Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pattern clustering
biblio
A Differential Privacy-Based Protecting Data Preprocessing Method for Big Data Mining
Submitted by aekwall on Mon, 01/06/2020 - 9:35am
data privacy
Resiliency
privacy protection
privacy disclosure issue
privacy
precise clustering results
pattern clustering
Human behavior
distortion
distancebased clustering
distance-based clustering
differential privacy-based protecting data preprocessing method
differential privacy budget parameter
differential privacy
big data privacy
Data preprocessing
Data mining
data distortion technique
composability
Clustering algorithms
big data mining
adaptive privacy budget parameter adjustment mechanism
adaptive mechanism
Metrics
Scalability
resilience
Human Factors
pubcrawl
biblio
Anomaly Based Distributed Denial of Service Attack Detection and Prevention with Machine Learning
Submitted by grigby1 on Wed, 12/18/2019 - 1:45pm
Human behavior
telecommunication traffic
service attack detection
Resiliency
resilience
pubcrawl
pattern clustering
Particle separators
network traffic
Metrics
Measurement
machine learning
learning (artificial intelligence)
anomaly based distributed denial of service attack detection
feature extraction
DoS-DDoS attacks
DDoS Attack Prevention
DDoS Attack
DBSCAN
computer network security
Computer crime
composability
Clustering algorithms
clustering algorithm
Attack vectors
biblio
A Swarm-based Data Sanitization Algorithm in Privacy-Preserving Data Mining
Submitted by aekwall on Mon, 12/16/2019 - 12:47pm
artificial cost
swarm-based data sanitization algorithm
privacy-preserving data mining
PPDM
Pareto solutions
multiobjective PSO
multiobjective
missing cost
Itemsets
hierarchical clustering methods
hierarchical clustering method
hiding failure
genetic algorithms
clustering methods
data privacy
Data Sanitization
Compositionality
resilience
pattern clustering
privacy
Data mining
Clustering algorithms
Data protection
PSO
optimization
particle swarm optimisation
pubcrawl
Human behavior
biblio
A Hybrid Recommendation Algorithm Based on Heuristic Similarity and Trust Measure
Submitted by aekwall on Mon, 12/09/2019 - 11:24am
SIMT collaborative filtering algorithm
hybrid collaborative filtering recommendation algorithm
K nearest neighbor recommendation
Matrix decomposition
multiple similarity influence factors
recommedation algorithm
recommendation list
recommender systems
similarity measure
heuristic similarity
trust measure
trust model
trust propagation theory
user trust network
user trust relationship computing model
Weight measurement
Computing Theory and Trust
Conferences
data sparsity
cold start
Compositionality
clustering algorithm
Heuristic algorithms
pattern clustering
collaboration
Clustering algorithms
clustering
Prediction algorithms
collaborative filtering
composability
pubcrawl
nearest neighbour methods
Trusted Computing
biblio
Learning Transferable Features For Open-Domain Question Answering
Submitted by aekwall on Mon, 11/25/2019 - 1:01pm
single open-domain QA model
open-domain QA models
open-domain question answering
open-domain Question-Answering models
pattern clustering
pubcrawl
question answering (information retrieval)
Question-Answering
sentence-level QA models
natural language processing
span-level QA benefits
Task Analysis
Training
training corpora
Training data
transfer learning
transferable feature learning
transferable features
domain-specific QA models
Analogies and Transference
clustering algorithm
complementary data
Data models
Deep Networks
domain adaptation approaches
domain-adaptation
domain-specific features
Adaptation models
Human behavior
Human Factors
information retrieval
Knowledge Discovery
learning (artificial intelligence)
Linear programming
natural language
biblio
Container Cluster Model Development for Legacy Applications Integration in Scientific Software System
Submitted by aekwall on Mon, 10/28/2019 - 9:38am
MD - SLAG – MELT
computing applications
container
container cluster model development
containerization systems
distributed computer simulation
high-efficiency computing
high-performance computing
intellectual processing
legacy applications integration
mathematical analysis
computer software
MD-SLAG-MELT system
modern scientific information systems
molecular dynamic Modeling
nonstandardized interfaces
programming languages
scientific software system
system MD-SLAG-MELT
ubiquitous computing
Scientific Computing Security
Load modeling
Big Data
computer architecture
Resiliency
pubcrawl
Computational modeling
database
Databases
Software systems
software maintenance
Containers
Servers
pattern clustering
business data processing
visualization
Predictive Metrics
scientific information systems
Compositionality
cluster
computer experiments results
computer simulation systems
biblio
Detection of Hurriedly Created Abnormal Profiles in Recommender Systems
Submitted by grigby1 on Tue, 10/15/2019 - 1:41pm
profile injection attacks
user-item rating matrix
user rating behavior
system ratings
synthetic coordinates
spurious profiles
specific ratings
specific items
security of data
Scalability
Resiliency
resilience
recommender systems
random ratings
Random Forest
pubcrawl
anomalous rating profiles
pattern clustering
Outliers
learning (artificial intelligence)
Labeling
k-means clustering
information filtering
hurriedly created abnormal profiles
Human Factors
Hidden Markov models
gaussian distribution
feature extraction
dimensionality reduction
clustering methods
attackers
biblio
Multiple Attributes Based Spoofing Detection Using an Improved Clustering Algorithm in Mobile Edge Network
Submitted by aekwall on Mon, 08/05/2019 - 9:44am
MEC network
spoofing detection method
spoofing detection
security problems
security of data
Scalability
Resiliency
pubcrawl
pattern clustering
multiple channel attributes
multiple attributes
mobile edge computing network
Mobile Edge Computing
mobile computing
Cloud Computing
Intrusion Detection
internet
Information Centric Networks
Information Centric Network
Image edge detection
ICN
Heuristic algorithms
edge computing
distributed network architecture
Clustering algorithms
clustering algorithm
cluster algorithm
cloud platform
biblio
Validation and Correction of Large Security Policies: A Clustering and Access Log Based Approach
Submitted by grigby1 on Wed, 05/01/2019 - 10:34am
Metrics
verifying security policies
security policies
security of data
security
Scalability
Resiliency
resilience
Redundancy
pubcrawl
potential security breaches
Policy Validation and Correction.
pattern clustering
obtained clusters
nonallowed accesses
ABAC Policy
Image edge detection
edge detection
Conferences
composability
clustering technique
clustering
big data environments
Big Data
Anomaly Detection and Resolution
Anomaly Detection
access log based approach
Access Log
Access Control
biblio
Hybrid Approach for Intrusion Detection Using Fuzzy Association Rules
Submitted by grigby1 on Wed, 05/01/2019 - 10:29am
reduced dataset
Intrusion Detection
intrusion detection system
Metrics
misuse detection
network technologies
pattern clustering
pubcrawl
rapid development
Internet rapid development
resilience
Resiliency
security
security of data
Time complexity
Training
weighted fuzzy C-mean clustering algorithm
Anomaly Detection
input data space
hybrid approach
Fuzzy sets
fuzzy set theory
fuzzy logic scheme
Fuzzy logic
fuzzy association rules
feature extraction
deep learning
decrease resource utilization
Decision Making
considerable increase
computer networks
Clustering algorithms
anomaly intrusions
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »