Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pattern clustering
biblio
Denial of Service Detection Mitigation Scheme using Responsive Autonomic Virtual Networks (RAvN)
Submitted by aekwall on Mon, 08/24/2020 - 12:47pm
mitigation scheme
anomalous mitigation solutions
anomaly detection schemes
Centroid-based-based clustering technique
data features
decision making skills
high rate denial of service attacks
high rate DoS attacks
intragroup variance
Kmeans
low rate detection
adaptive reconfigurable features
multivariate clustering method
multivariate gaussian distribution model
network performance statistics
ONOS SDN controller
open networking operating system
RAvN
responsive autonomic data-driven adaptive virtual networking framework
traffic monitoring tools
unsupervised machine learning technique
Autonomic Security
pubcrawl
computer network security
Monitoring
IP networks
telecommunication traffic
virtualisation
software defined networking
feature extraction
learning (artificial intelligence)
machine learning
Resiliency
security of data
composability
Decision Making
network traffic
gaussian distribution
pattern clustering
Software-Defined Networks
Unsupervised Learning
adaptive systems
network configurations
adaptive policy updates
biblio
Cluster based Intrusion Detection System for Mobile Ad-hoc Network
Submitted by aekwall on Mon, 08/03/2020 - 10:18am
mobile ad hoc networks
voting
security of data
Routing protocols
Routing Protocol
route structure
Resiliency
pubcrawl
pattern clustering
node mobility
network traffics
network securities
monitoring process
Monitoring
mobility management (mobile radio)
mobile ad-hoc network
MANET Attack Detection
Metrics
memory overhead
MANET
malicious node
Intrusion Detection
DRINA Intrusion
Compositionality
clustering protocols
cluster based Intrusion detection planning
cluster
CBIDP
ad-hoc node security
Ad Hoc Network Security
active monitoring node
biblio
An Anomaly Detector for CAN Bus Networks in Autonomous Cars based on Neural Networks
Submitted by aekwall on Mon, 07/20/2020 - 10:44am
critical phase
in-vehicle networks
academic researchers
anomaly detector
anomaly-detection techniques
autonomous cars
CAN bus networks
CAN packets
Controller Area Networks bus
controller area networks
ID field
industrial researchers
MLP Neural Network
MultiLayer Perceptron neural network
real-time detection
robust secure system
securing communication
wireless interfaces
pubcrawl
security of data
Detectors
intrusion detection system
Internet of Things
Protocols
cyber-physical systems
feature extraction
Resiliency
Automotive engineering
Neural networks
Computer hacking
Anomaly Detection
Intrusion Detection
pattern clustering
controller area network security
intrusion detection method
multilayer perceptrons
biblio
Edge Computing for User-Centric Secure Search on Cloud-Based Encrypted Big Data
Submitted by aekwall on Mon, 07/13/2020 - 11:06am
sensitive data
multisource Big Data search space
pattern clustering
Privacy-Preserving Big Data
pruning system
pubcrawl
Resiliency
Scalability
semantic search
Metrics
user privacy in the cloud
User-based Sampling
user-centric cloud services
user-centric search ability
user-centric search system
user-centric secure search
user-side encryption
big data security
markov chain
encryption
Encrypted Clustering
edge computing
data structures
data privacy
data control
Cryptography
cloud-based solutions
cloud service providers
cloud provider
Cloud Computing
big dataset clustering
big data encryption
Big Data
biblio
An Online System Dependency Graph Anomaly Detection based on Extended Weisfeiler-Lehman Kernel
Submitted by aekwall on Mon, 07/06/2020 - 10:14am
Compositionality
Cyber Dependencies
Weisfeiler-Lehman graph kernel
System dependency graph
streamspot
simHash
online system dependency graph anomaly detection
multitasking systems
multiprogramming
modern operating systems
locality-sensitive hashing
graph similarity
extended Weisfeiler-Lehman kernel
embedding and clustering of heterogeneous graphs
dependency graph
clustering analysis
Intrusion Detection
Human Factors
pattern clustering
Forensics
Anomaly Detection
Clustering algorithms
standards
Metrics
graph theory
pubcrawl
Resiliency
Kernel
Task Analysis
Scalability
security of data
biblio
Video Data Hierarchical Retrieval via Deep Hash Method
Submitted by grigby1 on Fri, 07/03/2020 - 1:15pm
key frame extraction
video signal processing
video retrieval
video hierarchical retrieval
video data hierarchical retrieval
VGG16
simHash
Scalability
Resiliency
resilience
pubcrawl
pattern clustering
Metrics
learning (artificial intelligence)
cluster-based method
high-level semantical features extraction
fine search
file organisation
feature extraction
Euclidean distance
deep video
deep hash method
deep convolutional neural network model
deep convolutional neural network
deep CNN
convolutional neural nets
coarse search
biblio
Network Intrusion Detection Using Improved Genetic k-means Algorithm
Submitted by aekwall on Mon, 05/11/2020 - 11:12am
k-means++ algorithm
Training
Time complexity
Resiliency
pubcrawl
Prediction algorithms
personal privacy theft
pattern clustering
Partitioning algorithms
network intrusion detection
network intrusion
Metrics
KDD-99 dataset
KDD-99
Clustering algorithms
intrusion detection system
Intrusion Detection
internet
IGKM algorithm
IGKM
Genetics
genetic k-means algorithm
genetic algorithms
data privacy
computer network security
computer network
composability
biblio
Anomaly Detection using Graph Neural Networks
Submitted by grigby1 on Fri, 05/08/2020 - 2:43pm
security of data
Neural networks
pattern classification
pattern clustering
Peer-to-peer computing
policy-based governance
pubcrawl
Resiliency
security
Neural Network Security
social connection graphs
social network
social network statistical measures
social networking (online)
statistical analysis
Twitter
Twitter dataset
Twitter network
email network
Artificial Neural Networks
classification
clustering
Clustering algorithms
collaboration
cyber physical systems
deep learning
deep neural networks
Anomaly Detection
Enron dataset
Graph Neural Network
graph neural networks
graph structure
graph theory
learning (artificial intelligence)
Metrics
neural nets
biblio
An Improved Privacy Protection Method Based on k-degree Anonymity in Social Network
Submitted by aekwall on Mon, 04/20/2020 - 10:31am
Metrics
structural modifications
social networking (online)
social network
Publishing
pubcrawl
privacy protection
privacy models and measurement
privacy
pattern clustering
original social network
node degrees
network theory (graphs)
network structure stable
network nodes
anonymity
Mathematical model
Loss measurement
k-subgraph method
k-degree anonymous graph
k-degree anonymity
k-anonymity
information losses
information loss
improved privacy protection method
graph theory
data privacy
computer security
Clustering algorithms
anonymity models
biblio
K-Means Clustering Analysis Based on Adaptive Weights for Malicious Code Detection
Submitted by grigby1 on Mon, 04/06/2020 - 2:23pm
network coding
traffic characteristics
traditional detection techniques
telecommunication traffic
statistical analysis
Resiliency
resilience
pubcrawl
pattern clustering
network traffic
network security
network scanning
adaptive weights-MMKM
network behavior
Metrics
malicious codes
malicious code detection
malicious code
k-means clustering analysis
cyber physical systems
computer network security
composability
clustering
AW-MMKM
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »