Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pattern classification
biblio
On Accuracy of Keystroke Authentications Based on Commonly Used English Words
Submitted by grigby1 on Wed, 03/08/2017 - 2:45pm
learning (artificial intelligence)
word total time duration feature
user active authentication
two-class support vector machine SVM
Support vector machines
pubcrawl170115
pattern classification
one-class support vector machine SVM
natural language processing
naïve Bayes classifier
machine learning techniques
commonly used English words
keystroke features
keystroke dynamics authentication systems
keystroke authentications
key duration feature
K-NN
k-nearest neighbor classifier
flight time latency feature
digraph time latency feature
Cryptography
biblio
On Accuracy of Classification-Based Keystroke Dynamics for Continuous User Authentication
Submitted by grigby1 on Wed, 03/08/2017 - 2:45pm
learning (artificial intelligence)
word total time duration
user active authentication
Training data
Training
timing
SVM
Support vector machines
support vector machine
security
pubcrawl170115
Performance
pattern classification
natural language processing
message authentication
machine learning techniques
authentication
keystroke features
keystroke dynamics authentication systems
keystroke dynamics
key duration
Kernel
K-NN
k-nearest neighbor classifier
flight time latency
feature extraction
English words
directed graphs
diagraph time latency
continuous user authentication
classification-based keystroke dynamics
biblio
Classifying Text-Based Computer Interactions for Health Monitoring
Submitted by grigby1 on Wed, 03/08/2017 - 2:44pm
pervasive computing
healthcare provider
human computer interaction
Human-computer interaction
keystroke analysis
Monitoring
patient monitoring
pattern classification
personal health informatics
Healthcare
Pragmatics
Predictive models
PreMCI
premild cognitive impairment
pubcrawl170115
text analysis
unobtrusive method
aging
health monitoring
health care
Dementia
Data models
current assessment
continuous monitoring
constructed statistical model
computer interaction pattern
Computational modeling
cognitive impairment
cognitive function
classifying text-based computer interaction
classification rate
AUC
area under curve
biblio
Highly robust analysis of keystroke dynamics measurements
Submitted by grigby1 on Wed, 03/08/2017 - 2:44pm
Particle measurements
typing characteristics
statistical analysis
robust classification performance analysis
regularized linear discriminant analysis
pubcrawl170115
principal component analysis
Pollution measurement
pattern classification
Atmospheric measurements
MWCD-L2-LDA
minimum weighted covariance determinant estimator
message authentication
keystroke dynamics measurements
implicit weight assignment
Covariance matrices
authentication method
biblio
Detection of botnet by analyzing network traffic flow characteristics using open source tools
Submitted by grigby1 on Tue, 03/07/2017 - 1:42pm
pattern classification
fraud
invasive software
IP networks
malware
Mobile Botnet
Mobile communication
network traffic flow characteristics analysis
open source tools
financial threat
payload analysis
payload inspection
Payloads
phishing attack
pubcrawl170109
public domain software
Servers
telecommunication traffic
C&C channels
Bot
bot host classification
Bot master
bot masters
botnet
botnet activity detection
Botnet cloud
botnet detection technique
Bluetooth
click fraud
Computer crime
computer network security
Conferences
cyber threat
cybercriminal activities
DDoS
encrypted C&C channel
biblio
Real-time classification of malicious URLs on Twitter using machine activity data
Submitted by grigby1 on Tue, 03/07/2017 - 1:39pm
malware
Web pages
user machines
Uniform resource locators
Twitter data
Twitter
Superbowl
social networking (online)
real-time systems
real-time malicious URL classification
pubcrawl170109
pattern classification
online social networks
Computer crime
malicious software behaviour
malicious software
malicious server
machine classification system
machine activity logs
machine activity data
invasive software
drive-by-download
Data models
cyber criminals
Cricket World Cup
biblio
Cyber-deception and attribution in capture-the-flag exercises
Submitted by grigby1 on Tue, 03/07/2017 - 1:35pm
DEFCON CTF exercise data
Training
Support vector machines
Social network services
security of data
pubcrawl170109
Payloads
pattern classification
Logistics
capture-the-flag exercises
DEFCON capture-the-flag exercise data
Decision trees
Cyber-security
cyber-deception
cyber-attack
culprit attribution
Computer crime
classification techniques
biblio
Mapping of Dengue Outbreak Distribution Using Spatial Statistics and Geographical Information System
Submitted by grigby1 on Mon, 02/27/2017 - 12:56pm
GIS
Urban areas
spatial statistics
Rivers
risk map
risk analysis
pubcrawl170108
pubcrawl170107
pattern classification
kernel density estimation
Kernel
KDE
Aedes mosquito-borne disease
geographical information system
geographic information systems
estimation theory
estimation
diseases
dengue fever outbreak distribution
data analysis
buffer analysis
average nearest neighbor
Artificial Neural Networks
ANN
biblio
"An Artificial Intelligence-Based Trust Model for Pervasive Computing"
Submitted by grigby1 on Thu, 02/23/2017 - 12:56pm
human-like decision making
user trustworthiness
ubiquitous computing scenarios
ubiquitous computing
Trusted Computing
trust model
security
pubcrawl170105
pervasive computing
pattern classification
network interactions
naïve Bayes classifier
Itemsets
Apriori algorithm
effective trust model
Decision Making
Data mining
computers arena
computational services distribution
Computational modeling
Classification algorithms
behavioral patterns
Bayes methods
artificial intelligence-based trust model
Artificial Intelligence
biblio
"Pattern classification under attack on spam filtering"
Submitted by grigby1 on Thu, 02/23/2017 - 12:26pm
privacy
unsolicited e-mail
spam filtering
spam email security evaluation
spam attack scenario
security of data
security issues
Security Evaluation
security
pubcrawl
adversarial attacks
pattern classification system
pattern classification
filtering algorithms
Filtering
Electronic mail
pubcrawl170105
Classification algorithms
adversarial classification
« first
‹ previous
…
17
18
19
20
21
22
23
24
25
next ›
last »