Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pattern classification
biblio
"An efficient classification model for detecting advanced persistent threat"
Submitted by abfox on Tue, 02/14/2017 - 11:44am
Intrusion Detection
Vegetation
Training
targeted attack
pubcrawl170101
pattern classification
Organizations
model
Mathematical model
malware
intrusion prevention systems
advanced persistent threat
international trade
government agencies
firewalls
feature extraction
Cyber Attacks
classification model
APTs
antivirus solutions
advanced persistent threat detection
biblio
Terms Mining in Document-Based NoSQL: Response to Unstructured Data
Submitted by BrandonB on Tue, 05/05/2015 - 1:30pm
document-based NoSQL
Viterbi algorithm
unstructured data storage
Unstructured Data Mining
topics mining
text analysis
terms mining
terms
term classification
Semantics
pattern clustering
pattern classification
NoSQL database
NoSQL
analytics-as-a-service framework
document handling
Dictionaries
Databases
database management systems
data mining techniques
Data mining
clustering
Classification algorithms
classification
Big Data
Big Bata
association rules
biblio
Malicious data classification using structural information and behavioral specifications in executables
Submitted by BrandonB on Tue, 05/05/2015 - 11:55am
Software
malwares
NtTrace
obfuscation technology
pattern classification
program diagnostics
security devices
signature database
signature-based detection system
malware detection system efficiency improvement
static analysis
structural information
Syntactics
system calls
threat detection
threat mitigation
underground Internet economy
zero-day malware detection
internet
antivirus
automated malicious programs
behavioral specifications
Classification algorithms
dynamic analysis
executable file
feature extraction
Information systems
Algorithm design and analysis
invasive software
malicious behavior extraction
malicious data classification
malicious software detection
malicious software mitigation
malware
malware detection
malware detection system effectiveness improvement
biblio
An advancing investigation on reduct and consistency for decision tables in Variable Precision Rough Set models
Submitted by BrandonB on Mon, 05/04/2015 - 2:28pm
Electronic mail
β-consistent notion
β-complement reduct
VPRS model
variable precision rough set model
rough set theory
pattern classification
Mathematical model
majority inclusion relation mechanism
hidden classification ability
Fault tolerant systems
fault tolerance
Analytical models
Educational institutions
decision tables
decision table structures
decision table splitting algorithm
data reduction
data integrity
Computational modeling
classical RS model
classical rough set theory
attribution reduction problem
biblio
Effective personalized mobile search using KNN
Submitted by BrandonB on Mon, 05/04/2015 - 1:20pm
KNN
Vectors
user preferences
user preference privacy
Servers
search engines
personalized mobile search
personalization
pattern classification
Ontology
Ontologies
mobile search engine
mobile computing
Mobile communication
location search
Android based mobile
k nearest neighborhood
information retrieval
encryption techniques
data privacy
data maintaining security
Cryptography
concept extraction
concept
client-server systems
client-server architecture
clickthrough data
Classification algorithms
classification
Androids
biblio
Joint localization and fingerprinting of sound sources for auditory scene analysis
Submitted by BrandonB on Mon, 05/04/2015 - 12:01pm
sensor fusion
vehicular-traffic case study
vehicles
traffic engineering computing
testing
support-vector machine classification
Support vector machines
sound-based techniques
sound source localization
sound source fingerprinting
sensors
Accuracy
scene element classification
phase-based sound localization
pattern classification
Image analysis
feature extraction
embedded nodes
data fusion
auditory scene analysis
Acoustic signal processing
biblio
Network Intrusion Detection System using attack behavior classification
Submitted by BrandonB on Thu, 04/30/2015 - 1:24pm
Neural networks
unauthorized accesses
TDNN neural network structure
TDNN neural network
reconnaissance attacks
Protocols
Probes
preprocessor
Ports (Computers)
port scan attacks
Port scan
Pattern recognition
pattern classification
packet capture engine
NIDS
alert module
neural nets
network probe attacks
Network probe attack
network intrusion detection system
IP networks
Intrusion Detection Systems
Intrusion Detection
host-based intrusion detection system
host sweep attacks
Host sweep
HIDS
computer security systems
computer network security
attack behavior classification
« first
‹ previous
…
17
18
19
20
21
22
23
24
25