Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pattern clustering
biblio
A Ransomware Detection Method Using Fuzzy Hashing for Mitigating the Risk of Occlusion of Information Systems
Submitted by aekwall on Mon, 03/23/2020 - 1:26pm
organisational information systems
SSDEEP
threat actors
WannaCryptor
file organisation
codebase
k-means clustering
malware prevention strategy
mvHASH-B
SDHASH
ransomware corpus
ransomware detection method
ransomware samples
similarity detection success rate
similarity preserving hashing
similarity preserving hashing method
unknown ransomware variants
fuzzy set theory
invasive software
Resiliency
pubcrawl
composability
Ransomware
Metrics
organisational aspects
probability
Cryptography
Information systems
pattern clustering
ransomware attacks
WannaCry
Fuzzy Hashing
fuzzy hashing methods
fuzzy similarity scores
biblio
Cyberthreat Hunting - Part 2: Tracking Ransomware Threat Actors Using Fuzzy Hashing and Fuzzy C-Means Clustering
Submitted by grigby1 on Wed, 02/26/2020 - 4:41pm
signature based defense
fuzzy techniques
Indexes
Locky
malicious code writing
Measurement
pattern clustering
privacy
pubcrawl
Ransomware
ransomware threat actor
SDHASH
fuzzy similarity scores
Similarity Preserving
SSDEEP
successful attack vectors
threat actors
threat vectors
Triaging
unknown ransomware
unlimited polymorphic samples
WannaCry
WannaCryptor
Writing
Cryptography
Resiliency
Metrics
Fuzzy Cryptography
Attack Surfaces
c-means clustering
Cerber
cluster ransomware samples
clustering methods
clustering techniques
composability
Context-Triggered Piecewise Hashing
Scalability
CryptoWall
CTPH
cyberthreat hunting
efficient fuzzy analysis approach
FCM
FCM clustering results
fuzzy c-means clustering
Fuzzy Hashing
fuzzy hashing methods
fuzzy set theory
biblio
Balanced Load Clustering with Trusted Multipath Relay Routing Protocol for Wireless Sensor Network
Submitted by grigby1 on Wed, 02/26/2020 - 4:35pm
quality of service
WSN
wireless sensor networks
Wireless Sensor Network
wireless channels
trusted multipath relay routing
trust values
Trust Routing
telecommunication security
Scalability
Routing protocols
relay node
relay networks (telecommunication)
balanced load clustering
pubcrawl
pattern clustering
network simulation software
multipath trust
multipath channels
malicious activity trusted multipath relay routing protocol
Hybrid medium access control (HMAC)
Energy Efficiency
energy consumption
composability
balanced load clustering concepts
biblio
Combining Tensor Decompositions and Graph Analytics to Provide Cyber Situational Awareness at HPC Scale
Submitted by grigby1 on Mon, 02/17/2020 - 5:16pm
resilience
metadata
Metrics
multidimensional anomaly detection fusing HPC Analytics and Tensors
network topology
parallel processing
parallelized graph analysis
pattern clustering
pubcrawl
MADHAT
Resiliency
security of data
sensor fusion
situational awareness
structured network sensor logs
Tensile stress
tensors
tools
groupware
Security Metrics
clustering methods
composability
data structures
Detectors
Electronic mail
graph analytics
graph theory
Computing Theory
high-performance packages
HPC architecture for cyber situational awareness
HPC resources
HPC scale
integrated workflow
IP networks
large-scale sparse tensor decompositions
biblio
Improving Energy Efficiency of Hadoop Clusters using Approximate Computing
Submitted by aekwall on Mon, 02/10/2020 - 11:58am
Apache Hadoop
multicore computing security
Thermal-efficiency
thermal-aware data placement
thermal-aware approximate computing
tHadoop2
Pi MapReduce application
Pi
multicore computing platforms
Hadoop clusters
energy-efficient solutions
Energy-efficiency
approximate computing
Scalability
data handling
Hadoop
multiprocessing systems
parallel processing
pattern clustering
MapReduce
Metrics
energy conservation
pubcrawl
Resiliency
power aware computing
biblio
Efficient Detection of Spam Messages Using OBF and CBF Blocking Techniques
