Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hidden Markov models
biblio
TARN: A SDN-based traffic analysis resistant network architecture
Submitted by K_Hooper on Wed, 05/09/2018 - 10:52am
Scalability
network communications
Open vSwitches
PEERING BGP testbed
Peer-to-peer computing
pseudorandom IP addresses
pubcrawl
Resiliency
Routing
Routing protocols
large-scale traffic analysis resistant network support
SDN
SDN security
SDX solution
Software
software defined networking
TARN
telecommunication traffic
traffic analysis resistant network architecture
YouTube
Hidden Markov models
computer network security
customer-driven network services
customizable trustable end-to-end network services
destination IP prefix
destination networks
distributed software defined Internet exchange
DNS/IP filtering
end-to-end communication session
end-to-end network services
business model
intended destination AS's prefix
internet
Internet autonomous systems
Internet routing
IP addressing freedom
IP networks
IP prefixes
IPv4
IPv6
biblio
The APT detection method in SDN
Submitted by K_Hooper on Wed, 05/09/2018 - 10:51am
OpenFlow
Switches
software programming
software defined networking
SDN security
SDN controller plane
SDN
Scalability
Resiliency
pubcrawl
process control
APT
network framework
HMM
Hidden Markov models
Discrete Fourier transforms
data plane
computer network security
Computer crime
communication protocol
APT detection method
biblio
Network Attribute Selection, Classification and Accuracy (NASCA) Procedure for Intrusion Detection Systems
Submitted by grigby1 on Tue, 02/27/2018 - 2:36pm
Metrics
Vulnerability
Vegetation
unwanted intrusion detection
statistical learning procedure
Scalability
Resiliency
resilience
pubcrawl
Protocols
network attribute selection classification and accuracy procedure
Network
NASCA procedure
NASCA
Adaptation models
Intrusion Detection
Human Factors
Human behavior
Hidden Markov models
four-stage intrusion detection method
Entropy
Data models
Cybersecurity
cyber security space
Cyber Dependencies
computer network security
Compositionality
biblio
User-Demand-Oriented Privacy-Preservation in Video Delivering
Submitted by grigby1 on Mon, 11/20/2017 - 12:05pm
user-demand-oriented privacy-preservation
pubcrawl
Resiliency
sensitive behavior prediction
sequence privacy protection
spatial features
surveillance
temporal features
usability
privacy-preserving video delivery system
video information
Video Privacy
video privacy protection
video signal processing
video surveillance
video surveillance system
viewer-dependent pattern
Cameras
privacy demands
privacy
on-line requirements
off-line requirements
object tracking
Metrics
inference channels
Human Factors
Human behavior
Hidden Markov models
Foresight Protection
feature extraction
estimation
data privacy
context features
biblio
Malware Detection Using Dynamic Birthmarks
Submitted by grigby1 on Fri, 09/15/2017 - 11:11am
dynamic analysis
Hidden Markov models
Human behavior
malware
malware classification
Metrics
privacy
profile hidden markov models
pubcrawl
Resiliency
static analysis
biblio
Arabic handwritten document preprocessing and recognition
Submitted by grigby1 on Wed, 03/08/2017 - 2:46pm
image segmentation
Writing
Textline image Preprocessing
text-line level preprocessing
Text recognition
text detection
pubcrawl170115
Optical reflection
Optical imaging
OpenHaRT database
noise removal
noise effect reduction
line fragment removal
keystroke restoration
k-means
Arabic Handwriting Recognition
image restoration
image recognition
image denoising
Hidden Markov models
Handwritten Document preprocessing
handwritten character recognition
guideline removal preprocessing
Guideline removal
guideline detection approach
document image processing
document detection
deskewing
Arabic handwritten document recognition
Arabic handwritten document preprocessing
biblio
Learning-Based Cleansing for Indoor RFID Data
Submitted by grigby1 on Tue, 03/07/2017 - 1:13pm
data cleansing
Hidden Markov models
indoor moving objects
pubcrawl170201
RFID
biblio
"AD2: Anomaly detection on active directory log data for insider threat monitoring"
Submitted by abfox on Tue, 02/14/2017 - 12:14pm
Data models
pubcrawl170101
probability
Organizations
Monitoring
Markov processes
malware detection system
machine learning
learning (artificial intelligence)
invasive software
insider threat monitoring
Hidden Markov models
active directory domain service log
cyber security monitoring
computer security
Computational modeling
behavioural sciences computing
Behavioral Modeling
behavioral analytic framework
Anomaly Detection
advanced persistent threat
AD2
active directory log data
Active Directory Log Analysis
biblio
Obtaining Technology Insights from Large and Heterogeneous Document Collections
Submitted by BrandonB on Tue, 05/05/2015 - 1:22pm
information retrieval
topic evolution
text analysis
publications
patents
patenting profiles
mining publications
mining patent databases
Market research
large heterogeneous text collections
insight generation
academic research
indexing
Hidden Markov models
heterogeneous document collections
Data visualization
Data mining
data analysis
Context
automated topical analysis
analyzing research trends
biblio
Risk management with hard-soft data fusion in maritime domain awareness
Submitted by BrandonB on Tue, 05/05/2015 - 12:33pm
MDA scenarios
worldwide maritime incidents
soft data sources
situational frameworks
situational awareness
sensor fusion
semistructured textual data sources processing
RMF
risk-aware metric
risk management framework
risk management
risk features
response evaluation
Measurement
automatic identification system
maritime vessels
Maritime Domain Awareness
Marine vehicles
marine safety
marine engineering
Hidden Markov models
hard-soft data fusion
hard data sources
Feeds
feature extraction
dynamic systems
Douglas sea scale
Data mining
« first
‹ previous
1
2
3
4
5
6
next ›
last »