Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data analysis
biblio
A Game-Theoretic Study on Non-monetary Incentives in Data Analytics Projects with Privacy Implications
Submitted by grigby1 on Mon, 02/27/2017 - 12:56pm
non-monetary incentives
Statistics
Sociology
social networking (online)
social network sites
public good
pubcrawl170108
pubcrawl170107
privacy implications
privacy
population estimate
personal information
nonmonetary incentives
data analysis
Non-cooperative game
Noise
Nash Equilibrium
incentive schemes
Games
game theory
game theoretic study
estimation
digital repositories
data privacy
Data Analytics
biblio
An effective information filtering method based on the LTE network
Submitted by grigby1 on Mon, 02/27/2017 - 12:56pm
information filtering method
Training
pubcrawl170108
pubcrawl170107
network security
nearest neighbor text classification
mobile computing
minimum-risk Bayesian classification
LTE network
LTE
Long Term Evolution
learning (artificial intelligence)
KNN (Key Nearest Neighbor)
information technology
Information filters
4G LTE high-speed network
information filtering
four-level content-based information filtering
five-tuple filter
filtering theory
filtering algorithms
data analysis
content-based information filtering
content-based filter
Classification algorithms
Bayesian classification
Bayes methods
AdaBoost
4G mobile communication
4G LTE network
biblio
Mapping of Dengue Outbreak Distribution Using Spatial Statistics and Geographical Information System
Submitted by grigby1 on Mon, 02/27/2017 - 12:56pm
GIS
Urban areas
spatial statistics
Rivers
risk map
risk analysis
pubcrawl170108
pubcrawl170107
pattern classification
kernel density estimation
Kernel
KDE
Aedes mosquito-borne disease
geographical information system
geographic information systems
estimation theory
estimation
diseases
dengue fever outbreak distribution
data analysis
buffer analysis
average nearest neighbor
Artificial Neural Networks
ANN
biblio
Mobile banking and information security risks: Demand-side predilections of South African lead-users
Submitted by grigby1 on Mon, 02/27/2017 - 12:54pm
Predilections
usage control theory
UCON
TPP
tinkering process
Tinker
theory-of-technology acceptance model
theory-of-perceived risk
TAM
South African lead-users
software packages
software package
security of data
quantitative approach
pubcrawl170108
pubcrawl170107
Banking
Mobile communication
mobile commerce
mobile banking services
Mobile banking
Lead-users
Lead
information security risks
information security risk
information security
Human Factors
Gauteng province
demand-side predilections
Data collection
data analysis
Context
biblio
"Honeypot based unauthorized data access detection in MapReduce systems"
Submitted by grigby1 on Thu, 02/23/2017 - 12:49pm
data processing capabilities
unauthorized data access detection
pubcrawl
privacy
parallel processing
on-demand scalability
MapReduce systems
honeypot
homomorphic encryption methods
general programming languages
Distributed databases
Big Data
data privacy
Data models
data encryption
data analytics tasks
data analysis
Cryptography
pubcrawl170105
Computational modeling
Cloud Computing
Big Data revolution
biblio
"Discovery of De-identification Policies Considering Re-identification Risks and Information Loss"
Submitted by grigby1 on Thu, 02/23/2017 - 12:14pm
Lattices
Upper bound
UCI machine learning repository
Synthetic aperture sonar
Safe Harbor
risk analysis
reidentification risks
pubcrawl170105
privacy leakage
privacy
learning (artificial intelligence)
Computational modeling
information loss
information entropy
HIPPA
Entropy
deidentified data
deidentification policies
de-identification
data privacy
data analysis
biblio
"Scalable Security Event Aggregation for Situation Analysis"
Submitted by abfox on Tue, 02/14/2017 - 1:43pm
scalable security event aggregation
large-scale data processing
on-demand aggregation
parallel processing
pattern clustering
performance evaluation
periodic aggregation
pubcrawl170101
query languages
query support
large-scale data analysis
SEAS-MR
security
security analytics
Security event aggregation
security event aggregation system over MapReduce
sensors
situation analysis
stealthy hacking processes
big-data security analytics
advanced persistent threats
Aggregates
Analytical models
APT
attack methodologies
Big Data
big-data analytics
big-data computing
advanced persistent threat
Computer crime
Computers
cyber-attacks
data analysis
Data processing
Database languages
Hadoop cluster
high-level query languages
biblio
"Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data"
Submitted by abfox on Tue, 02/14/2017 - 12:41pm
internet
Web proxy logs
system-on-chip
Servers
security products
pubcrawl170101
malware strains
malware
Los Alamos National Lab
large-scale log data mining
LANL
IP networks
invasive software
advanced persistent threat
graph theory
Electronic mail
early-stage enterprise infection detection
early-stage APT infection
DNS logs
Data mining
data analysis
business data processing
belief propagation
belief networks
APT infection attacks
advanced persistent threats
biblio
A Robust Functional-Data-Analysis Method for Data Recovery in Multichannel Sensor Systems
Submitted by BrandonB on Wed, 05/06/2015 - 2:55pm
robust data-recovery method
limited data transmission
multichannel sensor systems
multimodular integral pressurized water reactor
multivariate functional regression
nonskewed signal recovery
Predictive modelss
principal component analysis
regression analysis
reliability enhancement
integrated systems
robust functional-data-analysis method
sensor fusion
sensor readings
sensor signal smoothing
skewed distributions
smoothing methods
statistical distributions
strongly skewed signal recovery
turbofan engine data
Eigenvalues and eigenfunctions
Bandwidth
condition monitoring
coolant-flow loop
correlated signals
correlation methods
critical equipment
data analysis
Data models
data recovery
asynchronous data sampling
experimental flow-control loop
failure prevention
fault diagnosis
fault prognosis
FPCA
functional data analysis
functional principal component analysis
grand median functions
biblio
A Robust Functional-Data-Analysis Method for Data Recovery in Multichannel Sensor Systems
Submitted by BrandonB on Wed, 05/06/2015 - 2:35pm
Robustness
multichannel sensor systems
multimodular integral pressurized water reactor
multivariate functional regression
nonskewed signal recovery
Predictive models
principal component analysis
regression analysis
reliability enhancement
robust data-recovery method
robust functional-data-analysis method
limited data transmission
sensor fusion
sensor readings
sensor signal smoothing
Sensor Systems
skewed distributions
smoothing methods
statistical distributions
strongly skewed signal recovery
turbofan engine data
Eigenvalues and eigenfunctions
Bandwidth
condition monitoring
coolant-flow loop
correlated signals
correlation methods
critical equipment
data analysis
Data models
data recovery
asynchronous data sampling
experimental flow-control loop
failure prevention
fault diagnosis
fault prognosis
FPCA
functional data analysis
functional principal component analysis
grand median functions
integrated systems
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
next ›
last »