Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Big Data
biblio
Cloud, Big Data IoT: Risk Management
Submitted by grigby1 on Fri, 08/28/2020 - 2:33pm
Metrics
big data security in the cloud
digital devices communications
competitive business environment
business quality improvement
business risks
interconnected devices
Distributed databases
Scalability
resilience
Internet of Things
Big Data
Resiliency
pubcrawl
IoT
business data processing
security
risk management
Cloud Computing
biblio
Privacy-Preserving Deep Learning Computation for Geo-Distributed Medical Big-Data Platforms
Submitted by aekwall on Mon, 08/24/2020 - 12:51pm
Human Factors
big data privacy
privacy-preserving medical data training
privacy-preserving deep learning computation
medical platforms
local platforms
hidden layers
geo-distributed medical Big-data platforms
distributed deep learning framework
privacy preserving
Medical Big Data
Biomedical imaging
medical information systems
Scalability
deep learning
Training
Metrics
Computational modeling
pubcrawl
Resiliency
learning (artificial intelligence)
Data models
data privacy
Big Data
Servers
biblio
Anonymous Privacy-Preserving Scheme for Big Data Over the Cloud
Submitted by aekwall on Mon, 08/24/2020 - 12:51pm
MapReduce
big data privacy
secure hash algorithm
network operating systems
MapReduce framework
data decryption
anonymous privacy-preserving scheme
Hadoop distributed file system
Human Factors
cloud
Proposals
parallel processing
security
Metrics
privacy
pubcrawl
Resiliency
data encryption
data privacy
Big Data
encryption
Cryptography
Scalability
Cloud Computing
biblio
Privacy-Preserving Deep Learning Models for Law Big Data Feature Learning
Submitted by aekwall on Mon, 08/24/2020 - 12:50pm
law Big data feature learning
social networks
social networking (online)
Servers
Scalability
Resiliency
pubcrawl
privacy-preserving feature learning
privacy-preserving deep learning models
privacy
neural nets
Metrics
learning (artificial intelligence)
Big Data
Knowledge extraction
IoT
Internet of Things
Human Factors
Homomorphic encryption
differential privacy
deep learning
data privacy
Data models
Cryptography
big data privacy
biblio
Making the Pedigree to Your Big Data Repository: Innovative Methods, Solutions, and Algorithms for Supporting Big Data Privacy in Distributed Settings via Data-Driven Paradigms
Submitted by aekwall on Mon, 08/24/2020 - 12:50pm
data analysis
big data privacy
security-inspired protocols
protocol checking
privacy-of-big-data
DRIPROM framework
distributed-big-data
distributed settings
data-driven aggregate-provenance privacy-preserving big multidimensional data
cloud settings
Human Factors
Proposals
security of data
Distributed databases
Metrics
data aggregation
pubcrawl
Resiliency
Data models
Protocols
data privacy
Big Data
Scalability
Cloud Computing
biblio
Construction of Big Data Hyperchaotic Mixed Encryption Model for Mobile Network Privacy
Submitted by aekwall on Mon, 08/24/2020 - 12:50pm
chaotic communication
big data privacy
steganography performance
Rossle chaotic mapping
Privacy big data
piecewise linear combination method
mobile network privacy big data hybrid encryption algorithm
mobile network big data
mobile network
mixed network information sharing
mixed encrypted public key
Hyperchaos
hybrid encryption
big data hyperchaotic mixed encryption model
Steganography
piecewise linear techniques
Scalability
encoding
Ciphers
Human Factors
public key cryptography
mobile radio
Metrics
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
data privacy
Big Data
encryption
authorisation
biblio
Research on Feasibility Path of Technology Supervision and Technology Protection in Big Data Environment
Submitted by aekwall on Mon, 08/24/2020 - 12:50pm
privacy protection
big data privacy
technology protection
stand-alone simulation experiment
query protocol design
query privacy protection model
query mode design
potential value
Massive Data
experimental data
data privacy protection model
complexity analysis
big data platform
big data environment
Data Security
Access Control
Scalability
Human Factors
Security analysis
query processing
Metrics
privacy
pubcrawl
Resiliency
Data models
Protocols
security
data privacy
Big Data
data owners
Servers
biblio
bench4gis: Benchmarking Privacy-aware Geocoding with Open Big Data
Submitted by aekwall on Mon, 08/24/2020 - 12:50pm
Big Data Applications
big data privacy
viable geocoding strategies
surrogate data
privacy-aware geocoding solutions
patient privacy laws
open big data sets
Law
institutional regulations
healthcare data
Geospatial analysis
geographic information systems
geographic data
geographic coordinates
external transmission
Scalability
bench4gis
organization
Open Source Software
sensitive data
Benchmark testing
Human Factors
quality assurance
Metrics
pubcrawl
Resiliency
Medical services
privacy concerns
data privacy
Big Data
biblio
An Internet Medical Care-Oriented Service Security Open Platform
Submitted by aekwall on Mon, 08/24/2020 - 11:46am
convenient online services
Autonomic Security
Visualized Control
standardized connection process
Service
Security Open Platform
personal privacy data security
medical data illegal stealing
Internet medical care-oriented service security open platform
Internet hospitals
Internet Hospital
data access process
security of data
Data Security
malicious attacks
medical information systems
health care
internet
composability
pubcrawl
Resiliency
data privacy
Big Data
biblio
Using Temporal Conceptual Graphs and Neural Networks for Big Data-Based Attack Scenarios Reconstruction
Submitted by aekwall on Mon, 08/17/2020 - 10:18am
Elman
temporal conceptual graph
RBF networks
RBF
radial basis function networks
probable attack scenario
potential attack scenario
possible attack scenarios
investigation
hybrid neural network
high speed networks
global attack reconstruction process
Elman network
security of data
complex attack scenarios
big data-based attack scenarios reconstruction
Attack Scenario Graph
attack graphs
complex attacks
Predictive Metrics
Neural networks
graph theory
composability
pubcrawl
Resiliency
Big Data
« first
‹ previous
…
21
22
23
24
25
26
27
28
29
…
next ›
last »