# trees (mathematics)

biblio

- Chained Attacks
- attack tree
- attack trees
- attack vector
- Attack vectors
- attack-detection strategies
- Aviva Insurance
- bank data processing
- cloud cluster
- Cloud Computing
- cloud paradigms
- cloud-computing environment
- cloud-computing services
- cloud-service environments
- cloud-service providers
- combined attack-tree
- Companies
- Computer crime
- Human behavior
- Indirect Detection
- indirect detection opportunities
- insider attack
- insider attacks
- Kill Chain
- kill-chain approach
- kill-chain based method
- malicious insider
- malicious insiders
- Measurement
- multiple indirect detection measures
- Packet Sniffing
- pubcrawl
- resilience
- Resiliency
- Scalability
- security of data
- Servers
- SIM-card manufacturer Gemalto
- Tesla
- trees (mathematics)
- Undetectable Attacks
- virtual machines
- Virtual machining

biblio

- pubcrawl
- Human behavior
- resilience
- Resiliency
- data privacy
- privacy
- composability
- Classification algorithms
- tree data structures
- trees (mathematics)
- Metrics
- Loss measurement
- anonymity
- Partitioning algorithms
- Adult dataset
- ball-tree
- Gotrack dataset
- individual privacy protection
- information science
- k-anonymity
- k-anonymity algorithm
- kd-tree
- microdata publishing
- projection area density partition
- UCI
- usability

biblio

- Scalability
- Task Analysis
- learning (artificial intelligence)
- Resiliency
- pubcrawl
- Metrics
- neural nets
- Labeling
- machine learning
- trees (mathematics)
- robots
- human-robot interaction
- natural language processing
- neural network
- Syntactics
- Human Factors
- control engineering computing
- Compositionality
- speech processing
- Hidden Markov models
- Robot
- deep learning algorithms
- benchmark ATIS task
- dependency features
- dependency parsing tree
- FBM3
- Filling
- grammars
- intent determination
- natural spoken instruction understanding
- performance level
- slot filling tasks
- spoken instruction understanding module
- spoken language understanding system
- syntactic information
- syntactic-based model
- window vector
- Cyber Dependencies

biblio

- composability
- confidential data
- corner pixels
- cover image
- data concealment
- data embedding process
- digital images
- edge blocks
- edge detection
- edge detection scheme
- full tree
- Image coding
- internet
- LSB
- LSB algorithm
- Metrics
- MPC
- MPC algorithm
- PSNR
- pubcrawl
- Resiliency
- Scalability
- security
- sharp edges
- Steganography
- steganography algorithm
- steganography techniques
- stego image
- trees (mathematics)

biblio

- Conferences
- Resiliency
- pubcrawl
- internet
- Business
- trees (mathematics)
- Data mining
- network topology
- network nodes
- Pattern recognition
- Topology
- telecommunication network topology
- Compositionality
- Hash functions
- hash tree
- tree searching
- alarm association rules
- association rules
- efficient hash-tree-based algorithm
- hash tree efficiency
- hash-tree based mining
- hash-tree search method
- mining efficiency
- network physical connection data
- sequential mining algorithm
- sequential pattern mining
- Sun
- topology constraint
- topology relation
- topology structure
- transmission network
- transmission networks
- warning Weblogs
- hash algorithms

biblio

- security of data
- Detectors
- Monitoring
- Scalability
- security
- game theory
- pubcrawl
- sensor placement
- trees (mathematics)
- optimisation
- Games
- Human Factors
- Predictive Metrics
- networked control systems
- Cyber-physical attacks
- Nash Equilibrium
- game theoretic security
- Symmetric matrices
- attack signals
- attacker decision
- attacker-detector game
- detector decision
- game leader
- game-theoretic framework
- Networked Control System
- optimal sensor placement strategy
- security-aware sensor placement problem
- Stackelberg equilibrium
- system L2 gain
- undirected topology
- undirected tree
- zero-sum game

biblio

- adhoc attack tree
- attack tree
- attack tree formalism
- composability
- computer based training
- cyber physical systems
- data privacy
- educational user experience
- Human Factors
- immersive systems
- IoT Application Testbed
- privacy
- Privacy Control
- privacy-preservation
- pubcrawl
- real-time systems
- resilience
- Resiliency
- risk management
- Safety
- safety risk assessment
- security
- security risk assessment
- Servers
- social aspects of automation
- Social Virtual Reality
- Solid modeling
- SPS threats
- three-dimensional immersive computer experience
- trees (mathematics)
- user experience
- virtual reality
- virtual reality learning environment
- VR technology
- VRLE system
- vSocial VRLE

biblio

- pubcrawl
- Indexes
- Data models
- Computational modeling
- Big Data
- trees (mathematics)
- Metrics
- Measurement
- nearest neighbour methods
- data storage
- query processing
- mathematics computing
- nearest neighbor search
- high-dimensional data
- Approximation algorithms
- approximate nearest neighbor algorithms
- candidate points
- coded computing
- coded matrix multiplication
- computation efforts
- computation strategy
- distributed computing cluster
- distributed processing
- Euclidean distance calculations
- fast k-nearest neighbors
- faster query execution
- high memory footprint
- in-memory indexes
- K-NN search
- MatDot codes
- matrix multiplication
- model parallelism
- model-parallel architecture
- MRPT
- multiple random projection trees
- nearest neighbor estimation
- parallel processing
- query response time
- query time
- single compute node
- single processing node
- storage constraints
- storage-optimal MatDot Codes
- storage-optimal recovery threshold
- straggler and failure tolerance
- straggler-prone environment
- Systematics
- worker nodes

biblio

- access tree
- hash algorithms
- computer image algorithm
- data distribution characteristics
- fast retrieval algorithms
- fast search algorithm
- high dimensional data
- Local integral hash
- local integral hash nearest neighbor algorithm
- Measurement
- Metrics
- Nearest neighbor algorithm
- nearest neighbor search
- nearest neighbor search algorithm
- nearest neighbour methods
- pubcrawl
- search problems
- tree based algorithms
- tree data structures
- tree structure
- trees (mathematics)

biblio

- B+ tree
- B+ tree-based security policy conflict detection method
- collaboration
- Communication networks
- computer network management
- computer network security
- conflict detection
- detection algorithms
- Indexes
- Libraries
- network management system
- network security
- Policy Based Governance
- policy conflict
- policy-based governance
- Protocols
- pubcrawl
- Redundancy
- security
- security policy
- tree data structures
- trees (mathematics)