Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Lakes
biblio
Dataset Discovery in Data Lakes
Submitted by grigby1 on Thu, 08/05/2021 - 2:56pm
feature extraction
Organizations
pubcrawl
resilience
Resiliency
Scalability
Urban areas
metadata
Compositionality
Data discovery
indexing
Lakes
Metadata Discovery Problem
data wrangling
table search
biblio
Enabling Cyber Security Data Sharing for Large-scale Enterprises Using Managed Security Services
Submitted by grigby1 on Fri, 11/20/2020 - 2:14pm
Policy
managed security service
managed security service provider
Managed security services
Monitoring
MSS platform customers
MSSP
multi-tenant
organization
outsourcing
Peer-to-peer computing
platform solution
large-scale enterprises
policy-based governance
Portals
privacy
privacy concerns
private sectors
pubcrawl
public sectors
security of data
Security Policies Analysis
Task Analysis
use case
data anonymization
business data processing
cloud service
collaboration
collaborative data sharing
component
computer security
confidential data sharing
cyber security
cyber security data sharing
cyber security information
cybercrimes
architecture
data encryption
data privacy
Data Sanitization
data sharing
design
diagram
flexible data sharing
information
Lakes
large-scale enterprise
biblio
Efficiency Assessment of the Steganographic Coding Method with Indirect Integration of Critical Information
Submitted by grigby1 on Fri, 09/18/2020 - 1:47pm
image media image
digital video data platform
Discrete Cosine Transformation (DCT)
discrete cosine transformation matrix
discrete cosine transforms
efficiency assessment
embedded critical data
embedded data resistance
embedded digital data
encoding embedding
image container
image fragment
digital representation
Koch methods
Lakes
quantization coefficient
steganographic coding
steganographic coding method
steganographic embedding
structural elements
transformed image
weight coefficients
Zhao methods
Image reconstruction
security
pubcrawl
resilience
Resiliency
matrix algebra
Cryptography
Containers
Metrics
Compositionality
visualization
Image coding
Comparative Analysis
Steganography
distortion
coding theory
built-in containers
code structures
container.
critical information
data extraction
digital data container
digital platform
biblio
Big Provenance Stream Processing for Data Intensive Computations
Submitted by aekwall on Mon, 09/23/2019 - 10:40am
Data Lake
tagging
stream processing
Sparks
provenance events
Partitioning algorithms
parallel stream
parallel algorithms
parallel algorithm
out-of-order provenance streams
Out of order
on-the-fly provenance processing
Lakes
data-parallel frameworks
data provenance
Big Data
data intensive computations
Business
big provenance stream processing
Big Provenance
Provenance
data analysis
Metrics
Twitter
composability
pubcrawl
Human behavior
Resiliency
data integrity