Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data analysis
biblio
Augmented reality for visualizing security data for cybernetic and cyberphysical systems
Submitted by grigby1 on Fri, 08/28/2020 - 12:33pm
information security visualization
visualization models
visualization evaluation
visual components
visual analytics
virtual reality
security of data
security data visualization
Scalability
resilience
pubcrawl
privacy
augmented reality
information security areas
information security
Human behavior
Data visualization
data visualisation
data analysis
cyberphysical systems
cybernetics
cybernetic systems
computer security
biblio
Making the Pedigree to Your Big Data Repository: Innovative Methods, Solutions, and Algorithms for Supporting Big Data Privacy in Distributed Settings via Data-Driven Paradigms
Submitted by aekwall on Mon, 08/24/2020 - 1:50pm
data analysis
big data privacy
security-inspired protocols
protocol checking
privacy-of-big-data
DRIPROM framework
distributed-big-data
distributed settings
data-driven aggregate-provenance privacy-preserving big multidimensional data
cloud settings
Human Factors
Proposals
security of data
Distributed databases
Metrics
data aggregation
pubcrawl
Resiliency
Data models
Protocols
data privacy
Big Data
Scalability
Cloud Computing
biblio
Analytical Evaluation of k–Anonymity Algorithm and Epsilon-Differential Privacy Mechanism in Cloud Computing Environment
Submitted by grigby1 on Thu, 08/13/2020 - 5:35pm
privacy problem
epsilon-differential privacy mechanism
evaluation
expected risks
Human behavior
k-anonymity algorithm
Metrics
privacy
privacy environment
dilemmas
privacy protection algorithms
pubcrawl
resilience
Resiliency
Runtime
security of data
unexpected risks
Data models
algorithm orientations
analytical evaluation
anonymity
anonymity algorithm
Cloud Computing
cloud computing environment
composability
data analysis
algorithm orientation
data privacy
Data Security
data segregation
Databases
differential privacy
differential privacy algorithm
differential privacy mechanism
biblio
Intrusion Detection Using Deep Learning and Statistical Data Analysis
Submitted by aekwall on Mon, 08/10/2020 - 10:37am
Mathematical model
statistical data analysis
KDD cup 99 datasets
binary classification model
deep learning algorithm
artificial neural network
deep learning
data classification
cyber physical systems
Artificial Neural Networks
computer networks
statistical analysis
Data mining
data analysis
Intrusion Detection
pattern classification
neural nets
machine learning
policy-based governance
pubcrawl
Resiliency
learning (artificial intelligence)
feature extraction
network security
Data models
Classification algorithms
computer network security
biblio
Artificial Intelligence and the Privacy Paradox of Opportunity, Big Data and The Digital Universe
Submitted by grigby1 on Fri, 08/07/2020 - 3:47pm
5G mobile communication
The Internet of Things (IoT)
Social Networking Sites (SNS)
privacy paradox
privacy issue
Digital Universe
Data Analytics
5G technology
AI
face recognition
Scalability
Big Data
Internet of Things
privacy
data privacy
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
IoT
Artificial Intelligence
data analysis
biblio
Privacy-Preserving Deep Learning via Additively Homomorphic Encryption
Submitted by grigby1 on Fri, 08/07/2020 - 3:47pm
resilience
neural nets
privacy
privacy issues
privacy-preserving deep learning
privacy-preserving financial data analytics systems
privacy-preserving logistic regression
pubcrawl
regression analysis
JST CREST AI
Resiliency
Scalability
social challenges
social life
social sciences computing
Society 5.0
super-smart society
additively homomorphic encryption
IoT
information and communication technology
Human Factors
Human behavior
fraud
fourth industrial revolution
financial institutions
financial data processing
encryption
digital arithmetic
deep learning
data privacy
data analysis
Big Data
AI
biblio
Privacy Mining of Large-scale Mobile Usage Data
Submitted by grigby1 on Thu, 07/30/2020 - 2:32pm
machine learning tools
android
mobile devices
ios
iOS (operating system)
mobile network
privacy leakage detection
iOS Security
iOS system
inference mechanisms
mobile privacy leakage
mobile traffic data
mobile usage data
privacy analysis
privacy detection model
privacy inference mining
privacy mining
private usage patterns
data privacy
security of data
data analysis
Data mining
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
learning (artificial intelligence)
privacy
Object recognition
mobile computing
smart phones
Metrics
Compositionality
password
biblio
Performance Evaluation of Intrusion Detection Streaming Transactions Using Apache Kafka and Spark Streaming
Submitted by aekwall on Mon, 07/27/2020 - 12:14pm
cybersecurity intrusion detection
Sparks
Real-Time Decision Making
intrusion tolerance
Processing time
Big Data Analytics
apache kafka
Apache Spark Streaming
complex attacks
performance evaluation
extremely competitive financial market
high-level protection
intrusion detection streaming transactions
intrusion detection system
massive Internet-based services
short period time
Spark Streaming
stream data
machine learning
security of data
Big Data
real-time systems
Resiliency
pubcrawl
composability
internet
Decision Making
Intrusion Detection
telecommunication traffic
data analysis
Government
Data mining
fault tolerant computing
network traffic
parallel processing
biblio
A Creditability-based Intrusion Tolerant Method for Protection Equipment in Transformer Substations
Submitted by aekwall on Mon, 07/27/2020 - 12:12pm
Protective relaying
creditability-based intrusion-tolerant algorithm
Cyber network attack
interconnected network environment
interconnection of all things(IoT)
Intrusion-tolerant
malfunction protection
mobile terminal devices
protection equipment
CIT algorithm
Protective Relays
relay protection
relays protection
security distribution network
sensing data analysis
transformer substations
intrusion tolerance
security of data
Abnormal data diagnose
open network environment
Integrated circuit modeling
Numerical models
sensors
power engineering computing
Substations
data analysis
smart phones
composability
pubcrawl
Resiliency
real-time systems
telecommunication security
Internet of Things
biblio
Privacy Preserving Big Data Publication On Cloud Using Mondrian Anonymization Techniques and Deep Neural Networks
Submitted by aekwall on Mon, 07/13/2020 - 11:07am
privacy
k-anonymity
machine learning
Mondrian anonymization techniques
Mondrian based k-anonymity approach
neural nets
Neural networks
personal data
personally identifiable information
predominant factor
high-dimensional data deep neural network based framework
privacy breach
privacy preservation
privacy preserving big data publication
privacy-preservation
protection
Resiliency
security
user privacy in the cloud
data analysis
pubcrawl
Human Factors
resilience
Scalability
Metrics
Big Data
Big Data Analytics
Cloud Computing
compromising privacy
big data privacy
data management
Data models
data privacy
data utility
Databases
deep neural networks
differential privacy
DNN
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »