Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Big Data
biblio
Artificial Intelligence Empowered Cyber Threat Detection and Protection for Power Utilities
Submitted by grigby1 on Fri, 08/07/2020 - 2:58pm
malware
Power system protection
ML techniques
intrusion detection and prevention systems
Intrusion Detection and Prevention System
IDPS systems
cyber threat detection
AI
APT attack
Advanced Persistent Threat (APT)
power utilities
Smart Grids
APT
advanced persistent threat
cyber threats
Metrics
tools
computer security
Big Data
NIST
smart power grids
Smart Grid
power engineering computing
Scalability
Resiliency
resilience
Human behavior
pubcrawl
Artificial Intelligence
machine learning
security of data
learning (artificial intelligence)
biblio
Research and Application of APT Attack Defense and Detection Technology Based on Big Data Technology
Submitted by grigby1 on Fri, 08/07/2020 - 2:57pm
Big Data analysis technology
APT
Power Grid
dynamic analysis
network security risks
APT attack
Active Defense
active defense system
APT attack defense
APT attack detection sandbox technology
advanced persistent threat
controllable virtual environment
detection technology
heterogeneous data sources
high-risk Trojan horses
power information system security situation prediction
Situation Prediction
threat assessment
unknown malicious code
power system security
Anomaly Detection
pubcrawl
Human behavior
resilience
Resiliency
computer network security
Correlation
Scalability
power engineering computing
security
Communication networks
security threats
Big Data
telecommunication traffic
malware
invasive software
power grids
Metrics
biblio
Privacy and Security of Big Data in AI Systems: A Research and Standards Perspective
Submitted by grigby1 on Fri, 08/07/2020 - 2:48pm
countermeasures
Standards Developing Organizations
security of data
security
SDOs
Resiliency
privacy
IEC standards
Human behavior
defense strategies
data privacy
Data models
big data privacy
big data security
Big Data
artificial intelligence systems
Artificial Intelligence
AI systems developments
AI
Metrics
Scalability
resilience
Human Factors
pubcrawl
biblio
A Scalable (\$\textbackslashtextbackslashalpha, k\$)-Anonymization Approach using MapReduce for Privacy Preserving Big Data Publishing
Submitted by grigby1 on Fri, 08/07/2020 - 2:47pm
big data privacy
Velocity of data
timely anonymization
scenarios efficient anonymization
Scalable k-Anonymization approach
Scalable k-Anonymization (SKA)
scalable anonymization approach
Publishing
privacy preserving big data publishing
privacy preserving approaches scalability
MapReduce based Anonymization (MRA)
k-anonymity
data publishing approaches
Credit cards
security of data
anonymity
AI
Government
Scalability
Big Data
privacy issues
privacy
data privacy
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
biblio
Artificial Intelligence and the Privacy Paradox of Opportunity, Big Data and The Digital Universe
Submitted by grigby1 on Fri, 08/07/2020 - 2:47pm
5G mobile communication
The Internet of Things (IoT)
Social Networking Sites (SNS)
privacy paradox
privacy issue
Digital Universe
Data Analytics
5G technology
AI
face recognition
Scalability
Big Data
Internet of Things
privacy
data privacy
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
IoT
Artificial Intelligence
data analysis
biblio
Privacy-Preserving Deep Learning via Additively Homomorphic Encryption
Submitted by grigby1 on Fri, 08/07/2020 - 2:47pm
resilience
neural nets
privacy
privacy issues
privacy-preserving deep learning
privacy-preserving financial data analytics systems
privacy-preserving logistic regression
pubcrawl
regression analysis
JST CREST AI
Resiliency
Scalability
social challenges
social life
social sciences computing
Society 5.0
super-smart society
additively homomorphic encryption
IoT
information and communication technology
Human Factors
Human behavior
fraud
fourth industrial revolution
financial institutions
financial data processing
encryption
digital arithmetic
deep learning
data privacy
data analysis
Big Data
AI
biblio
Performance Evaluation of Intrusion Detection Streaming Transactions Using Apache Kafka and Spark Streaming
Submitted by aekwall on Mon, 07/27/2020 - 11:14am
cybersecurity intrusion detection
Sparks
Real-Time Decision Making
intrusion tolerance
Processing time
Big Data Analytics
apache kafka
Apache Spark Streaming
complex attacks
performance evaluation
extremely competitive financial market
high-level protection
intrusion detection streaming transactions
intrusion detection system
massive Internet-based services
short period time
Spark Streaming
stream data
machine learning
security of data
Big Data
real-time systems
Resiliency
pubcrawl
composability
internet
Decision Making
Intrusion Detection
telecommunication traffic
data analysis
Government
Data mining
fault tolerant computing
network traffic
parallel processing
biblio
New Hidden Policy CP-ABE for Big Data Access Control with Privacy-preserving Policy in Cloud Computing
Submitted by grigby1 on Fri, 07/24/2020 - 11:50am
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
policy-ba
Cipher Text-Policy Attribute Based Encryption
collaboration
privacy-preserving policy
New Hidden Policy CP-ABE schemes
New Hidden Policy Ciphertext Policy Attribute
Multi Secret Sharing Scheme
HP-CP-ABE
data leakage problem
big data processing
Big Data Access Control
access policy privacy
Cryptography
CP-ABE
policy-based governance
pubcrawl
privacy
Big Data
Scalability
data privacy
Cloud Computing
authorisation
Access Control
encryption
biblio
An Attribute Revocable CP-ABE Scheme
Submitted by grigby1 on Fri, 07/24/2020 - 11:41am
Cloud Computing
Subset Cover
storage management
Scalability
RCP-ABE scheme
pubcrawl
policy-based governance
fine-grained attributes
Cryptography
CP-ABE
collaboration
cloud storage environment
Access Control
ciphertext storage
ciphertext sharing
ciphertext policy
ciphertext access control
Big Data
authorisation
attribute revocation
attribute revocable CP-ABE scheme
attribute encryption scheme CP-ABE
attribute encryption
biblio
Privacy Preserving Big Data Publication On Cloud Using Mondrian Anonymization Techniques and Deep Neural Networks
Submitted by aekwall on Mon, 07/13/2020 - 10:07am
privacy
k-anonymity
machine learning
Mondrian anonymization techniques
Mondrian based k-anonymity approach
neural nets
Neural networks
personal data
personally identifiable information
predominant factor
high-dimensional data deep neural network based framework
privacy breach
privacy preservation
privacy preserving big data publication
privacy-preservation
protection
Resiliency
security
user privacy in the cloud
data analysis
pubcrawl
Human Factors
resilience
Scalability
Metrics
Big Data
Big Data Analytics
Cloud Computing
compromising privacy
big data privacy
data management
Data models
data privacy
data utility
Databases
deep neural networks
differential privacy
DNN
« first
‹ previous
…
22
23
24
25
26
27
28
29
30
…
next ›
last »