Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data analysis
biblio
The Roles of E-Government in Healthcare from the Perspective of Structuration Theory
Submitted by grigby1 on Fri, 10/16/2020 - 10:23am
Lenses
Trajectory
structuration theory
security
Resiliency
resilience
qualitative methods
public administration
pubcrawl
policy-based governance
Medical services
collaboration
information technology
healthcare services
Healthcare
health care
government policies
Electronic government
e-government concept
E-Government
data analysis
Cybersecurity
biblio
A Probability based Model for Big Data Security in Smart City
Submitted by grigby1 on Tue, 10/06/2020 - 12:41pm
security of data
IoT
organisational data
Organizations
personal data
probability
probability based model
pubcrawl
resilience
Resiliency
security
highly sensitive data
sensitive data sharing
smart applications
smart cities
Smart City
smart city critical data
smart city data
smart technologies
smart traffic management system
transport data
Trusted Computing
Data Leakage Detection
Big Data
big data security
bigraph
Computational modeling
Computing Theory
crisis response
critical data security
data analysis
Data Analytics
data leakage
Analytical models
Data models
data objects
data privacy
disaster resilience
economic data
emergency management
energy data
environment data
graph theory
Guilt Model
biblio
Machine Learning-Based Network Vulnerability Analysis of Industrial Internet of Things
Submitted by grigby1 on Fri, 09/18/2020 - 1:08pm
vulnerability assessment
command injection attacks
supervisory control and data acquisition (SCADA)
structuredquery language injection attacks
intrusion detection solutions
Industrial Internet of Things (IIoT)
Industrial Internet of Things
IIoT systems
cyber-vulnerability assessment
cyber attack
electromagnetic interference
Big Data Analytics
IDS
SQL
machine learning (ML)
cyber-attacks
Internet of Things
Metrics
Structured Query Language
Protocols
network security
composability
production engineering computing
Intrusion Detection
intrusion detection system
Resiliency
resilience
pubcrawl
data analysis
machine learning
security of data
learning (artificial intelligence)
biblio
Detection of Phishing Attacks with Machine Learning Techniques in Cognitive Security Architecture
Submitted by aekwall on Mon, 09/14/2020 - 11:32am
Artificial Intelligence
URL analysis
python tools
phishing web attacks detection
cybersecurity analysts
cognitive security architecture
cognitive security application
Artificial Neural Networks
computational intelligence
Compositionality
Uniform resource locators
Data Analytics
Phishing
Cryptography
Python
data analysis
machine learning techniques
Cybersecurity
internet
Computer crime
machine learning
composability
pubcrawl
learning (artificial intelligence)
machine learning algorithms
Big Data
biblio
Identification of State Registers of FSM Through Full Scan by Data Analytics
Submitted by grigby1 on Fri, 08/28/2020 - 2:55pm
industrial property
state transitions
state register identification
Silicon
Scalability
Resiliency
resilience
regression analysis
Registers
pubcrawl
Physical design
OpenCores
logic design
Intellectual Property Protection
Big Data
FSM state registers
FSM design
finite-state machine
finite state machines
electronic engineering computing
downstream design
Decision trees
Decision Tree
Data protection
Data mining
data analysis
big data security metrics
Big Data Analytics
biblio
A Comparison of Performance Metrics with Severely Imbalanced Network Security Big Data
Submitted by grigby1 on Fri, 08/28/2020 - 2:53pm
sampling
pattern classification
Performance Metrics
Precision-Recall Curve
Predictive models
pubcrawl
Radio frequency
resilience
Resiliency
minority classes
sampling distribution ratio
sampling methods
Scalability
severe class imbalance
severely imbalanced network security big data
Sparks
testing dataset roles
Training
Data mining
Apache Spark framework
area under the receiver operating characteristic curve
Big Data
Big Data Analytics
big data security metrics
Cluster Computing
computer network security
data analysis
apache spark
Geometric Mean
imbalanced data
learning (artificial intelligence)
machine learning
majority class
Measurement
metrics testing
Metrics
biblio
ClustCrypt: Privacy-Preserving Clustering of Unstructured Big Data in the Cloud
Submitted by grigby1 on Fri, 08/28/2020 - 2:34pm
resilience
big data security in the cloud
unstructured
topic-based clustering
secure cloud-based semantic search system
privacy-preserving data clustering
encrypted unstructured big data
clustering methods
ClustCrypt
client-side encryption
big data security
Scalability
pattern clustering
clustering
Data Analytics
Cryptography
Metrics
data encryption
Big Data
cloud services
Cloud Computing
data privacy
Indexes
Resiliency
pubcrawl
data analysis
Organizations
privacy
encryption
biblio
Secure Pattern-Based Data Sensitivity Framework for Big Data in Healthcare
Submitted by grigby1 on Fri, 08/28/2020 - 2:34pm
resilience
big data security in the cloud
special big data analytics methods
Sensitivity
sensitive information protection
secure pattern-based data sensitivity framework
patient data
healthcare data
Hadoop distributed file system
Hadoop
Elliptic curves
electronic medical records
data frequency
big data technologies
Scalability
information retrieval
Cryptography
electronic health records
Metrics
parallel processing
Data protection
Big Data
health care
Medical services
Access Control
Resiliency
pubcrawl
Distributed databases
data analysis
security
learning (artificial intelligence)
encryption
biblio
Suspicious Network Event Recognition Using Modified Stacking Ensemble Machine Learning
Submitted by grigby1 on Fri, 08/28/2020 - 2:34pm
extremely randomised trees
artificial intelligence-oriented automatic services
big-data analytics
cyber-threats
Data preprocessing
data science
Ensemble Learning
ensemble learning.
exploratory data analysis
AdaBoost
feature creation
modified stacking ensemble machine learning
Network Event Log Analytics
network intrusions
network traffic alerts
suspicious network event recognition dataset
suspicious network events
big data security in the cloud
neural nets
machine learning
data analysis
pubcrawl
Resiliency
Conferences
random forests
Big Data
pattern classification
security of data
Neural networks
Metrics
Random Forest
resilience
Scalability
Feature Selection
2019 IEEE BigData Cup Challenge
biblio
Accurate Marking Method of Network Attacking Information Based on Big Data Analysis
Submitted by grigby1 on Fri, 08/28/2020 - 2:33pm
resilience
network attack detection ability
network attack information nodes
network attack nodes
network attacking information
network offensive information
network security defense
open network environment
pubcrawl
Network
Resiliency
Scalability
security of data
smart cities
task scheduling method
telecommunication scheduling
Transportation
big data security in the cloud
accurate marking method
adaptive learning model
attack
attack information chain
attack information tagging
Big Data
Big Data analysis method
Big Data fusion tracking recognition
Chained Attacks
Cloud Computing
computer network security
Conferences
data analysis
information marking
learning (artificial intelligence)
Metrics
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »