Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Accuracy
biblio
A Programming Framework for Differential Privacy with Accuracy Concentration Bounds
Submitted by aekwall on Mon, 01/11/2021 - 12:42pm
Scalability
data privacy
programming
Resiliency
Human behavior
pubcrawl
composability
privacy
tools
Databases
cognition
differential privacy
programming languages
data analysis
reasoning
Accuracy
functional programming
accuracy concentration
concentration bounds
data analyses results
Haskell
private data analyses
programming differentially private analyses
biblio
A Study of Big Data Security on a Partitional Clustering Algorithm with Perturbation Technique
Submitted by grigby1 on Mon, 12/28/2020 - 11:40am
Accuracy
Big Data
big data privacy
big data security
Clustering algorithms
Clustering Tme
Conferences
data privacy
Distributed databases
execution time
F-Socre Measure
Hadoop distributed file system
HDFS
Human behavior
Metrics
parallel processing
partitional clustering algorithm
Partitioning algorithms
pattern clustering
PCA
Perturbation methods
perturbation technique
Precision
principal component analysis
privacy preserving
pubcrawl
resilience
Resiliency
Scalability
security
security of data
biblio
Research of Personalized Recommendation Algorithm Based on Trust and User's Interest
Submitted by grigby1 on Tue, 12/01/2020 - 12:36pm
Robot Trust
Accuracy
Clustering algorithms
collaboration
filtering algorithms
History
Human behavior
Human Factors
joint interest-content recommendation
Motion pictures
online video site
pattern clustering
personalized recommendation algorithm
Prediction algorithms
pubcrawl
recommender systems
resilience
Resiliency
robust trust
social networking (online)
sparse subspace clust algorithm
trust
trust similarity
Trusted Computing
trustworthyness model
user interest
Videos
biblio
Willing to be fooled: Security and autoamputation in augmented reality
Submitted by grigby1 on Fri, 08/28/2020 - 11:31am
Accuracy
anonymity protection
augmented reality
augmented reality systems
autoamputation concept
computer security
Human behavior
Media
privacy
pubcrawl
resilience
risk reduction
Scalability
security
security of data
sensors
Sorting
Stress
Trusted Computing
biblio
Improvement in Phishing Websites Detection Using Meta Classifiers
Submitted by grigby1 on Fri, 06/19/2020 - 10:49am
Accuracy
Computer crime
ensemble classifiers
F-measure
false trust
fraudulent practices
fraudulent websites
internet
Internet security
Meta Classifier
meta classifiers
modern computers
pattern classification
personal information
Phishing
phishing Websites
Phishing Websites Detection
policy-based governance
Policy-Governed Secure Collaboration
pubcrawl
resilience
Resiliency
Scalability
single classifier model
smart devices
Trusted Computing
trusted Web pages
Web sites
WEKA
biblio
Evaluation of Collaborative Filtering Based Recommender Systems against Segment-Based Shilling Attacks
Submitted by aekwall on Mon, 03/23/2020 - 12:30pm
security of data
Scalability
Resiliency
pubcrawl
collaborative filtering
Vulnerability
Human Factors
recommender system
recommender systems
Accuracy
binary collaborative filtering
binary rating
CF techniques
collaborative filtering based recommender systems
F-measure
hybrid approach
hybrid system
nuke attack
prediction shift
push attack
segment-based shilling attacks
segment-focused attack
segmentation attack
stand-alone rating item-based recommendation
stand-alone rating user-based recommendation
biblio
QuickAdapt: Scalable Adaptation for Big Data Cyber Security Analytics
Submitted by aekwall on Mon, 03/16/2020 - 9:34am
security of data
Computer crime
Big Data
computer architecture
cyber security
feature extraction
pubcrawl
cyber-attacks
data analysis
fuzzy set theory
quality of service
Scalability
Time factors
Accuracy
fuzzy rules
Adaptation
BDCA system
Big Data Cyber Security Analytics
descriptive statistics
distributed BDCA system
QuickAdapt
security events data
Statistics
Scalable Security
biblio
Real-World Applications and Implementation of Keystroke Biometric System
Submitted by grigby1 on Tue, 01/28/2020 - 1:35pm
Accuracy
EER
FAR
FRR
Human behavior
Human Factors
K-NN
keystroke analysis
keystroke dynamics
Manhattan distance
Metrics
pubcrawl
Sensitivity
specificity
biblio
Improve Iot Security System Of Smart-Home By Using Support Vector Machine
Submitted by aekwall on Mon, 01/27/2020 - 9:19am
security
Monitoring
Internet of Things
machine learning algorithms
Support vector machines
support vector machine
machine learning
Resiliency
pubcrawl
composability
Databases
Design engineering
Unsupervised Learning
self-learning
Switches
Predictive Metrics
Accuracy
building occupants safety
civil engineering computing
domestic safety
doors
electric motors
electrical products control
human resource management
human resources preservation
Internet of Things security system
motors
Network
smart-home system
support vector machine algorithm
Windows
windows (construction)
biblio
Network Behavioral Features for Detecting Remote Access Trojans in the Early Stage
Submitted by grigby1 on Wed, 11/28/2018 - 1:08pm
Accuracy
composability
cyber physical systems
False Data Detection
false negative rate
Human behavior
machine learning
pubcrawl
Remote Access Trojans detection
resilience
Resiliency
1
2
3
4
next ›
last »