Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Bayes methods
biblio
A Multi-Classifier Framework for Open Source Malware Forensics
Submitted by grigby1 on Mon, 07/01/2019 - 10:06am
pattern classification
machine learning models
malware
malware analysis reports
malware attacks
malware forensics
manual analysis
multiclassifier framework
open source malware forensics
open source malware sandbox
machine learning algorithms
pubcrawl
resilience
Resiliency
Scalability
Security Heuristics
security of data
traditional anti-virus technologies
Training
ever-evolving threats
Bayes methods
computer network security
computer viruses
cyber attack pattern
Cyber Attacks
data cleaning
Data mining
Data models
automated manner
extensive pre-modeling techniques
feature extraction
future cyber threats
Gaussian Naive Bayes classifier
heuristics updates
invasive software
learning (artificial intelligence)
machine learning
biblio
Machine Learning-Based Recommendation Trust Model for Machine-to-Machine Communication
Submitted by grigby1 on Mon, 06/10/2019 - 1:56pm
resilience
Naive Bayes
pattern classification
Peer-to-peer computing
privacy
pubcrawl
radial support vector machine
Random Forest
receiver operating characteristics
Reliability
Mathematical model
Resiliency
security
security issues
security threats
Supervisory Control and Data Supervisory Acquisition(SCADA)
Support vector machines
telecommunication computing
trust computation measures
Trusted Computing
k nearest neighbor
composability
Computational modeling
computer network security
Decision Tree
Decision trees
internet
Internet of Things(IoTs)
Internet of Vehicles(IoVs)
Internet Protocol
Bayes methods
learning (artificial intelligence)
machine learning
machine learning trust evaluation
Machine learning-based recommendation trust model
Machine Type Communication Devices
Machine-to-Machine communication nodes
machine-to-machine communications
Machine-to-Machine(M2M)
malicious data
biblio
Time Series Forecasting by Evolving Deep Belief Network with Negative Correlation Search
Submitted by grigby1 on Wed, 03/06/2019 - 4:30pm
resilience
neural nets
neural network models
Neural networks
optimisation
optimization
policy-based governance
pubcrawl
random search
Negative correlation search
Resiliency
Scalability
search problems
time series
Time series analysis
time series datasets
time series forecasting
Training
forecasting theory
Bayesian optimization
belief networks
collaboration
composability
DBN
Deep Belief Network
derivative-free optimizer-negative correlation search
forecasting
Bayes methods
grid search
Human behavior
hyperparameters optimization
learning (artificial intelligence)
learning rates
Load modeling
Mathematical model
Metrics
biblio
Classification for Authorship of Tweets by Comparing Logistic Regression and Naive Bayes Classifiers
Submitted by aekwall on Mon, 03/04/2019 - 10:46am
regression analysis
machine learning techniques
Metrics
mobile phone
Naive Bayes
naïve Bayes classifier
pattern classification
pre-processed data
privacy
pubcrawl
Python
machine learning model
security
social computing
social media
social networking (online)
text analysis
text classification
Training
tweets authorship
Twitter
Twitter account
fake news
attribution
authorisation
authorship attribution
authorship attribution techniques
Bayes methods
classification
composability
digital identities
dubious sources
Electronic mail
anonymity
feature extraction
feature vector
Human behavior
human-in-the-loop security center paradigm
learning (artificial intelligence)
logistic regression
logistic regression based classifier
Logistics
machine learning
biblio
RISK ASSESSMENT IN PHARMACEUTICAL SUPPLY CHAINS UNDER UNKNOWN INPUT-MODEL PARAMETERS
Submitted by aekwall on Mon, 02/25/2019 - 11:43am
Bayes methods
pubcrawl
Metrics
supply chains
Mathematical model
Pharmaceuticals
Stochastic processes
uncertainty
Supply Chain Risk Assesment
biblio
A Comparative Study of Spam SMS Detection Using Machine Learning Classifiers
Submitted by aekwall on Mon, 02/25/2019 - 11:42am
Filtering
text messages
stylistic features
spam SMS detection
Spam SMS
smart phones
short message service
phones
machine learning classifiers
information filtering
filtering spam emails
detection
deep learning methods
content-based machine learning techniques
content based advertisement
CAP curve
Scalability
machine learning
spam messages
electronic messaging
Unsolicited electronic mail
spam detection
unsolicited e-mail
pattern classification
Neural networks
Metrics
pubcrawl
Human behavior
learning (artificial intelligence)
Classification algorithms
Bayes methods
biblio
Detection of Spam E-mails with Machine Learning Methods
Submitted by aekwall on Mon, 02/25/2019 - 11:42am
naïve Bayes classifier
vector space model
Unsolicited electronic mail
unsolicited e-mail
spam filtering
spam e-mails
spam detection
security of data
Scalability
pubcrawl
Postal services
pattern classification
offensive content
Analytical models
Metrics
machine learning methods
machine learning
learning (artificial intelligence)
internet
Human behavior
Filtering
e-mail filtering
e-mail communication
content information
Bayes methods
biblio
Enhancing the Naive Bayes Spam Filter Through Intelligent Text Modification Detection
Submitted by aekwall on Mon, 02/25/2019 - 11:42am
spam filter
pubcrawl
Python algorithm
Scalability
social networks
spam
spam classification
spam detection
spam emails
pattern classification
spam score
Spamassassin
testing
text analysis
text classification
text modifications
unsolicited e-mail
Unsolicited electronic mail
intelligent text modification detection
Bayes Spam Filter
Bayesian Poisoning
computer security
e-mail filters
Email
email communication
feature extraction
Human behavior
Bayes methods
Internet based information exchange venues
learning (artificial intelligence)
machine learning
machine learning algorithm
machine learning algorithms
Metrics
naïve Bayes classifier
Naive Bayes Spam Filter
biblio
An Intelligent Software defined Network Controller for preventing Distributed Denial of Service Attack
Submitted by aekwall on Wed, 02/13/2019 - 11:59am
Resiliency
machine learning based intelligent method
Naive Bayes
naive Bayes algorithm
nearest neighbour methods
network computing environment
network layer
network management mechanism
operating system
pubcrawl
machine learning algorithms
Scalability
SDN network
Software Defined Network
Software Defined Network architecture
software defined networking
support vector machine
Support vector machines
telecommunication traffic
data traffic
Attack vectors
Bayes methods
Classification algorithms
computer architecture
Computer crime
computer network management
computer network security
cyber security
Data models
Application Layer
denial of service
distributed denial of service
distributed denial of service attack
Human behavior
infected packets
intelligent software
intelligent software defined network controller
k-nearest neighbor
biblio
A trust model based on evidence-based subjective logic for securing wireless mesh networks
Submitted by aekwall on Wed, 01/16/2019 - 2:06pm
resilience
WMN
wireless mesh networks
Wireless Mesh Network Security
watchdog detection mechanism
uncertainty
telecommunication security
telecommunication network routing
telecommunication network management
security threats
security
secure route discovery
Bayes methods
recommendation trust information model
pubcrawl
Metrics
Mathematical model
gray-hole attacks
evidence-based subjective logic
Entropy
EBSL
Computational modeling
composability
black-hole attacks
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »