Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data analysis
biblio
Research on Network Traffic Identification based on Machine Learning and Deep Packet Inspection
Submitted by grigby1 on Fri, 07/03/2020 - 1:26pm
machine learning method
Training
telecommunication traffic
Scalability
Resiliency
resilience
quality of user service
pubcrawl
probability
Peer-to-peer computing
pattern matching
network traffic monitoring
network traffic identification method
network traffic identification
application traffic
machine learning algorithms
machine learning
learning (artificial intelligence)
Inspection
encryption
dpi
deep packet inspection technology
deep packet inspection
data analysis
Cryptography
computer network security
computer network management
biblio
Enhancing Big Data Security using Elliptic Curve Cryptography
Submitted by grigby1 on Fri, 06/26/2020 - 12:55pm
map reduce Hadoop
Servers
security of data
security and privacy
Scalability
Resiliency
resilience
public key cryptography
pubcrawl
Metrics
Big Data
Indium tin oxide
Elliptic curve cryptography
data processing technology
data distribution
data configuration
data analysis
big data security
big data analytics.
biblio
Generative Adversarial Learning for Machine Learning empowered Self Organizing 5G Networks
Submitted by grigby1 on Fri, 06/12/2020 - 12:22pm
Metrics
Synthetic Data
SON algorithm
SON
Service requirements
self organizing 5G networks
Scalability
Resiliency
resilience
realistic synthetic data
pubcrawl
neural nets
ML
5G
machine learning
learning (artificial intelligence)
interconnected deep artificial neural networks
generative adversarial networks
generative adversarial network
Generative Adversarial Learning
deep learning
data analysis
CDRs
call data records
5G mobile communication
biblio
Cyber-physical systems security through multi-factor authentication and data analytics
Submitted by aekwall on Mon, 06/01/2020 - 11:04am
Internet of Things
Smart homes
smart cities
secure authentication
Resiliency
resilience
pubcrawl
password
multifactor authentication
Multi-factor authentication
Metrics
authentication
Internet of Everything
Human Factors
Human behavior
event processing
Data Analytics
data analysis
cyber-physical systems security
cyber-physical systems
complex system
authorisation
biblio
Self-Improving Autonomic Systems for Antifragile Cyber Defence: Challenges and Opportunities
Submitted by aekwall on Mon, 06/01/2020 - 10:54am
desirable property
unknown situations
uncertainty
Stress
self-improving autonomic systems
self improvement
security of data
resilience
policy-based governance
middleware security
middleware frameworks
middleware
learning
Human Factors
human computer interaction
distributed self-improvement
Automated Response Actions
Decision Making
data analysis
Cyber defence
contested military environments
Autonomic systems
autonomic cyber defence systems
antifragility
antifragile systems
antifragile cyber defence
Analytical models
Adaptation models
pubcrawl
composability
Resiliency
biblio
Security Network On-Chip for Mitigating Side-Channel Attacks
Submitted by aekwall on Mon, 05/11/2020 - 11:08am
multiple countermeasures
compromised device
contemporary hardware threats
design complexity
electromagnetic analysis attacks
electromagnetic interference
hardware security threats
high-confidence security network on-chip
individual threats
machine learning security IC
malicious physical interference
modern ICs
attack-specific countermeasures
on-chip distribution networks
On-chip power delivery
on-chip voltage variations
operating device-under-attack
robust confidence security network on-chip
security networks
Side-channel attack
side-channel attack mitigation
strict performance requirements
trained ML ICs
network on chip security
timing
Scalability
learning (artificial intelligence)
Resiliency
pubcrawl
Metrics
machine learning
physical interaction
system-on-chip
system security
sensors
Attack detection
security of data
Hardware Security
side-channel attacks
integrated circuit design
data analysis
malicious activity
integrated circuits
network-on-chip
active attack
advance invasive attacks
advance noninvasive attacks
advanced technology nodes
biblio
Optimized Data de-Identification Using Multidimensional k-Anonymity
Submitted by aekwall on Mon, 04/20/2020 - 10:24am
data quality
privacy models and measurement
privacy protection mechanism
privacy preserving
privacy leak risk
priority weight-adjusted method
personal privacy
personal information
optimized multidimensional method
multidimensional k-anonymity
mean difference recommending tree method
MDR tree method
k-anonymity
information loss rate
globalized knowledge economy
de-identification
Big Data
data authenticity preservation
big data analysis
anonymization-based de-identification method
information loss
greedy algorithms
Big Data Analytics
Numerical models
data privacy
Measurement
data analysis
Data protection
Metrics
privacy
pubcrawl
Data models
biblio
Optimized Data de-Identification Using Multidimensional k-Anonymity
Submitted by aekwall on Mon, 04/20/2020 - 10:24am
data quality
privacy models and measurement
privacy protection mechanism
privacy preserving
privacy leak risk
priority weight-adjusted method
personal privacy
personal information
optimized multidimensional method
multidimensional k-anonymity
mean difference recommending tree method
MDR tree method
k-anonymity
information loss rate
globalized knowledge economy
de-identification
Big Data
data authenticity preservation
big data analysis
anonymization-based de-identification method
information loss
greedy algorithms
Big Data Analytics
Numerical models
data privacy
Measurement
data analysis
Data protection
Metrics
privacy
pubcrawl
Data models
biblio
The Best of Both Worlds: Challenges in Linking Provenance and Explainability in Distributed Machine Learning
Submitted by aekwall on Mon, 03/30/2020 - 11:33am
end-to-end explainability
basic transformations
consistent data
data analysis pipeline
data pre-processing steps
data preparation
distributed file system
distributed machine learning
distributed setting
machine learning models
entire data set
explainable machine learning
explainable models
homogeneous data
linking provenance
machine learning experts
single data
Distributed databases
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
composability
Computational modeling
Metrics
machine learning
Data models
data analysis
Entropy
Provenance
distributed system
Decision trees
data provenance
distributed computing
biblio
A Platform for Private and Controlled Spreadsheet Objects Sharing
Submitted by grigby1 on Wed, 03/18/2020 - 12:26pm
groupware
Secure File Sharing
resilience
Resiliency
pubcrawl
tabular data
spreadsheets collaborative authoring applications
Spreadsheets
Spreadsheet programs
spreadsheet objects sharing
spreadsheet file sharing
sensitive data sharing
Secure spreadsheet data sharing
privacy
office automation
Cryptography
Data visualization
data storage
data integrity
data analysis
confidential data exchange
Computer supported collaborative work
collaborative editing
collaborative analytics
business data processing
storage management
Protocols
data privacy
authorisation
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »