Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information filtering
biblio
High Accuracy Phishing Detection Based on Convolutional Neural Networks
Submitted by grigby1 on Thu, 10/13/2022 - 11:17am
deep learning
Training
feature extraction
machine learning
pubcrawl
Human behavior
Phishing
information filtering
convolutional neural networks
Uniform resource locators
social engineering
Phishing website detection
biblio
A Forensics Activity Logger to Extract User Activity from Mobile Devices
Submitted by grigby1 on Wed, 06/03/2020 - 11:03am
mobile devices
user activity
tools
tool
smartphone
Scalability
Resiliency
resilience
register
pubcrawl
personal tracker
personal information
performance evaluation
Oxygen
Mobile handsets
activity
mobile computing
mobile
Metrics
information forensics
information filtering
Human Factors
Human behavior
forensics activity logger
Forensics
Digital Forensics
Data mining
daily activities
android
biblio
Word Embedding Method of SMS Messages for Spam Message Filtering
Submitted by aekwall on Mon, 05/18/2020 - 9:55am
SMS Filtering
machine learning method
classification methods
binary classification
CBOW
deep learning method
feedforward neural network
Feedforward neural networks
popular machine learning method
deep learning
SMS messages
spam message filtering
SVM light
word embedding
word embedding method
word embedding technique
Word Vector
security of data
feedforward neural nets
natural language processing
information filtering
Filtering
electronic messaging
SVM
unsolicited e-mail
pattern classification
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
feature extraction
Support vector machines
Scalability
biblio
Neural Network Spam Filtering Technology
Submitted by grigby1 on Fri, 05/08/2020 - 2:01pm
neural nets
unsolicited e-mail
Training
spam filtering
security of data
Resiliency
resilience
pubcrawl
policy-based governance
pattern classification
neural network technology development
neural network spam filtering technology
Neural Network Security
neural network
artificial neural network model
Metrics
information security
information filtering
Filtering
e-mail spam filtering
e-mail messages filtration
e-mail messages classification
databases knowledge discovery technology
Data mining
collaboration
Biological neural networks
Artificial Neural Networks
biblio
Enhancement of Moodle learning Management System Regarding Quizzes Security and Stability Problems
Submitted by grigby1 on Fri, 05/08/2020 - 1:19pm
object oriented security
upgraded tool
tools
sudden short disconnection
stability problems
security performance
security of data
security
Resiliency
resilience
quizzes stability
quizzes security
quiz tool features
pubcrawl
online exams
composability
Moodle system environment
Moodle quiz tool
Moodle learning management system
Moodle (Modular Object Oriented Dynamic Learning Environment)
Metrics
Learning management systems
IP networks
information filtering
experimental test Moodle site
enhancement aspects
eLMS (Electronic Learning Management Systems)
Electronic learning
E-Quiz
biblio
Efficient Detection of Spam Messages Using OBF and CBF Blocking Techniques
Submitted by grigby1 on Mon, 02/10/2020 - 10:18am
spam detection
Picture Based Shifting
porter stemer algorithm
Postal services
Poster Stemmer algorithm
pubcrawl
Scalability
Servers
spam block mail
pattern clustering
spam detection system
spam mail-sifting system
spam message
spamming changes
unsolicited e-mail
user attacks
web applications
information filtering
Conferences
content based filter
Content based Filter (CBF)
e-mail filters
emails
Human behavior
Human Factors
Informatics
CBF blocking techniques
internet
k means clustering
mail message
Market research
Metrics
OBF
OBF blocking techniques
biblio
Detection of Hurriedly Created Abnormal Profiles in Recommender Systems
Submitted by grigby1 on Tue, 10/15/2019 - 1:41pm
profile injection attacks
user-item rating matrix
user rating behavior
system ratings
synthetic coordinates
spurious profiles
specific ratings
specific items
security of data
Scalability
Resiliency
resilience
recommender systems
random ratings
Random Forest
pubcrawl
anomalous rating profiles
pattern clustering
Outliers
learning (artificial intelligence)
Labeling
k-means clustering
information filtering
hurriedly created abnormal profiles
Human Factors
Hidden Markov models
gaussian distribution
feature extraction
dimensionality reduction
clustering methods
attackers
biblio
A Comparative Study of Spam SMS Detection Using Machine Learning Classifiers
Submitted by aekwall on Mon, 02/25/2019 - 10:42am
Filtering
text messages
stylistic features
spam SMS detection
Spam SMS
smart phones
short message service
phones
machine learning classifiers
information filtering
filtering spam emails
detection
deep learning methods
content-based machine learning techniques
content based advertisement
CAP curve
Scalability
machine learning
spam messages
electronic messaging
Unsolicited electronic mail
spam detection
unsolicited e-mail
pattern classification
Neural networks
Metrics
pubcrawl
Human behavior
learning (artificial intelligence)
Classification algorithms
Bayes methods
biblio
An effective information filtering method based on the LTE network
Submitted by grigby1 on Mon, 02/27/2017 - 11:56am
information filtering method
Training
pubcrawl170108
pubcrawl170107
network security
nearest neighbor text classification
mobile computing
minimum-risk Bayesian classification
LTE network
LTE
Long Term Evolution
learning (artificial intelligence)
KNN (Key Nearest Neighbor)
information technology
Information filters
4G LTE high-speed network
information filtering
four-level content-based information filtering
five-tuple filter
filtering theory
filtering algorithms
data analysis
content-based information filtering
content-based filter
Classification algorithms
Bayesian classification
Bayes methods
AdaBoost
4G mobile communication
4G LTE network
biblio
"Scalable command and control detection in log data through UF-ICF analysis"
Submitted by abfox on Tue, 02/14/2017 - 12:13pm
fixed user agent string
UF-ICF analysis
scalable command-and-control detection
pubcrawl170101
pattern clustering
normal user
networking logs
malware
log data
IP networks
IP addresses
invasive software
intrusion prevention systems
information security
information filtering
Frequency modulation
advanced persistent threat
filtering methods
domain names
Decision support systems
coverage rate
connection behaviors
computer network security
command and control systems
Command and Control (C&C)
clustering methods
C&C sites
C&C server detection
botnet
benign service
APT
antivirus software
1
2
next ›
last »