Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data Analytics
biblio
A Probability based Model for Big Data Security in Smart City
Submitted by grigby1 on Tue, 10/06/2020 - 1:41pm
security of data
IoT
organisational data
Organizations
personal data
probability
probability based model
pubcrawl
resilience
Resiliency
security
highly sensitive data
sensitive data sharing
smart applications
smart cities
Smart City
smart city critical data
smart city data
smart technologies
smart traffic management system
transport data
Trusted Computing
Data Leakage Detection
Big Data
big data security
bigraph
Computational modeling
Computing Theory
crisis response
critical data security
data analysis
Data Analytics
data leakage
Analytical models
Data models
data objects
data privacy
disaster resilience
economic data
emergency management
energy data
environment data
graph theory
Guilt Model
biblio
An Improved Communications in Cyber Physical System Architecture, Protocols and Applications
Submitted by aekwall on Mon, 09/28/2020 - 12:16pm
CPS infrastructure
middleware
sensors
Human Factors
Data Analytics
mobile devices
CPS
Wireless Sensor Network
WSN
cyber physical systems
communication infrastructure
computerized integration connectivity
cyber world
CPS middleware
Cyber Physical system architecture
energy efficient protocols
Machine Communication
man-made physical world
Mobile Sensor Information Agent
MSIA
quality of services
SDN-based CPS
software related mobile sensing paradigm
CPS Privacy
wireless sensor networks
Monitoring
Cloud Computing
Internet of Things
security
Protocols
Software
mobile computing
computer architecture
software defined networking
Human behavior
pubcrawl
computer network security
energy conservation
telecommunication power management
Decision Making
privacy
software-defined networking
mobile radio
cyber-physical systems
SDN
smart decision making
quality of service
biblio
Detection of Phishing Attacks with Machine Learning Techniques in Cognitive Security Architecture
Submitted by aekwall on Mon, 09/14/2020 - 12:32pm
Artificial Intelligence
URL analysis
python tools
phishing web attacks detection
cybersecurity analysts
cognitive security architecture
cognitive security application
Artificial Neural Networks
computational intelligence
Compositionality
Uniform resource locators
Data Analytics
Phishing
Cryptography
Python
data analysis
machine learning techniques
Cybersecurity
internet
Computer crime
machine learning
composability
pubcrawl
learning (artificial intelligence)
machine learning algorithms
Big Data
biblio
ClustCrypt: Privacy-Preserving Clustering of Unstructured Big Data in the Cloud
Submitted by grigby1 on Fri, 08/28/2020 - 3:34pm
resilience
big data security in the cloud
unstructured
topic-based clustering
secure cloud-based semantic search system
privacy-preserving data clustering
encrypted unstructured big data
clustering methods
ClustCrypt
client-side encryption
big data security
Scalability
pattern clustering
clustering
Data Analytics
Cryptography
Metrics
data encryption
Big Data
cloud services
Cloud Computing
data privacy
Indexes
Resiliency
pubcrawl
data analysis
Organizations
privacy
encryption
biblio
Artificial Intelligence and the Privacy Paradox of Opportunity, Big Data and The Digital Universe
Submitted by grigby1 on Fri, 08/07/2020 - 3:47pm
5G mobile communication
The Internet of Things (IoT)
Social Networking Sites (SNS)
privacy paradox
privacy issue
Digital Universe
Data Analytics
5G technology
AI
face recognition
Scalability
Big Data
Internet of Things
privacy
data privacy
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
IoT
Artificial Intelligence
data analysis
biblio
Cyber-physical systems security through multi-factor authentication and data analytics
Submitted by aekwall on Mon, 06/01/2020 - 11:04am
Internet of Things
Smart homes
smart cities
secure authentication
Resiliency
resilience
pubcrawl
password
multifactor authentication
Multi-factor authentication
Metrics
authentication
Internet of Everything
Human Factors
Human behavior
event processing
Data Analytics
data analysis
cyber-physical systems security
cyber-physical systems
complex system
authorisation
biblio
Detecting Exploit Websites Using Browser-based Predictive Analytics
Submitted by grigby1 on Fri, 04/17/2020 - 10:44am
Cybersecurity
Web Browser Security
Web-based computing
Web sites
Web browsers
web browser vulnerabilities
tool development
threat detection
Predictive Analytics
machine learning-powered predictive analytical model
human computer interaction
Data Analytics
browser-based predictive analytics
Compositionality
learning (artificial intelligence)
Metrics
Information analysis
Web browser
composability
cyberattacks
data privacy
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
machine learning
biblio
Increased Fault-Tolerance and Real-Time Performance Resiliency for Stream Processing Workloads through Redundancy
Submitted by grigby1 on Wed, 02/26/2020 - 4:48pm
performance faults
telemetry
tail latency
stream processing workloads
stream processing
software fault tolerance
Resiliency
resilience
Redundancy
Real Time
pubcrawl
Processor scheduling
aggregate performance metrics
multiprocessing systems
Garbage Collection
fine-grained acknowledgment tracking scheme
fine-grained acknowledgment schemes
fault tolerant computing
fault tolerance
failed communication
embedded systems
Data Analytics
communication faults
business analytics
biblio
A Framework for Data-Driven Physical Security and Insider Threat Detection
Submitted by aekwall on Mon, 08/26/2019 - 10:07am
pubcrawl
organizational security policies
Organizations
physical security
physical security architecture
Physical Security Definition
policy-based governance
provenance graphs
PSO
ontologies (artificial intelligence)
resilience
risk management
rule-based anomaly detection
security of data
Security Ontology
Security Provenance
security provenance solution
security weaknesses
Human behavior
Anomaly Detection
Attack Pattern Reconstruction
data analysis
Data Analytics
data-driven physical security
Digital Forensics
forensic data analysis
Forensics
Access Control
insider threat
Insider Threat Detection
insider threats mitigation
intrusion attempts
Metrics
ontological framework
Ontologies
biblio
Data Economy for Prosumers in a Smart Grid Ecosystem
Submitted by aekwall on Mon, 06/24/2019 - 2:59pm
Data Analytics
demand response
energy management
flexibility
Human behavior
Metrics
policy-based governance
pubcrawl
Resiliency
Smart Grid Consumeer Privacy
smart grid consumer privacy
Smart Grids
« first
‹ previous
1
2
3
4
next ›
last »