Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
graph theory
biblio
Wavelet transform and unsupervised machine learning to detect insider threat on cloud file-sharing
Submitted by grigby1 on Tue, 12/12/2017 - 1:23pm
pubcrawl
Learning systems
local-outlier factor
LOF
machine learning algorithms
Metrics
OddBall
pagerank
Peer-to-peer computing
policy-based governance
Insider Threats
relationship graphs
Resiliency
security of data
Time series analysis
two-stage machine learning system
Unsupervised Learning
wavelet analysis
wavelet coefficients
graph theory
cloud file-sharing
cloud file-sharing services
collaboration
Company Data
company IP
discrete wavelet transform
discrete wavelet transforms
DWT
Cloud Computing
graph-based unsupervised learning
graph-based unsupervised machine learning methods
Haar transforms
Haar wavelet
Haar wavelet function
Human behavior
Human Factors
Insider Threat Detection
biblio
Insider Threat Detection Through Attributed Graph Clustering
Submitted by grigby1 on Tue, 12/12/2017 - 1:23pm
Insider Threats
trusted source
security of data
security
Resiliency
pubcrawl
psychology
policy-based governance
pattern clustering
outlier ranking mechanism
Organizations
organizational dynamics
network analysis
Metrics
malicious insider access
malicious attacker unpredictability
Anomaly Detection
Insider Threat Detection
Human Factors
Human behavior
heterogeneous data analysis
graph theory
enterprise users
Electronic mail
data analysis
cybersecurity threats
collaboration
Clustering algorithms
business data processing
Bipartite graph
attributed graph clustering
biblio
The Arabic Knowledge Graph: Opportunities and Challenges
Submitted by grigby1 on Tue, 12/12/2017 - 1:19pm
natural language processing
Semantics
Semantic Web
Scalability
Resiliency
question answering (information retrieval)
query answering
pubcrawl
Opportunities
Ontologies
NLP
AKG
Metadata Discovery Problem
Linked Data
internet
graph theory
feature extraction
Encyclopedias
Electronic publishing
Compositionality
challenges
Arabic knowledge graph
biblio
Collaborative botnet detection with partial communication graph information
Submitted by grigby1 on Mon, 12/04/2017 - 12:57pm
Internet of Things
universal communication graph
Resiliency
pubcrawl
Peer-to-peer computing
peer-to-peer botnets
partial information
partial communication graph information
P2P networks
P2P botnets
Metrics
machine learning techniques
invasive software
Internet-of-Things devices
Algorithm design and analysis
Image edge detection
graph theory
graph analysis
Error analysis
detection errors
detection algorithms
computer network security
Computer crime
Compositionality
community detection algorithms
collaborative botnet detection
centralized command & control structure botnets
botnets
biblio
A Distributed Graph Database for the Data Management of IoT Systems
Submitted by grigby1 on Mon, 11/13/2017 - 11:50am
graph edge property
social computing
security
REST API
Resiliency
pubcrawl
middleware
IoT systems
IoT
Internet of Things
green computing
graph theory
Access Control
graph database operations
graph database
distributed system
distributed graph database
Distributed databases
data management
Conferences
composability
collaboration
application program interfaces
access protocol permissions
biblio
Compressing Graphs and Indexes with Recursive Graph Bisection
Submitted by grigby1 on Fri, 09/15/2017 - 11:03am
Algorithms
Approximation algorithms
Compression
Data mining
distributed algorithms
Experimentation
graph algorithms
graph theory
Human behavior
linear arrangement
Malware Analysis
Metrics
privacy
pubcrawl
Resiliency
social networks
biblio
Near-Optimal Distributed Algorithms for Fault-Tolerant Tree Structures
Submitted by grigby1 on Fri, 09/15/2017 - 11:03am
congest model
fault tolerance
graph algorithms
graph theory
Human behavior
Malware Analysis
Metrics
privacy
pubcrawl
Resiliency
biblio
Ramanujan Coverings of Graphs
Submitted by grigby1 on Fri, 09/15/2017 - 11:03am
expander graphs
graph coverings
graph lifts
graph theory
Human behavior
interlacing polynomials
Malware Analysis
matching polynomial
Metrics
privacy
pubcrawl
Ramanujan graphs
Resiliency
biblio
A New Risk Assessment Framework Using Graph Theory for Complex ICT Systems
Submitted by grigby1 on Fri, 09/15/2017 - 11:03am
complex ICT systems
Computing Theory
Damage Assessment
graph theory
Human behavior
Malware Analysis
Metrics
privacy
pubcrawl
Resiliency
risk assessment
Security Metrics
biblio
Nonlinear Laplacian for Digraphs and Its Applications to Network Analysis
Submitted by grigby1 on Fri, 09/15/2017 - 11:03am
graph
graph theory
Human behavior
Malware Analysis
Metrics
privacy
pubcrawl
Resiliency
spectral
theory
« first
‹ previous
…
19
20
21
22
23
24
25
26
27
next ›
last »