Response
Submitted by aekwall on Mon, 12/14/2020 - 11:38am
Mobile Robot
deep learning model training
Disaster Response
disaster site
disaster-straining robots
environmental Big Data
field workstation
Fukushima nuclear disaster
ground robots
intelligent Internet of Things
AIoT
model verification
natural man-made disasters
on-site continuing objects classification
robotic disaster response
surface robots
underwater swarm robots
Unmanned underwater vehicles
Wenchuan earthquake
image classification
Internet of Things
learning (artificial intelligence)
pubcrawl
composability
mobile robots
Swarm Intelligence
neural nets
Workstations
Big Data
Artificial Intelligence
control engineering computing
Robot sensing systems
Compositionality
government agencies
emergency management
disasters
Service robots
biblio
Network Anomaly Detection Based on Deep Support Vector Data Description
Submitted by aekwall on Mon, 12/14/2020 - 11:30am
network anomaly detection
Unsupervised Learning
Training
telecommunication traffic
Support vector machines
support data vector description
security of data
Resiliency
representation learning
pubcrawl
Predictive Metrics
normal traffic features
Neural networks
network traffic anomaly detection
False Data Detection
malicious traffic detection system
KDD CUP99 dataset
intrusion detection system
feature extraction
Deep-SVDD
deep support vector data description
Deep Neural Network
Data models
convolutional neural network
convolutional neural nets
composability
Big Data
Anomaly Detection
biblio
Raw Cardinality Information Discovery for Big Datasets
Submitted by grigby1 on Fri, 12/11/2020 - 2:00pm
HDFS
back-end Big Data systems
Big Data sets
Cardinality
data separation
elastic
elasticsearch
events
grafana
Pipelines
Java
logs
Map Reduce
parallel discovery data store infrastructure
raw cardinality information discovery
rocksdb
search queries
Metadata Discovery Problem
Cloud Computing
Data mining
Monitoring
pubcrawl
Metrics
resilience
Resiliency
Conferences
Scalability
data analysis
Topology
Big Data
metadata
microsoft windows
Measurement
Compositionality
query processing
Hadoop
« first
‹ previous
…
17
18
19
20
21
22
23
24
25
…
next ›
last »