Submitted by grigby1 on Mon, 02/10/2020 - 11:18am
spam detection
Picture Based Shifting
porter stemer algorithm
Postal services
Poster Stemmer algorithm
pubcrawl
Scalability
Servers
spam block mail
pattern clustering
spam detection system
spam mail-sifting system
spam message
spamming changes
unsolicited e-mail
user attacks
web applications
information filtering
Conferences
content based filter
Content based Filter (CBF)
e-mail filters
emails
Human behavior
Human Factors
Informatics
CBF blocking techniques
internet
k means clustering
mail message
Market research
Metrics
OBF
OBF blocking techniques
biblio
Emergency Severity Assessment Method for Cluster Supply Chain Based on Cloud Fuzzy Clustering Algorithm
Submitted by grigby1 on Mon, 01/27/2020 - 12:34pm
Scalability
Metrics
multidata fusion method
optimisation
pattern clustering
policy-based governance
pubcrawl
resilience
Resiliency
Risk Severity Assessment
Human Factors
sensor fusion
sliding window model
summary cloud model generation algorithm
Sun mary Cloud Model Generation Algorithm
supply chain risk assessment
synopsis data
time attenuation model
Voltage control
composite uncertainty characteristics
cloud fuzzy clustering algorithm
cloud model processing
cluster centers
cluster microcluster weights
Cluster Supply Chain
cluster supply chain emergency
collaboration
composability
Cloud Computing
data stream fuzzy clustering algorithm
emergency management
Emergency Risk
emergency severity assessment indexes
emergency severity assessment method
fuzzy set theory
high-dimensional data stream characteristics
Human behavior
biblio
A Swarm Intelligence Approach to Avoid Local Optima in Fuzzy C-Means Clustering
Submitted by aekwall on Mon, 01/27/2020 - 10:25am
pattern clustering
swarm intelligence global optimization method
optimization process
NP-hard
inter-cluster similarity
hill climbing method
fuzzy self-tuning particle swarm optimization
fuzzy clustering task
fuzzy c-means clustering
FST-PSO
clustering analysis
Linear programming
Compositionality
Partitioning algorithms
Task Analysis
computational complexity
fuzzy set theory
Fuzzy logic
Clustering algorithms
particle swarm optimization algorithm
particle swarm optimization
optimization
Swarm Intelligence
particle swarm optimisation
convergence
composability
pubcrawl
biblio
Hybrid Intrusion Detection System Using Machine Learning Techniques in Cloud Computing Environments
Submitted by grigby1 on Tue, 01/21/2020 - 11:20am
Resiliency
learning (artificial intelligence)
machine learning
machine learning techniques
network activities
network anomalous event
pattern clustering
pubcrawl
resilience
intrusion event
secure Cloud computing environment
security issues
service consolidations
signature-based detection schemes
Support vector machines
trustworthy Cloud computing environment
ubiquitous presence
computer network security
anomaly detection system
Cloud Computing
Cloud Computing networks
cloud environments
Cloud Hypervisor level
Cloud Intrusion Detection
Clustering algorithms
composability
Anomaly Detection
Cyber Attacks
dynamic provisioning
feature extraction
hybrid detection mechanism
hybrid Intrusion Detection System
Intrusion Detection
Intrusion Detection Systems
biblio
APDPk-Means: A New Differential Privacy Clustering Algorithm Based on Arithmetic Progression Privacy Budget Allocation
Submitted by aekwall on Mon, 01/06/2020 - 10:36am
k-means algorithm
Sensitivity
security of data
Scalability
resource management
Resiliency
pubcrawl
privacy protection
privacy budgets
privacy budget allocation
privacy
pattern clustering
optimisation
network information security
network data mining
APDPk-means
iterative process
Iterative methods
Human behavior
differential privacy k-means
differential privacy clustering algorithm
differential privacy
Data protection
Data mining
data clustering
composability
Clustering algorithms
Big Data
arithmetic progression privacy budget allocation
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »