Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data analysis
biblio
Experiment Design for Complex Immersive Visualisation
Submitted by grigby1 on Wed, 02/03/2021 - 1:11pm
Information systems
visualisation
tools
software performance
resilience
pubcrawl
privacy
network forensics
military computing
military communication
immersive systems
Human Factors
human computer interaction
Human behavior
Data visualization
data analysis
cyber warfare
cyber physical systems
composability
biblio
Exploring Immersive and Non-Immersive Techniques for Geographic Data Visualization
Submitted by grigby1 on Wed, 02/03/2021 - 1:09pm
geospatial model visualization
resilience
pubcrawl
privacy
nonimmersive visualizations
nonimmersive technique
immersive technique
Human Factors
Human behavior
immersive systems
geospatial data visualization
geographic information systems
geographic data visualization
data visualisation
data analysis
cyber physical systems
composability
biblio
Machine Learning Method Based on Stream Homomorphic Encryption Computing
Submitted by aekwall on Mon, 02/01/2021 - 11:34am
Elliptic curve cryptography
stream homomorphic encryption computing
mobile positioning
KNN
k nearest neighbors
computational time
computational resources
\$k\$ nearest neighbors
Homomorphic encryption
data analysis
estimation
Human Factors
security
Mathematical model
Distributed databases
Metrics
pubcrawl
Resiliency
machine learning
nearest neighbour methods
mobile computing
encryption
Cryptography
Scalability
biblio
Pattern Extraction for Behaviours of Multi-Stage Threats via Unsupervised Learning
Submitted by grigby1 on Fri, 01/22/2021 - 1:39pm
Training data
pattern extraction
multistage threats
Multi-stage threats
malicious behaviour
Log-files Analysis
heterogeneous log-files
Cyber Threats Intelligence
Behaviour Analysis
advanced persistent threats
pattern clustering
Clustering algorithms
APT
advanced persistent threat
security of data
Cybersecurity
Scalability
Correlation
Resiliency
resilience
Metrics
Human behavior
pubcrawl
IP networks
Unsupervised Learning
data analysis
Anomaly Detection
feature extraction
biblio
A Programming Framework for Differential Privacy with Accuracy Concentration Bounds
Submitted by aekwall on Mon, 01/11/2021 - 1:42pm
Haskell
tools
Scalability
Resiliency
reasoning
pubcrawl
programming languages
programming differentially private analyses
programming
private data analyses
privacy
Human behavior
taint analysis
functional programming
differential privacy
Databases
data privacy
data analysis
data analyses results
concentration bounds
composability
cognition
accuracy concentration
Accuracy
biblio
De-identification and Privacy Issues on Bigdata Transformation
Submitted by grigby1 on Mon, 12/28/2020 - 12:39pm
ICT industry
t-closeness
Scalability
Resiliency
resilience
pubcrawl
privacy attacks
privacy
personal information
Metrics
l-Diversity
k-anonymity
Industries
Big Data
Human behavior
Guidelines
government sectors
diseases
de-identification processes
data privacy
Data models
data analysis
controllable privacy level
Big Data transformation
big data privacy
biblio
Research on Intelligent Security Protection of Privacy Data in Government Cyberspace
Submitted by grigby1 on Mon, 12/28/2020 - 12:38pm
protection efficiency
intelligent discovery
intelligent security protection
learning (artificial intelligence)
machine learning
Metrics
middleware
NLP
open systems
privacy protection
improved masking process
pubcrawl
resilience
Resiliency
Scalability
security
sensitive data discovery
static masking
structured privacy data
unstructured privacy data
data source
automatic execution
automatic recommendation
big data privacy
categorization and classification
Classification algorithms
data analysis
data masking algorithm
Data models
data privacy
agent-based intelligent masking middleware
dynamic masking
Government
government cyberspace
government data masking process
government data processing
government privacy data
government unstructured text
Human behavior
biblio
Experimenting and Assessing a Distributed Privacy-Preserving OLAP over Big Data Framework: Principles, Practice, and Experiences
Submitted by grigby1 on Mon, 12/28/2020 - 12:38pm
smart cities
privacy-preserving OLAP-based big data analytics
OLAP-based Big Data Analytics
OLAP data cubes
OLAP analysis
OLAP aggregate privacy
Experiments and Analysis over Big Datasets
Emerging Big Data Applications
distributed privacy-preserving OLAP framework
Distributed Privacy-Preserving OLAP
big data framework
authoritative analytical tool
bioinformatics
big data privacy
social networks
Distributed databases
tools
Social network services
privacy preservation
Measurement
Big Data
privacy
Scalability
data privacy
Resiliency
resilience
Metrics
Human behavior
pubcrawl
Data mining
data analysis
security of data
biblio
The privacy paradigm : An overview of privacy in Business Analytics and Big Data
Submitted by grigby1 on Mon, 12/28/2020 - 12:37pm
Big Data
Technology management
privacy paradigm
GPDR
data mining technologies
dados
business analytics
analytics
big data privacy
Google
Data protection
Companies
privacy
information technology
data privacy
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
business data processing
Data mining
data analysis
biblio
Mediating Data Trustworthiness by Using Trusted Hardware between IoT Devices and Blockchain
Submitted by aekwall on Mon, 12/21/2020 - 1:36pm
Data Transmission
trusted hardware
physically unclonable function
data analysis methods
blockchain ledger
authenticated encryption method
AI technology
data trustworthiness
Trusted Execution Environment
artificial intelligence technology
TEE
IoT device
digital signatures
Artificial Intelligence
smart cities
IoT
Relays
trustworthiness
secure protocol
data analysis
blockchain
composability
pubcrawl
Trusted Computing
Protocols
Cryptographic Protocols
Internet of Things
encryption
Servers
computer network security
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »