Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hadoop
biblio
BigCrypt for Big Data Encryption
Submitted by grigby1 on Mon, 04/02/2018 - 11:49am
Pretty Good Privacy technique
zero tolerance security
symmetric key encryption
storage management
Software
Servers
RSA
Rijndael
Resiliency
resilience
Receivers
Public key
pubcrawl
probability
probabilistic approach
private information
Asymmetric Encryption
Metrics
Human behavior
Hadoop
Hacking
encryption
Data protection
Cryptography
Compositionality
cloud storage
Cloud Computing
BigCrypt
big data encryption
Big Data
asymmetric encryption technique
biblio
Survey of Data Intensive Computing Technologies Application to to Security Log Data Management
Submitted by grigby1 on Mon, 04/24/2017 - 10:42am
Big Data
big data security
big data security in the cloud
composability
computational intelligence
data intensive computing
Hadoop
Human behavior
pubcrawl
Resiliency
security event log information management
Spark
biblio
Challenges of Cloud Computing amp; Big Data Analytics
Submitted by grigby1 on Wed, 03/08/2017 - 1:38pm
AaaS
Big Data
Big Data Analytics
Cloud Computing
data analysis
Distributed databases
File systems
Hadoop
HDFS
Honey Pot Nodes
manufacturing
Map Reduce
Organizations
pubcrawl170114
security
biblio
A Big Data Architecture for Large Scale Security Monitoring
Submitted by BrandonB on Tue, 05/05/2015 - 8:23am
IP networks
transport protocols
telecommunication traffic
storage management
Spark
security
scalable distributed data storage
scalable distributed data management
network traffic
network intrusion prevention
network intrusion detection
NetFlow records
Monitoring
local enterprise networks
large scale security monitoring
Big Data
HTTP traffic
honeypot data
Hadoop
forensic analysis
DNS data
distributed system
Distributed databases
Digital Forensics
Data mining
data exploitation
data correlation schemes
Correlation
computer network security
Big Data architecture
biblio
Securing Hadoop in Cloud
Submitted by vouk on Wed, 09/17/2014 - 5:32pm
Control
Science of Security
Foundations
ACM CCS
cloud
control
Cryptography
cyber security
foundations
Hadoop
key management
lack of fine-grained access control
Operating systems security
overloaded authentication key
Science of Security
security
Systems Security
Virtualization and Security
ACM CCS
Cryptography
Cyber Security
Key Management
Virtualization and Security
Operating Systems Security
Systems Security
file
Securing Hadoop in Cloud (poster)
Submitted by vouk on Wed, 06/04/2014 - 8:43am. Contributors:
Xianqing Yu
Peng Ning
Mladen A. Vouk
cloud
Hadoop
lack of fine-grained access control
overloaded authentication key
HotSoS 2014
Academia
Poster
Posters
Posters
Access Control
« first
‹ previous
1
2