Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data analysis
biblio
An overview of cloud middleware services for interconnection of healthcare platforms
Submitted by BrandonB on Wed, 05/06/2015 - 1:12pm
middleware
Healthcare
healthcare platform interconnection
heterogeneous devices
IaaS
management problem
medical computing
medical devices
Medical services
health care
PaaS
performance improvement
security
security of data
security problem
Software Architecture
software performance evaluation
standards
cloud technologies
application program interfaces
Big Data
big-data analytics
Biomedical imaging
cloud
Cloud architecture
Cloud Computing
cloud computing middleware services
API
computer architecture
Context
data analysis
Data integration
data sources
delay problem
electronic health records
electronic healthcare register literature
biblio
Data Generation and Analysis for Digital Forensic Application Using Data Mining
Submitted by BrandonB on Wed, 05/06/2015 - 9:38am
firewall logs
Web browser
transactional data
storage management
security
remote system forensic
packet captures
network traffic
network traces
network forensic analysis
network attack detection
memory forensic analysis
Log Data collection
intrusion detection system
FTK 4.0
firewalls
clustering
Digital Forensics
Digital forensic tool
digital forensic application
Databases
Data visualization
data storage
Data mining
data generation
Data collection
data analysis
cyber system
cyber crime huge log data
Computers
Computer crime
biblio
LoyalTracker: Visualizing Loyalty Dynamics in Search Engines
Submitted by BrandonB on Tue, 05/05/2015 - 12:26pm
loyalty dynamics visualization
word cloud
visual analytics system
visual analytics
user loyalty tracking
user log data
Time-series visualization
text visualization
text analysis
switching behavior
stacked graphs
Search methods
search engines
search engine providers
Behavioral science
LoyalTracker
log data visualization
interactive visualization technique
Information analysis
Human Factors
flow view
flow metaphor
density map
defection behavior
Data visualization
data visualisation
data analysis
biblio
Towards a Set Theoretical Approach to Big Data Analytics
Submitted by BrandonB on Tue, 05/05/2015 - 12:24pm
H&M
text sentiment analysis
text analysis
tagging
SODATO
social networking (online)
social network analysis
Social Data Analytics
social data analytic tool
social big data analytics
set theory
set theoretical approach
relational sociology
Media
Mathematical model
Analytical models
graph theoretical approach
formal model
formal methods
fast fashion company
Facebook page
Facebook
data science
Data models
data analysis
conceptual model
Computational Social Science
Big Social Data
Big Data
biblio
Obtaining Technology Insights from Large and Heterogeneous Document Collections
Submitted by BrandonB on Tue, 05/05/2015 - 12:22pm
information retrieval
topic evolution
text analysis
publications
patents
patenting profiles
mining publications
mining patent databases
Market research
large heterogeneous text collections
insight generation
academic research
indexing
Hidden Markov models
heterogeneous document collections
Data visualization
Data mining
data analysis
Context
automated topical analysis
analyzing research trends
biblio
Visualization of Security Metrics for Cyber Situation Awareness
Submitted by BrandonB on Tue, 05/05/2015 - 11:08am
Measurement
visualization
visual analytics technique
SIEM systems
security metric visualization
security information visualization
security information and event management systems
security
Olympic Games scenario
Network Security Status
network security level assessment
Abstracts
Layout
high level metrics visualization
data visualisation
data analysis
cyber situation awareness
computer network security
big data security
Big Data
Availability
biblio
Open science, open security
Submitted by BrandonB on Tue, 05/05/2015 - 10:43am
Linux
security of data
security
production quality tools
Production
parallel processing
open security
open science
Materials
data representation
Intrusion Detection
HPC security
High performance computing
Filtering
data selection
Buildings
computer architecture
data analysis
biblio
Privacy and Big Data
Submitted by BrandonB on Tue, 05/05/2015 - 8:29am
anonymization
Big Data
data analysis
Data collection
Data integration
data privacy
data retention
de-identification
Government
privacy
Public policy
security
biblio
Secure Data Mining in Cloud Using Homomorphic Encryption
Submitted by BrandonB on Tue, 05/05/2015 - 8:23am
Big Data
Cloud Computing
Cryptography
data analysis
Data mining
data mining security
data privacy
Data storage systems
Databases
encryption
Homomorphic encryption
k-means data mining approach
biblio
SharkFin: Spatio-temporal mining of software adoption and penetration
Submitted by tdumitra on Fri, 01/09/2015 - 8:35pm
data analysis
Empirical Models for Vulnerability Exploits
Internet security
Jan'15
Malware propagation
Metrics
UMD
Metrics
UMD
Empirical Models for Vulnerability Exploits
UMD PROJECTS:
Jan'15
Empirical Models for Vulnerability Exploits
« first
‹ previous
…
12
13
14
15
16
17
18
19
20