Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Big Data
biblio
Real-time Processing and Storage of Multimedia Data with Content Delivery Network in Vehicle Monitoring System
Submitted by grigby1 on Mon, 11/02/2020 - 11:10am
MPEG-DASH standard
Videos
video streaming
vehicular ad hoc networks
vehicle monitoring system
Streaming media
Servers
Resiliency
resilience
real-time vehicle monitoring system
real-time systems
real-time processing
pubcrawl
multimedia data storage
multimedia computing
Big Data
MPD files
Monitoring
Metrics
Media
Logistics
Internet of Vehicles
Internet of Vehicle
Internet of Things
Human Factors
hidden trouble
DASH
content delivery network
CDN
Big Data curation
biblio
IoT Malware Dynamic Analysis Profiling System and Family Behavior Analysis
Submitted by aekwall on Mon, 10/26/2020 - 11:11am
family behavior analysis
Hidden Markov models
IoT malware
API call invocation
API hooking technique
automatic machine
Behavior Graph
conventional profiling methods
deployed IoT devices
virtual machines
family behavior graph
IoT malware dynamic analysis profiling system
IoT malware increases
profiling system adapts virtual machine introspection
QEMU
valuable IoT malware behavior
virtual machine introspection
Libraries
Big Data
Internet of Things
malware
invasive software
Resiliency
Human behavior
pubcrawl
Metrics
Inspection
privacy
Virtual machining
Malware Analysis
application program interfaces
dynamic analysis
Predictive Metrics
virtual machine
biblio
Total e-Governance: Pros Cons
Submitted by grigby1 on Fri, 10/16/2020 - 10:22am
good governance
security
Resiliency
resilience
pubcrawl
politics
political turmoil
policy-based governance
internet
information technology
government data processing
Government
Big Data
finance
ERP
economical turmoil
E-Government
E-Governance
Databases
data center
Cybersecurity
computer security
collaboration
biblio
Study on E-government Information Security in the Era of Big Data
Submitted by grigby1 on Fri, 10/16/2020 - 10:13am
network technology defects
information management
information management departments
information security awareness
information security threats
information storage
intranets
large-scale network
management deficiency
information confidentiality
policy-based governance
proper information encryption
pubcrawl
resilience
Resiliency
set pair analysis theory
strict information management
survivability association
e-government hierarchy model
Cloud Computing
collaboration
complex system
Cryptography
Cybersecurity
data application
E-Government
E-government development
Big Data
e-government information management
e-government information security system
Electronic government
encryption
government data processing
Human behavior
identity authentication
biblio
An Algebraic Expert System with Neural Network Concepts for Cyber, Big Data and Data Migration
Submitted by aekwall on Mon, 10/12/2020 - 10:37am
Relational Database
machine learning experts system
mathematical algebraic form
neural nets
neural network
neural network computational graph structure
neural network node structure
Neural networks
output layers
pubcrawl
machine assistance approach
relational databases
Resiliency
rule probabilities
Scalability
security
structured approach
Syntactics
trees (mathematics)
value probabilities
data migration applications
algebraic expert system
Artificial Intelligence
Bayes methods
Bayesian probability tree approach
Big Data
cognition
Cyber database
data handling
data migration
False Data Detection
expert systems
Expert Systems and Security
grading decisions
Human behavior
Information Assurance
knowledge based systems
knowledge-base organization
Knowledgebase
learning (artificial intelligence)
biblio
A Probability based Model for Big Data Security in Smart City
Submitted by grigby1 on Tue, 10/06/2020 - 12:41pm
security of data
IoT
organisational data
Organizations
personal data
probability
probability based model
pubcrawl
resilience
Resiliency
security
highly sensitive data
sensitive data sharing
smart applications
smart cities
Smart City
smart city critical data
smart city data
smart technologies
smart traffic management system
transport data
Trusted Computing
Data Leakage Detection
Big Data
big data security
bigraph
Computational modeling
Computing Theory
crisis response
critical data security
data analysis
Data Analytics
data leakage
Analytical models
Data models
data objects
data privacy
disaster resilience
economic data
emergency management
energy data
environment data
graph theory
Guilt Model
biblio
Method of Ensuring Cyber Resilience of Digital Platforms Based on Catastrophe Theory
Submitted by grigby1 on Tue, 10/06/2020 - 12:40pm
Big Data
Cognitive Computing
Computing Theory
Controllability
cyber resistance
digital economy
digital transformation
Internet of Things IIoT / IoT
models and methods of artificial intelligence
proactive cybersecurity and adaptability
pubcrawl
resilience
Resiliency
robotics
Security Metrics
self-organization
biblio
A Game Theoretical Analysis of Risk Adaptive Access Control for Privacy Preserving
Submitted by aekwall on Mon, 09/21/2020 - 2:48pm
Resiliency
Human behavior
information theory
multistage two player game
privacy
privacy breaches
privacy preserving
Privacy Risk
privacy violation access requests
pubcrawl
Games
risk adaptive access control
risk analysis
Risk based access control
risk based access model
risk value
Scalability
Shannon information
sub-game perfect Nash equilibrium
cross-domain environment
Access Control
access control system
access request
Adaptation models
authorisation
Big Data
Cloud Computing
Control Theory and Privacy
Computing Theory and Privacy
cyber physical systems
cyber-physical systems
data privacy
estimation
game model
game theoretical analysis
game theoretical risk based access control
game theory
biblio
Trust Evaluation Strategy Based on Grey System Theory for Medical Big Data
Submitted by aekwall on Mon, 09/21/2020 - 2:39pm
Medical diagnostic imaging
Computer Theory and Trust
trust gray evaluation model
trust evaluation weight system
trust evaluation strategy
trust evaluation index weight
trust evaluation
traditional evaluation method
Medical Big Data
grey systems
grey system theory
evaluation process
decision fuzzy
analytic hierarchy process (AHP)
AHP method
Access Control
Sensitivity
Compositionality
medical information systems
analytic hierarchy process
statistical analysis
Indexes
fuzzy set theory
privacy
composability
pubcrawl
Task Analysis
Medical services
Big Data
biblio
Detection of Phishing Attacks with Machine Learning Techniques in Cognitive Security Architecture
Submitted by aekwall on Mon, 09/14/2020 - 11:32am
Artificial Intelligence
URL analysis
python tools
phishing web attacks detection
cybersecurity analysts
cognitive security architecture
cognitive security application
Artificial Neural Networks
computational intelligence
Compositionality
Uniform resource locators
Data Analytics
Phishing
Cryptography
Python
data analysis
machine learning techniques
Cybersecurity
internet
Computer crime
machine learning
composability
pubcrawl
learning (artificial intelligence)
machine learning algorithms
Big Data
« first
‹ previous
…
19
20
21
22
23
24
25
26
27
…
next ›
last »