Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Decision trees
biblio
A Malware Detection Method Based on Improved Fireworks Algorithm and Support Vector Machine
Submitted by aekwall on Mon, 12/14/2020 - 12:31pm
Levy Flights
SVM
Support vector machines
support vector machine
signature-based anti-virus systems
Resiliency
pubcrawl
Predictive Metrics
penalty factor
pattern classification
particle swarm optimization
particle swarm optimisation
optimal parameter combination
Malware detection method
malware detection
machine learning methods
threat vectors
learning (artificial intelligence)
kernel function parameter
invasive software
improved fireworks algorithm
genetic algorithms
Fireworks algorithm
Evolutionary algorithms
differential evolution
Decision trees
computer systems
composability
classification performance
privacy
Measurement
biblio
Targeted Addresses Identification for Bitcoin with Network Representation Learning
Submitted by grigby1 on Fri, 09/04/2020 - 3:58pm
Human behavior
transaction addresses
transaction address
security risk
security of data
Scalability
pubcrawl
pattern classification
network representation learning
learning (artificial intelligence)
imbalanced multi-classification
illegal transactions
addresses identification algorithms
feature extraction
fault tolerance
drugs
Decision trees
de-anonymity approach
Data mining
cryptocurrencies
bitcoin security
bitcoin
annotated data
biblio
Identification of State Registers of FSM Through Full Scan by Data Analytics
Submitted by grigby1 on Fri, 08/28/2020 - 3:55pm
industrial property
state transitions
state register identification
Silicon
Scalability
Resiliency
resilience
regression analysis
Registers
pubcrawl
Physical design
OpenCores
logic design
Intellectual Property Protection
Big Data
FSM state registers
FSM design
finite-state machine
finite state machines
electronic engineering computing
downstream design
Decision trees
Decision Tree
Data protection
Data mining
data analysis
big data security metrics
Big Data Analytics
biblio
Hybrid Model for Web Application Vulnerability Assessment Using Decision Tree and Bayesian Belief Network
Submitted by aekwall on Mon, 08/24/2020 - 1:37pm
feature extraction
Web application vulnerability assessment
vulnerability assessment
security of data
Resiliency
pubcrawl
machine learning algorithms
machine learning
logical Web pages
learning (artificial intelligence)
internet
hybrid model
Bayes methods
Entropy
Decision trees
Decision Tree
consumer relationship
composability
Classification algorithms
business process
business data processing
belief networks
Bayesian Belief Network (BBN)
Bayesian belief network
biblio
FACT - Fine grained Assessment of web page CredibiliTy
Submitted by aekwall on Mon, 07/13/2020 - 11:19am
health domain Web pages
automated
automated genre-aware credibility assessment
Credibility
crowdsourced Web
fine grained assessment
GCS
genre
genre credibility score
gradient boosted decision tree classified genres
supervised learning
quality
search engine queries
trillion web pages
web assessment
web of trust
Web page
Web page credibility
WEBCred framework
WOT
text analysis
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
composability
pattern classification
internet
tools
Web sites
security of data
software engineering
information retrieval
information security
Decision trees
search engines
Web pages
framework
ranking
biblio
Predicting and Preventing Malware in Machine Learning Model
Submitted by grigby1 on Thu, 07/09/2020 - 1:57pm
Random Forest
machine learning model
malware prediction
malware prevention
pattern classification
Predictive models
privacy
privacy preserving technique
pubcrawl
machine learning algorithms
random forests
resilience
Resiliency
Scalability
security
support vector machine
Support vector machines
Training
Decision Tree
Algorithm robustness enhancement
Causative attack
Classification algorithms
Compositionality
data deletion
Data models
data privacy
Data Sanitization
AdaBoost
Decision trees
exploratory attack
Human behavior
Human Factors
invasive software
K-nearest-neighbors classifier
KNN classifier
machine learning
biblio
A Differential Privacy Random Forest Method of Privacy Protection in Cloud
Submitted by aekwall on Mon, 06/22/2020 - 11:19am
Decision trees
random forest classification algorithm
random forest algorithm
hybrid decision tree algorithm
high privacy protection
high classification performance
differential privacy random forest method
differential privacy protection
Forestry
classification accuracy
privacy protection
differential privacy
Cloud Computing
Prediction algorithms
pattern classification
privacy
composability
pubcrawl
Human behavior
Resiliency
Random Forest
Classification algorithms
data privacy
Scalability
biblio
A Hybrid Packet Classification Algorithm Based on Hash Table and Geometric Space Partition
Submitted by aekwall on Mon, 06/08/2020 - 11:33am
high-speed packet classification requirement
classification speed
complex network conditions
existing classification schemes
geometric space partition
hash
hash matching
hash table
HGSP algorithm
classification performance
huge packets
hybrid packet classification algorithm
integrated space-ground network
ISGN
packet classification
tradition network
traditional Hicuts algorithm
hash algorithms
Communication networks
Memory management
security
Classification algorithms
network security
Resiliency
pubcrawl
pattern classification
pattern matching
computer network security
Decision trees
aerospace computing
Partitioning algorithms
Compositionality
tree data structures
Time complexity
aerospace communication
biblio
Decision Tree based AIS strategy for Intrusion Detection in MANET
Submitted by aekwall on Tue, 05/26/2020 - 11:04am
cheat nodes
intrusion detection system
MANET security
wired networks
AIS strategy
artificial immune system
artificial immune system strategy
battlefield communications
Cheat Node
artificial immune systems
critical scenarios
Intrusion Detection strategy
multihop communication
natural disaster
network communications
Pathogens
reduced packet delivery ratio
security strategies
Immune system
telecommunication security
Resiliency
pubcrawl
Decision Tree
batteries
Routing protocols
Routing
Metrics
security of data
Decision trees
MANET
mobile ad hoc networks
fixed infrastructure
security measures
Compositionality
wireless networks
Artificial Intelligence
biblio
HealthGuard: A Machine Learning-Based Security Framework for Smart Healthcare Systems
Submitted by grigby1 on Fri, 04/10/2020 - 12:53pm
nearest neighbour methods
healthguard
implantable medical devices
Internet-of-Things
k-nearest neighbor
machine learning-based detection techniques
machine learning-based security framework
malicious activities detection
malicious threats
medical emergency
Healthcare
patient monitoring
pervasive computing
Random Forest
SHS
Smart Healthcare System
smart healthcare systems
smart medical devices
Pervasive Computing Security
Human Factors
resilience
security
computer network security
Scalability
internet
health care
medical information systems
pubcrawl
Metrics
Resiliency
Internet of Things
Human behavior
random forests
neural nets
Anomaly Detection
artificial neural network
critical medical conditions
Decision Tree
Decision trees
diseases
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »