Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pattern clustering
biblio
Botnet Homology Method Based on Symbolic Approximation Algorithm of Communication Characteristic Curve
Submitted by grigby1 on Fri, 04/05/2019 - 10:23am
pattern clustering
internet
invasive software
IP networks
IRC botnet
IRC protocol
Metrics
most significant botnet group
multiple zombies hosts
network servers
network traffic
packet capture traffic monitoring
homology
Protocols
pubcrawl
resilience
Resiliency
Servers
symbolic approximation algorithm
telecommunication traffic
time series
Time series analysis
time warp simulation
Compositionality
botnet
botnet client
botnet control server
botnet homology method
botnets
clustering
Clustering algorithms
command and control systems
command control channels
command interaction
communication characteristic curve
Approximation algorithms
computational complexity
computer network security
dynamic network communication characteristic curves
dynamic time warping distance clustering
earliest botnet group
effective detection method
extracted curve
Heuristic algorithms
homogenous botnet
homologous botnets
biblio
Low-Cost Breaking of a Unique Chinese Language CAPTCHA Using Curriculum Learning and Clustering
Submitted by aekwall on Mon, 04/01/2019 - 10:08am
security
learning (artificial intelligence)
low-cost breaking
machine learning methods
microsoft windows
natural language processing
OCR software
optical character recognition
pattern clustering
potential training methods
pubcrawl
Kernel
Task Analysis
text analysis
text distortion
text-based CAPTCHAs focus
Training
transcription tasks
unique Chinese language CAPTCHA
web services
Web sites
curriculum clustering
CAPTCHA
captchas
Chinese language question-and-answer Website
CNN
composability
convolution
convolutional neural network
convolutional neural networks
correct response
automated access
curriculum learning
feature map
feedforward neural nets
Human behavior
human user
image distortion
inverted character
inverted characters
inverted symbols
biblio
Automated Generation and Selection of Interpretable Features for Enterprise Security
Submitted by grigby1 on Fri, 03/22/2019 - 1:00pm
machine learning method
Training data
security of data
security
Scalability
Resiliency
resilience
pubcrawl
pattern clustering
Metrics
malware
malicious activity detection
big data security
learning (artificial intelligence)
Fourier transforms
fourier analysis
feature extraction
enterprise security logs
DNF formulas
cyber security
Clustering algorithms
classifiers
Boolean functions
biblio
Building Trusted Golden Models-Free Hardware Trojan Detection Framework Against Untrustworthy Testing Parties Using a Novel Clustering Ensemble Technique
Submitted by grigby1 on Fri, 03/15/2019 - 11:59am
novel clustering ensemble method
untrustworthy testing party
untrustworthy testing parties
Unsupervised Learning
trusted hardware Trojan detection framework
Trusted Computing
Trojan horses
trojan horse detection
testing stage
testing
robust hardware Trojan detection framework
pubcrawl
pattern clustering
novel clustering ensemble technique
Clustering algorithms
invasive software
integrated circuit testing
Integrated circuit modeling
IC
hardware Trojan detection
Hardware Security
Hardware
golden models-free hardware Trojan detection framework
fabrication process
fabrication
existing hardware Trojan detection
clustering ensemble
biblio
Bit Localization in Least Significant Bit Using Fuzzy C-Means
Submitted by grigby1 on Fri, 02/22/2019 - 4:08pm
Market research
Watermarking
steganography methods
steganography detection
Steganography
Seminars
pubcrawl
PSNR
privacy
pattern clustering
MSE
Metrics
message decryption
mean square error methods
bit localization
LSB\\_FCM
least significant bit
Image Processing
Image edge detection
Image coding
hidden message
fuzzy C-means clustering method
Fuzzy C Means
embedded message
discrete cosine transforms
Cryptography
composability
clustering
biblio
Analytics as a service architecture for cloud-based CDN: Case of video popularity prediction
