Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pattern clustering
biblio
F-DPC: Fuzzy Neighborhood-Based Density Peak Algorithm
Submitted by aekwall on Mon, 03/22/2021 - 1:11pm
expandability
neighborhood membership
local density
fuzzy neighborhood-based density peak algorithm
fuzzy neighborhood relationship
fuzzy neighborhood density peak clustering
fuzzy neighborhood
F-DPC
degree of membership
Compositionality
Partitioning algorithms
data objects
Classification algorithms
Heuristic algorithms
pattern clustering
fuzzy set theory
Data mining
clustering
Clustering algorithms
Shape
Robustness
Licenses
pubcrawl
Resiliency
biblio
Reliability Analysis of Concurrent Data based on Botnet Modeling
Submitted by grigby1 on Tue, 03/09/2021 - 2:23pm
network modelling
unsolicited e-mail
time series
telecommunication traffic
spam
security risks
security of data
Resiliency
resilience
reliability analysis
Reliability
pubcrawl
pattern clustering
network traffic time series
botnet modeling
multidimensional permutation entropy
Metrics
invasive software
high-privilege systems
Entropy
detection methods
data complex structure analysis
concurrent data
computer network security
composability
clustering variance method
botnets
biblio
Clustering Based Incident Handling For Anomaly Detection in Cloud Infrastructures
Submitted by aekwall on Mon, 03/01/2021 - 4:48pm
NSL-KDD
work factor metrics
run time metrics
nonclustering based algorithm
local outlier factor(LOF)
Kmeans
Isolation Forest algorithm
isolation forest
incident handling model
f-score
decision based approach
DBSCAN
clustering based algorithm
cloud infrastructures
anomaly detection mechanisms
Anomaly
security of data
cloud
Cloud Security
pattern clustering
Data mining
Anomaly Detection
Clustering algorithms
Prediction algorithms
pubcrawl
Resiliency
Protocols
Servers
Scalability
Cloud Computing
Monitoring
biblio
Binarized Attributed Network Embedding via Neural Networks
Submitted by grigby1 on Tue, 02/23/2021 - 2:36pm
Hamming space
Knowledge engineering
autoencoder
attribute similarity penalizing term
Attributed Network
binary code learning
data reduction
dimension reduction
feature aggregation
network coding
learned binary representation vectors
network embedding
node classification
node clustering
relaxation-quantization method
unsupervised neural based binarized attributed network embedding
Weisfeiler-Lehman Proximity Matirx
Weisfeiler-Lehman proximity matrix
composability
feature extraction
Neural networks
pubcrawl
Metrics
resilience
Resiliency
matrix algebra
optimization
learning (artificial intelligence)
Data mining
pattern classification
neural nets
Task Analysis
network theory (graphs)
pattern clustering
Binary codes
neural network training
biblio
Differential Privacy Information Publishing Algorithm based on Cluster Anonymity
Submitted by grigby1 on Thu, 01/28/2021 - 2:01pm
differential privacy information publishing algorithm
Running efficiency
Resiliency
resilience
Publishing
pubcrawl
privacy budget
pattern clustering
Metrics
internet technology
Internet of Things
internet
information loss
Human behavior
anonymity
differential privacy
data privacy
composability
Complexity theory
complex background knowledge
clustering anonymity
Clustering algorithms
clustering
cluster anonymity
Big Data
background attack
Artificial Intelligence
anonymous
biblio
Clustering Using a Similarity Measure Approach Based on Semantic Analysis of Adversary Behaviors
Submitted by grigby1 on Thu, 01/28/2021 - 1:10pm
similarity measure
security
security analysts
security of data
semantic analysis
semantic links
Semantics
shared information
similarity degree
Scalability
similarity measure approach
Software
standards
statistical characteristics
threat intelligence
three-layer model
tracking attacks
adversary behaviors
Resiliency
resilience
pubcrawl
pattern clustering
Metrics
Meta path
Knowledge engineering
Human behavior
complex networks
community groups
Community discovery
Biological system modeling
APT groups
Analytical models
Adversary Models
biblio
Pattern Extraction for Behaviours of Multi-Stage Threats via Unsupervised Learning
Submitted by grigby1 on Fri, 01/22/2021 - 1:39pm
Training data
pattern extraction
multistage threats
Multi-stage threats
malicious behaviour
Log-files Analysis
heterogeneous log-files
Cyber Threats Intelligence
Behaviour Analysis
advanced persistent threats
pattern clustering
Clustering algorithms
APT
advanced persistent threat
security of data
Cybersecurity
Scalability
Correlation
Resiliency
resilience
Metrics
Human behavior
pubcrawl
IP networks
Unsupervised Learning
data analysis
Anomaly Detection
feature extraction
biblio
OC-FakeDect: Classifying Deepfakes Using One-class Variational Autoencoder
Submitted by grigby1 on Fri, 01/15/2021 - 12:02pm
detecting Deepfakes
Face
DeepFake
binary-classification based detection
binary-classification based methods
class-based approach
computer-generated image
data scarcity limitations
deepfakes data
deepfakes detection
deepfakes generation methods
Image reconstruction
detection performance
detects nonreal images
fake face images
image forgery method
OC-FakeDect
one-class anomaly detection problem
one-class variational autoencoder
person
sufficient fake images data
Support vector machines
Training
Anomaly Detection
pubcrawl
Human behavior
Human Factors
Metrics
Resiliency
data privacy
Scalability
privacy issues
learning (artificial intelligence)
Streaming media
Benchmark testing
resilience
Forensics
face recognition
feature extraction
image classification
pattern clustering
object detection
biblio
Deepfake Detection with Clustering-based Embedding Regularization
Submitted by grigby1 on Fri, 01/15/2021 - 12:01pm
Human behavior
video signal processing
video quality
social networking (online)
security of data
Scalability
Resiliency
resilience
Regularization
pubcrawl
pattern clustering
object detection
Metrics
learning (artificial intelligence)
Human Factors
AI-synthesized face swapping videos
feature extraction
false video
face swapping
face recognition
embedded systems
detection accuracy
deepfake video detection
deepfake detection competitions
deepfake detection
deepfake datasets
DeepFake
clustering-based embedding regularization
clustering-based
biblio
Securing Vehicular Adhoc Network against Malicious Vehicles using Advanced Clustering Technique
Submitted by grigby1 on Mon, 12/28/2020 - 1:02pm
pattern clustering
vehicular adhoc network
vehicular ad hoc networks
VANET network
VANET
unique topics
telecommunication security
telecommunication network topology
security network
security
scientist
Resiliency
resilience
pubcrawl
predictable mobility
ad hoc network
network productivity
mobile radio
Metrics
malicious vehicles
malicious node
high dynamic network
high dynamic nature
good clustering algorithm
emerging topics
Compositionality
clustering technique
CH(cluster head)
advanced clustering technique
Ad hoc networks
1
2
3
4
5
6
7
8
9
next ›
last »