Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data analysis
biblio
Raw Cardinality Information Discovery for Big Datasets
Submitted by grigby1 on Fri, 12/11/2020 - 2:00pm
HDFS
back-end Big Data systems
Big Data sets
Cardinality
data separation
elastic
elasticsearch
events
grafana
Pipelines
Java
logs
Map Reduce
parallel discovery data store infrastructure
raw cardinality information discovery
rocksdb
search queries
Metadata Discovery Problem
Cloud Computing
Data mining
Monitoring
pubcrawl
Metrics
resilience
Resiliency
Conferences
Scalability
data analysis
Topology
Big Data
metadata
microsoft windows
Measurement
Compositionality
query processing
Hadoop
biblio
Secure Real-Time Heterogeneous IoT Data Management System
Submitted by aekwall on Mon, 12/07/2020 - 11:25am
secure platform
neural style transfer
on-device computing
performance evaluation
Predictive Metrics
pubcrawl
real-time data collection
real-time data processing system
Real-time monitoring
real-time systems
Resiliency
Scalability
machine learning
secure real-time heterogeneous IoT data management
secure systems
security
sensitive data
Software
streaming IoT data
surveillance
time data analytics system
Trusted Execution Environment
trusted platform modules
drones
cloud
Cloud Computing
composability
Cryptography
cyber-physical system security
data analysis
data privacy
Data Security
diverse IoT devices
drone-based data
authorisation
edge computing
edge device
embedded devices
end-to-end data encryption mechanism
heterogeneous data
Internet of Things
IoT
IoT devices
IOT edge computing
large-scale data analytics
biblio
Secure Data Streaming to Untrusted Road Side Units in Intelligent Transportation System
Submitted by aekwall on Mon, 11/23/2020 - 10:28am
Data Analytics
Intelligent Data and Security
Intelligent Data Security
vehicles stream data
vehicle-to-infrastructure communications
vehicle layer
untrusted road side units
secure data streaming
road side unit
data security issues
sensory data
key management
Intelligent Transportation Systems
Intelligent Transportation System
Compositionality
IoT
multi-tenancy
data analysis
vehicular ad hoc networks
privacy
pubcrawl
Resiliency
telecommunication security
Access Control
encryption
Data Security
Cryptography
Scalability
Monitoring
automobiles
biblio
Data Analysis for Anomaly Detection to Secure Rail Network
Submitted by aekwall on Mon, 11/23/2020 - 10:24am
Bidirectional control
Intelligent Data and Security
Intelligent Data Security
Wireshark detection
timely detection
secure rail network
railway communication
rail systems
rail network traffic data
Rail Network Security
packet analysis system
network flow
network features
IP networks
alert function
Rails
Compositionality
data analysis
Anomaly Detection
pubcrawl
Resiliency
Support vector machines
Protocols
telecommunication security
telecommunication traffic
Scalability
biblio
Abnormal Bus Data Detection of Intelligent and Connected Vehicle Based on Neural Network
Submitted by aekwall on Mon, 11/23/2020 - 10:23am
Floods
Intelligent Data and Security
Intelligent Data Security
optimized neural network
Intelligent vehicles
abnormal bus data detection
abnormal bus data analysis
abnormal bus data
data centers
connected vehicles
Intelligent Transportation Systems
attack
Compositionality
Automotive engineering
Logic gates
neural network
data analysis
Vulnerability
neural nets
standards
detection
pubcrawl
Resiliency
Scalability
intrusion detection system
security of data
biblio
2 Fast 2 Secure: A Case Study of Post-Breach Security Changes
Submitted by grigby1 on Fri, 11/20/2020 - 1:26pm
post-breach security
zero risk appetite
Task Analysis
security theatre
Security Policies Analysis
security policies
security of data
security division
security culture
security controls
security breach
security behaviour
pubcrawl
Productivity
post-breach security changes
Companies
policy-based governance
Personnel
participatory action research
organization security division
organisational aspects
Investment
Interviews
humble inquiry
financial investment
financial data processing
employees
Data Breach
data analysis
biblio
Synthesizing Energy Consumption Data Using a Mixture Density Network Integrated with Long Short Term Memory
Submitted by grigby1 on Fri, 11/20/2020 - 1:06pm
residential consumer energy consumption
mixture density network
multiple critical infrastructures
policy-based governance
power engineering computing
Power Grid
Predictive models
privacy
privacy concerns
Probability density function
pubcrawl
Metrics
residential smart meters
resilience
Resiliency
Scalability
security
smart cities
smart grid consumer privacy
smart meters
smart power grids
standards
energy consumption
collaboration
commercial consumer energy consumption
Communication networks
composability
data analysis
data dissemination
Data models
data privacy
data storage
data synthesis
centralized data analytics
fully synthetic energy consumption data
Human behavior
human behavioral impacts
information dissemination
load patterns
Logic gates
long short-term memory network
LSTM
MDN
biblio
Research on Operating Data Analysis for Enterprise Intranet Information Security Risk Assessment
Submitted by grigby1 on Tue, 11/17/2020 - 1:40pm
enterprise intranet
Operating systems security
user operation logs
security relevant configurations
risk assessment
operating system logs
operating data analysis
Operating Data
information security knowledge
enterprise intranet information security risk assessment
risk management
intranets
resilience
composability
computer network security
Resiliency
Metrics
pubcrawl
data analysis
biblio
Compositional Data Analysis with PLS-DA and Security Applications
Submitted by aekwall on Mon, 11/09/2020 - 12:13pm
Euclidean distance
Information Reuse and Security
spam filters
PLS-DA algorithm
partial least squares discriminant analysis
Least squares approximations
isometric log ratio transformation
information system security applications
ILR
data-based power transformation
data science models
compositional vectors
compositional data analysis
Compositional data
Aitchison transformation
Intrusion Detection
Loading
Compositionality
statistical analysis
data analysis
Mathematical model
spam filtering
unsolicited e-mail
standards
pubcrawl
Resiliency
Electronic mail
Data models
security of data
biblio
HashTag Erasure Codes: From Theory to Practice
Submitted by grigby1 on Mon, 11/02/2020 - 10:40am
Scalability
maintenance engineering
MDS erasure codes
minimum-storage regenerating codes
MSR constructions
pubcrawl
Reed-Solomon codes
regenerating codes
repair-bandwidth
lowest data-read
single and multiple failures
small sub-packetization level
storage management
storage overhead
sub-packetization level
Systematics
Twitter
access-optimal
input-output programs
i/o systems security
I/O operations
i-o systems security
HTECs
high-rate MDS codes
hashtag sign
HashTag erasure codes
Hadoop
encoding
distributed storage
Distributed databases
data analysis
code construction
Bandwidth
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »