Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Big Data
biblio
Threshold Based Optimization of Performance Metrics with Severely Imbalanced Big Security Data
Submitted by grigby1 on Fri, 04/03/2020 - 11:18am
learning (artificial intelligence)
threshold based optimization
Slow HTTP POST
severely imbalanced slow HTTP DoS attack data
severely imbalanced big security data
security of data
pubcrawl
predictive security metrics
Performance Metrics
pattern classification
optimisation
Metrics
machine learning techniques
big data security metrics
imbalanced big dataset
Decision trees
cyber security domain
classifier predictive models
classifier performance
classification threshold
class imbalance
C4.5N decision tree
Big Data
AUC
area under the receiver operating characteristic curve
biblio
Securing Big Data in the Age of AI
Submitted by grigby1 on Fri, 04/03/2020 - 11:03am
data privacy
security
relational database security
pubcrawl
privacy
Policy Based Governance
NoSQL databases
Metrics
machine learning
Human behavior
Data Security
Intelligent Data and Security
Data models
composability
collaboration
Big Data
Artificial Intelligence
Scalability
Resiliency
Compositionality
Intelligent Data Security
biblio
A Hybrid Algorithm for Influence Maximization of Social Networks
Submitted by grigby1 on Wed, 03/18/2020 - 11:27am
NP problem
Secure File Sharing
resilience
Resiliency
pubcrawl
wikipedia
voting situation
Time complexity
social networks
social networking (online)
social network
Peer-to-peer computing
optimisation
optimal solution
Big Data
influence maximization
hybrid distribution value accumulation algorithm
Hybrid algorithm
hill climbing
Heuristic algorithms
greedy algorithms
greedy algorithm
Gnutella node-to-node file sharing network
Encyclopedias
dissemination process
dissemination effect
computational complexity
activation effect
biblio
HackerNets: Visualizing Media Conversations on Internet of Things, Big Data, and Cybersecurity
Submitted by grigby1 on Wed, 03/18/2020 - 10:52am
Social network services
Science of Security
Human behavior
resilience
Resiliency
Metrics
Policy-Governed Secure Collaboration
collaboration
composability
pubcrawl
Venn Diagram
Internet of Things
Social Media Mining
Media User Network
interactive visualization
Data visualization
Cybersecurity
computer science
Big Data
computer security
Scalability
biblio
Perspectives on Anomaly and Event Detection in Exascale Systems
Submitted by aekwall on Mon, 03/16/2020 - 9:42am
Scientific Computing Security
global overview
exascale systems
exascale
event detection
Big Data methods
anomaly detection framework
Anomaly
HPC
computer network reliability
security of data
distributed
Compositionality
Predictive Metrics
resilience
Monitoring
parallel processing
pubcrawl
machine learning
Big Data
biblio
QuickAdapt: Scalable Adaptation for Big Data Cyber Security Analytics
Submitted by aekwall on Mon, 03/16/2020 - 9:34am
Time factors
Scalable Security
Statistics
security events data
QuickAdapt
distributed BDCA system
descriptive statistics
Big Data Cyber Security Analytics
BDCA system
Adaptation
fuzzy rules
Accuracy
security of data
Scalability
quality of service
fuzzy set theory
data analysis
cyber-attacks
pubcrawl
feature extraction
cyber security
computer architecture
Big Data
Computer crime
biblio
Software Defined Security Architecture with Deep Learning-Based Network Anomaly Detection Module
Submitted by aekwall on Mon, 03/16/2020 - 9:34am
learning (artificial intelligence)
Software Defined Security
software defined networking
security protection methods
security data platform
Scalable Security
scalable network anomaly detection module
Scalability
Resiliency
real-time online detection
real-time online anomaly detection
pubcrawl
Network Security Architecture
network data
network attack technology
network anomaly detection technology
Metrics
internet
hypermedia
deep learning-based network anomaly detection module
deep learning
data-driven software defined security architecture
data-driven security business orchestration
data-driven orchestration engine
data driven security business orchestration
computer network security
Big Data technology
Big Data
anomaly detection algorithm module
Dynamic Networks and Security
composability
biblio
A Framework for Integrating Big Data Security Into Agricultural Supply Chain
Submitted by grigby1 on Thu, 03/12/2020 - 11:08am
Scalability
perishable products
Productivity
pubcrawl
Real time control
real-time systems
reliability system
resilience
Resiliency
Monitoring
security
security of data
supply chain management
supply chain security
supply chains
sustainability requirements
waste reduction
advanced monitoring systems
Internet of Things
Human behavior
food waste reduction
food waste
food supply chain system
food safety
food production
food processing industry
Data integration
big data security
Big Data
Agriculture
Agricultural supply chains
agricultural supply chain management system
agricultural products
biblio
Side-Channel Analysis for Searchable Encryption System and Its Security Evaluation
Submitted by grigby1 on Mon, 03/02/2020 - 12:33pm
Indexes
Tamper resistance
side-channel analysis
side channel attack
Security Evaluation
searchable encryption system
Scalability
pubcrawl
Power demand
power analysis
Metrics
Medical services
medical computing
searchable encryption
Immune system
illegal attacks
Human Factors
Human behavior
Hamming distance
encryption
embedded searchable encryption
Cryptography
Ciphers
Big Data
Artificial Intelligence
biblio
Statistical Power Analysis for IoT Device Oriented Encryption with Glitch Canceller
Submitted by grigby1 on Mon, 03/02/2020 - 12:33pm
Low-Power
Tamper resistance
statistical power analysis
statistical analysis
Side-channel attack
Scalability
pubcrawl
privacy
PRINCE
power consumption
Metrics
lowest latency cryptography
Big Data
IoT devise
IoT device oriented encryption
Internet of Things
Human Factors
Human behavior
Hardware Security
glitch canceller
field-programmable gate array
field programmable gate arrays
Cryptography
« first
‹ previous
…
25
26
27
28
29
30
31
32
33
…
next ›
last »