Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pattern classification
biblio
Improving the effectiveness and efficiency of dynamic malware analysis with machine learning
Submitted by grigby1 on Tue, 01/23/2018 - 3:52pm
malware
static analysis
sandbox environment
Resiliency
pubcrawl
privacy
Predictive models
pattern classification
Metrics
malware detection
malware classification
Malware Analysis
Analytical models
machine learning
learning (artificial intelligence)
invasive software
information extraction
Human behavior
feature extraction
Dynamic Malware Analysis
dynamic malware
Data mining
Cybersecurity
computer security
biblio
Exploring linguistic features for extremist texts detection (on the material of Russian-speaking illegal texts)
Submitted by K_Hooper on Wed, 01/10/2018 - 11:14am
Scalability
psycholinguistic features
pubcrawl
Random Forest
regression analysis
Resiliency
Russian language
Russian legislation
Russian-speaking illegal text material
psych olinguistic features
semantic features
Semantics
Social network services
Support vector machines
Terrorism
text analysis
text classification
text detection
Human behavior
Bayes methods
classification methods
classification quality
Dictionaries
differentiating feature
extremist texts
feature extraction
gradient boosting
automatic extremist text detection
learning (artificial intelligence)
linear SVM
linguistic features
logistic regression
multinomial naive Bayes
natural language processing
pattern classification
Pragmatics
biblio
Prioritized active learning for malicious URL detection using weighted text-based features
Submitted by K_Hooper on Wed, 01/10/2018 - 11:14am
Scalability
Mutual information
natural language processing
pattern classification
Phishing
phishing categorization
PhishMonger's Targeted Brand dataset
prioritized active learning
pubcrawl
Resiliency
Man-machine systems
security analytics
supervised security analytics task
text analysis
text analytics
Training
Uniform resource locators
unlabelled data
weighted text-based features
data-driven analytics
batch learning framework
classification performance
collaboration
Computer crime
computer security
Cyber-security
cyber-security scenario
Data Analytics
data annotations
active learning
feature weight update technique
ground-truth labels
Human behavior
human-machine collaborative approach
learning (artificial intelligence)
machine learning
Malicious threat detection
malicious URL detection
biblio
Automated U.S diplomatic cables security classification: Topic model pruning vs. classification based on clusters
Submitted by K_Hooper on Wed, 01/10/2018 - 11:14am
Springs
pubcrawl
Resiliency
Scalability
security
security of data
sensitive information leaks
sensitive text data
Sensitivity
protection mechanism
text analysis
text leakage
text security classification
topic model pruning
Training
untrusted channels
US government
WikiLeaks dataset
Electronic mail
automated US diplomatic cables security classification
automatic unstructured text security class detection
cyberattacks
data infrastructure protection
data leak prevention system
Data protection
DLP system
Edward Snowden incident
adversarial environment
email leakage
feature extraction
government data processing
Human behavior
Insider Threats
natural language processing
pattern classification
printers
biblio
A fast information-theoretic approximation of joint mutual information feature selection
Submitted by grigby1 on Thu, 12/28/2017 - 1:37pm
polynomial time
JMI maximization
JMI scales
joint mutual information feature selection
joint mutual information maximization
Metrics
minimum features subset
Mutual information
pattern classification
Policy-Governed Secure Collaboration
information theory
pubcrawl
Redundancy
Resiliency
Scalability
Science of Security
search problems
UCI datasets
unified framework
Upper bound
fast information-theoretic approximation
classification
collaboration
Complexity theory
composability
computational complexity
data analysis
data reduction
dimensionality reduction
Entropy
approximation theory
Feature Selection
feature size
filtering theory
greedy algorithms
greedy forward search
greedy search complexity
high dimensional datasets
Human behavior
Human Factors
biblio
Privacy and Security: How to Differentiate Them Using Privacy-Security Tree (PST) Classification
Submitted by grigby1 on Thu, 12/28/2017 - 1:34pm
Metrics
security of data
Science of Security
Scalability
Resiliency
pubcrawl
PST classification
privacy-security tree classification
privacy
Policy-Governed Secure Collaboration
pattern classification
authentication
Law
information system domain
information security
information privacy
Human Factors
Human behavior
Data protection
data privacy
composability
collaboration
biblio
Process Metrics Are Not Bad Predictors of Fault Proneness
Submitted by grigby1 on Thu, 12/28/2017 - 1:30pm
Niobium
Trusted Computing
trust-worthy predictions
statistical analysis
static code metrics
software quality
software metrics
pubcrawl
process metrics
predictive security metrics
Predictive models
Predictive Metrics
prediction
pattern classification
Bayes methods
Naive Bayes
Metrics
Inspection
faulty modules
faulty classes
faults
fault/defect prediction models
fault proneness
fault prediction performance evaluation
Couplings
classifier
box plot visual inspection
biblio
Cross-Project Defect Prediction Using a Credibility Theory Based Naive Bayes Classifier
Submitted by grigby1 on Thu, 12/28/2017 - 1:30pm
predictive security metrics
transfer learning
Training data
Training
target projects
target data distribution
standards
source projects
software quality
software engineering
Software
quality assurance
pubcrawl
program debugging
Bayes methods
Predictive models
Predictive Metrics
pattern classification
novel reweighting mechanism
Nai¨ve Bayes classifier
Metrics
Insurance
cross-project defect prediction
credibility theory based naive Bayes classifier
credibility theory
CPDP
computer science
biblio
Machine learning aided traffic tolerance to improve resilience for software defined networks
Submitted by grigby1 on Thu, 12/28/2017 - 1:28pm
SDN
OpenFlow
pattern classification
POX controller platform
Prediction algorithms
pubcrawl
real-time systems
ReSDN
resilience
resilience framework
Resiliency
routing table
network security
SDNs
software defined networking
Software Defined Networks
Survivability
SYN flood
telecommunication network routing
telecommunication traffic
Traffic Management
traffic tolerance
Training
feature extraction
centralised control
centralised controller
composability
computer network management
computer network reliability
computer network security
Decision Making
DoS attack
DoS attacks
Engines
attacks classification
flexible management
Future Internet
intrusion tolerance
learning (artificial intelligence)
machine learning
machine learning algorithms
malicious intrusion detection
Mininet simulator
MIT KDD 1999 dataset
neptune attack
biblio
Collaborative Ensemble-Learning Based Intrusion Detection Systems for Clouds
Submitted by grigby1 on Thu, 12/28/2017 - 1:21pm
fuzzy classifiers
VM failures
virtual machines
Training
security of data
Resiliency
pubcrawl
pattern classification
Learning systems
learning (artificial intelligence)
KDD99
intrusion tolerance
Intrusion Detection Systems
Intrusion Detection
IDS
groupware
Anomaly Detection
fuzzy classifier
Fault-Tolerance
fault tolerant computing
Ensemble Learning
Decision trees
Decision Tree
dataset segmentation
composability
Collaborative Systems
collaborative ensemble-learning
collaboration
cloud-based distributed system
Cloud Computing
Bagging
« first
‹ previous
…
17
18
19
20
21
22
23
24
25
next ›
last »