Submitted by grigby1 on Wed, 01/16/2019 - 2:37pm
CDN logs
video popularity prediction
user generated videos
scattered caches
RESTful Web services
quality of service
prediction services
NoSQL databases
NoSQL database
k-means clustering prediction model
highly variable UGV popularity
end-user content delivery network requests
end-user behaviour
dynamic model training
cloud-based CDN
Cloud Computing
analytics as a service architecture
pattern clustering
web services
Web Caching
cache storage
computer architecture
Training
Streaming media
Scalability
Resiliency
Metrics
pubcrawl
Analytical models
Predictive models
biblio
Edge Caching for Enriched Notifications Delivery in Big Active Data
Submitted by grigby1 on Wed, 01/16/2019 - 2:37pm
caching policies
TTL caching
TTL based caching
Publish-subscribe
pattern clustering
notifications delivery
notification delivery
eviction-based caching
end users
edge caching
distributed broker nodes
declarative subscriptions
data management paradigm
data items
computer science
caching strategies
Big Data
bigdata publish-subscribe system
big active data systems
Big active data
BAD system
backend data cluster
Web Caching
cache storage
Distributed databases
Electronic mail
Task Analysis
Scalability
Resiliency
Metrics
pubcrawl
biblio
Analyst Intuition Inspired High Velocity Big Data Analysis Using PCA Ranked Fuzzy K-Means Clustering with Multi-Layer Perceptron (MLP) to Obviate Cyber Security Risk
Submitted by grigby1 on Wed, 11/14/2018 - 1:21pm
pattern classification
learning (artificial intelligence)
log history annotation
malware
malware attacks
manually labelled data
MLP
Monitoring
Multi-layer Perceptron (MLP)
multilayer perceptrons
network datasets
network protocols
network user
neural network classifier multilayer perceptron base
IP networks
pattern clustering
PCA ranked fuzzy k-means clustering
principal component analysis
Principal Component Analysis (PCA)
pubcrawl
resilience
Resiliency
Scalability
scoring system
security
special semisupervise method
statistical data generation
Virus
cyber threats
analyst intuition inspired high velocity big data analysis
Artificial Intelligence
attacker IP addresses characteristics
Big Data
Clustering algorithms
computer networks
computer network security
computer security
cyber-attacks
cyber security
cyber security expert
cyber security log classification
cyber security risk
Analyst Intuition
data analysis
Data mining
efficient security monitoring system
Expectation Regulated
expert system
expert systems
Fuzzy k-means (FKM)
fuzzy set theory
High Velocity
Human behavior
integrated datasets
invasive software
biblio
Differential Privacy Data Protection Method Based on Clustering
Submitted by grigby1 on Fri, 09/28/2018 - 11:58am
information loss
Scalability
risk reduction
Resiliency
pubcrawl
privacy protection
pattern clustering
numerical attribute
mixed data
Knowledge Discovery
insensitive clustering method
insensitive clustering algorithm
categorical attribute
information disclosure
ICMD-DP method
Human behavior
distributed computing
differential privacy data protection method
differential privacy
data privacy
data availability
composability
clustering
biblio
Cluster-based technique for detection and prevention of black-hole attack in MANETs
Submitted by grigby1 on Wed, 06/20/2018 - 12:31pm
pubcrawl
MANET
Metrics
mobile ad hoc network
mobile ad hoc networks
mobile computing
NS2 simulator
packet delivery ratio
particular node
pattern clustering
PDR
malicious nodes
rapid node mobility
resilience
Resiliency
Routing
Routing protocols
Secure Routing
security
telecommunication security
Throughput
trustworthy security protocol
clustering direction
ad hoc routing
AODV
AODV routing protocol
Attack detection
black-hole attack
black-hole attack detection
black-hole attack prevention
cluster head
Cluster-head
clustering
Ad hoc networks
Compositionality
contagious nodes
Cryptographic Protocols
data packets
data transfer
end to end delay throughput
energy simulation inferences
ETD throughput
fresh route
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »