Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Decision trees
biblio
Threshold Based Optimization of Performance Metrics with Severely Imbalanced Big Security Data
Submitted by grigby1 on Fri, 04/03/2020 - 12:18pm
learning (artificial intelligence)
threshold based optimization
Slow HTTP POST
severely imbalanced slow HTTP DoS attack data
severely imbalanced big security data
security of data
pubcrawl
predictive security metrics
Performance Metrics
pattern classification
optimisation
Metrics
machine learning techniques
big data security metrics
imbalanced big dataset
Decision trees
cyber security domain
classifier predictive models
classifier performance
classification threshold
class imbalance
C4.5N decision tree
Big Data
AUC
area under the receiver operating characteristic curve
biblio
The Best of Both Worlds: Challenges in Linking Provenance and Explainability in Distributed Machine Learning
Submitted by aekwall on Mon, 03/30/2020 - 11:33am
end-to-end explainability
basic transformations
consistent data
data analysis pipeline
data pre-processing steps
data preparation
distributed file system
distributed machine learning
distributed setting
machine learning models
entire data set
explainable machine learning
explainable models
homogeneous data
linking provenance
machine learning experts
single data
Distributed databases
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
composability
Computational modeling
Metrics
machine learning
Data models
data analysis
Entropy
Provenance
distributed system
Decision trees
data provenance
distributed computing
biblio
Malware Detection Using Honeypot and Machine Learning
Submitted by grigby1 on Wed, 02/26/2020 - 4:42pm
malware
Trojan Horse malware
threat vectors
SVM
Support vector machines
support vector machine
signature-based security systems
Scalability
Resiliency
pubcrawl
privacy
Metrics
Measurement
malware detection
Adware malware
machine learning
learning (artificial intelligence)
invasive software
Human Factors
honey pots
honeypot
firewalls
digital signatures
Decision trees
Decision Tree
computer viruses
computer malware
biblio
Using Machine Learning to Detect DoS Attacks in Wireless Sensor Networks
Submitted by grigby1 on Wed, 02/26/2020 - 4:41pm
machine learning techniques
WSN
wireless sensor networks
threat vectors
Support vector machines
security threats
security
Routing protocols
pubcrawl
privacy
Metrics
Measurement
attack signature
learning (artificial intelligence)
intrusion detection-and-prevention system
intrusion detection system
hardware resources
DoS attacks
denial-of-service attack
denial of service
decision trees technique
Decision trees
computer network security
biblio
QoE-Driven Anomaly Detection in Self-Organizing Mobile Networks Using Machine Learning
Submitted by grigby1 on Mon, 02/17/2020 - 5:14pm
ns-3
user-centric approach
telecommunication computing
system model
SON
self-organizing mobile networks
self-healing networks
Resiliency
resilience
quality of experience
QoE-driven anomaly detection
qoe
pubcrawl
Predictive models
parametric QoE model
ns-3 network simulator
Anomaly Detection
network-centric approaches
network scenario
mobile radio
mobile computing
machine learning
learning (artificial intelligence)
green mobile communication networks
end-user experience
dysfunctional serving nodes
dysfunctional serving eNodeBs
Decision trees
Data models
Computational modeling
composability
biblio
Comment Spam Detection via Effective Features Combination
Submitted by grigby1 on Mon, 02/10/2020 - 11:18am
Human behavior
Web sites
user experience
trees (mathematics)
spam detection
Scalability
pubcrawl
Metrics
internet
Human Factors
blog spam dataset
gradient boosting tree algorithm
feature extraction
feature combination
Detectors
Decision trees
comment spam detection
boosting
Blogs
biblio
Keystroke Analysis for User Identification Using Deep Neural Networks
Submitted by grigby1 on Tue, 01/28/2020 - 2:36pm
malicious users
user identification
typing style
typing dynamics
supervised learning
pubcrawl
pattern classification
neural network
neural net architecture
multilayer perceptrons
MLP deep neural network
Metrics
message authentication
Artificial Intelligence
learning (artificial intelligence)
keystroke analysis
keystroke
Human Factors
Human behavior
feature model
deep neural network architecture
deep learning-based classifiers
deep learning
decision-trees machine learning algorithm
Decision trees
authentication systems
biblio
Edge Learning Based Green Content Distribution for Information-Centric Internet of Things
Submitted by grigby1 on Tue, 01/21/2020 - 11:27am
quality of service
intelligent path selection
internet
Internet of Things
learning (artificial intelligence)
network distribution
network quality
network traffic
pubcrawl
intelligent
real-time systems
resilience
Resiliency
revolutionary future networking architecture
Routing
Scalability
telecommunication traffic
content distribution
information-centric networking
information-centric internet of things
Information Centric Networks
Information Centric Network
IC-IoT requirements
IC-IoT
green content distribution scheme
green computing
encoding
edge learning
edge computing
distributed coding based content transmission
distributed coding
Decision trees
Decision Making
biblio
Comparing the Performance of Adaptive Boosted Classifiers in Anomaly based Intrusion Detection System for Networks
Submitted by aekwall on Mon, 01/20/2020 - 11:55am
intrusion detection Kaggle dataset
Training
tools
Resiliency
Random Tree
pubcrawl
pattern classification
network intrusion detection
network based intrusion detection
naïve Bayes classifier
Metrics
lengthy detection process
learning (artificial intelligence)
Intrusion Detection Systems
intrusion detection system
adaptive boosted classifiers
Intrusion Detection
hybrid anomaly based intrusion detection system
discretization
detection rate
Decision trees
Data mining
Correlation based feature weighted Naïve Bayes
Correlation
computer network security
composability
boosting techniques
boosting process
boosting
biblio
Uncertainty-Aware Authentication Model for Fog Computing in IoT
Submitted by aekwall on Mon, 12/30/2019 - 12:16pm
Naive Bayes
uncertainty-aware authentication model
uncertainty handling
uncertainty
Support vector machines
support vector machine
supervised learning
supervised classification algorithms
security issues
Scalability
Resiliency
regression analysis
pubcrawl
privacy issues
prediction model
pattern classification
Fog computing
Mobile Edge Computing
logistic regression
IoT
Internet of Things
Fog Computing and Security
Decision trees
Decision Tree
Cloud Computing
Cisco Systems
Bayes methods
authorisation
authentication
attribute based access control model
ABAC model
security
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »