Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data models
biblio
Multi-touch Attribution in Online Advertising with Survival Theory
Submitted by BrandonB on Mon, 05/04/2015 - 2:18pm
internet
user interaction data
user conversion probability prediction
survival theory
rule-based attribution models
probability
probabilistic framework
Predictive models
online advertising
Multi-touch attribution
Kernel
advertising
Hidden Markov models
Hazards
Gold
digital advertising
data-driven multitouch attribution models
Data models
data handling
commercial advertising monitoring company
advertising data processing
biblio
Secure Multiparty Data Sharing in the Cloud Using Hardware-Based TPM Devices
Submitted by BrandonB on Fri, 05/01/2015 - 9:23am
software-based security protocol
hardware-based trusted platform module mechanism
key management
privacy
Protocols
secure data sharing protocol
secure multiparty data sharing
security
security key
security model
hardware-based TPM devices
store data
TED
tpm
TPM mechanism
Trusted Computing
trusted enterprise
trusted extension device
untrusted cloud services
cryptographic keys
access control management
authorisation
authorised consumer
BYOD
Cloud Computing
cloud computing infrastructure
cloud enterprise
confidential data
Access Control
Cryptographic Protocols
data consumers
Data models
data owner
data privacy
Data Security
data sharing
encryption
biblio
Toward I/O-efficient protection against silent data corruptions in RAID arrays
Submitted by BrandonB on Thu, 04/30/2015 - 2:11pm
RAID
user write sizes
trace-driven simulation
taxonomy
Systematics
storage workloads
silent data corruptions
security of data
Redundancy
read-write characteristics
RAID arrays
arrays
IO-efficient protection
IO-efficient integrity checking mechanisms
integrity protection schemes
integrity checking model
input-output programs
I/O overhead
disk errors
disk drives
Data models
data integrity
biblio
On visualizing threat evaluation configuration processes: A design proposal
Submitted by BrandonB on Thu, 04/30/2015 - 1:51pm
military computing
Weapons
visualization
transparency
threat evaluation configuration process
threat evaluation
threat estimation
relevant parameter
Prototypes
Proposals
proof-of-concept prototype
military expert system designer
Data models
human computer interaction
high-level information fusion
Guidelines
expert systems
expert operators
estimation theory
estimation
design proposal
design process model
design
decision-making
biblio
Semi-synthetic data set generation for security software evaluation
Submitted by BrandonB on Thu, 04/30/2015 - 1:49pm
intrusion detection and prevention systems
virus infestation
Virtual machining
testing
synthetic data set generation
semisynthetic data set generation
self-learning intrusion detection systems
security software evaluation
security of data
scalable system behavior model
anomaly detection evaluation
Intrusion Detection
information and communication technology systems
ICT systems
ICT security systems
heuristic detection engines
Databases
Data models
data handling
Complexity theory
biblio
Can a DDoS Attack Meltdown My Data Center? A Simulation Study and Defense Strategies
Submitted by BrandonB on Thu, 04/30/2015 - 1:16pm
distributed denial-of-service attacks
thermal properties
Temperature distribution
Servers
server downtime prevention
power aware computing
network simulation
network management protocols
Monitoring
HVAC systems
HVAC
heating-ventilation-and-air-conditioning systems
Heating
Cloud Computing
defense strategies
DDoS Attack
Data models
data center meltdown
Data center communications
Cooling
computer network security
computer network management
Computer crime
computer centres
cloud services
« first
‹ previous
…
50
51
52
53
54
55
56
57
58