Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pattern clustering
biblio
Application of Generalized Regression Neural Network in Cloud Security Intrusion Detection
Submitted by grigby1 on Mon, 04/02/2018 - 12:39pm
Metrics
security of data
robots
Resiliency
resilience
regression analysis
pubcrawl
policy-based governance
pattern clustering
pattern classification
neural nets
network intrusion behavior modes
network intrusion
Artificial Neural Networks
learning (artificial intelligence)
Intrusion Detection
intrusion data
Intelligent systems
individual owned invasion category
Hafnium compounds
generalized regression neural network clustering analysis
generalized regression neural network
data training
clustering training samples
cloud security intrusion detection
Cloud Security
biblio
An enhanced three-layer clustering approach and security framework for battlefeld surveillance
Submitted by grigby1 on Wed, 02/21/2018 - 1:41pm
protocol architecture
wireless sensor networks (WSNs)
wireless sensor networks
time division multiple access
three-layer hierarchical clustering approach
three-layer clustering approach
telecommunication security
security mechanism
security framework
security
Routing protocols
Routing
Resiliency
resilience
residual energy routes
pubcrawl
battlefeld surveillance
pattern clustering
network lifetime
military computing
Microelectronic Security
Metrics
malicious node
layered architectures
hierarchical works
hierarchical clustering based approach
hierarchical based formation
Energy Efficiency
energy consumption
EHCA
composability
Clustering algorithms
biblio
Ranking Causal Anomalies by Modeling Local Propagations on Networked Systems
Submitted by grigby1 on Thu, 02/15/2018 - 11:47am
matrix factorization
Time series analysis
system failure status
single fault propagation
security of data
Resiliency
resilience
pubcrawl
Probabilistic logic
probabilistic clustering
pattern clustering
networked systems
multiple fault diagnosis
Monitoring
Metrics
causal anomaly detection
low-rank network diffusion model
large-scale complex systems
invariant network
Indexes
Human Factors
human factor
Human behavior
global fault propagation
fault diagnosis
debugging
complex systems
complex system behaviors
Clustering algorithms
biblio
Target Tracking Optimization of UAV Swarms Based on Dual-Pheromone Clustering
Submitted by grigby1 on Tue, 02/06/2018 - 2:05pm
surveillance result propagation
Aircraft
wireless communication interface
Unmanned Aerial Vehicles
UAV swarm
UAV network connectivity
temporarily invisible targets
target tracking optimization
target tracking
target detection
ant colony optimisation
surveillance mission
surveillance
stable overlay network
Resiliency
repulsive pheromones
object detection
reconnaissance mission
pubcrawl
pattern clustering
data sharing
Network reconnaissance
multihop clustering
multi-robot systems
map coverage performance
dual-pheromone clustering hybrid approach
dual-pheromone ant-colony model
DPCHA
disappearing target model
autonomous aircraft
autonomous aerial vehicles
coverage fairness
connection volatility
communication range
collaborative swarm
Clustering algorithms
cluster stability
Base stations
attractive pheromones
Atmospheric modeling
biblio
DDoS attack detection approach using an efficient cluster analysis in large data scale
Submitted by grigby1 on Tue, 01/16/2018 - 6:25pm
network security
genuine network flow identification
host-based resources
Human behavior
Intrusion Detection
intrusion detection system
large data scale
legitimate users
Metrics
network resources
flooding attack packets
packets windowing
pattern clustering
Phi coefficient
pubcrawl
Resiliency
resource allocation
Shape
unsupervised data mining
wireless sensor networks
CURE
CAIDA2008 datasets
cluster analysis
clustering
Clustering algorithms
clustering using representative
composability
Computer crime
computer network security
congestion-based attack
CAIDA2007 datasets
DARPA2000 datasets
Data mining
DDoS attack detection
detection rate
Distributed Denial of Service (DDoS)
distributed denial of service attack
Entropy
F measure
false alarm rate
biblio
Towards a neural language model for signature extraction from forensic logs
Submitted by K_Hooper on Wed, 01/10/2018 - 11:14am
natural language text
use cases
text analysis
Software
signature extraction frameworks
Scalability
rule-based systems
rule-based approaches
Resiliency
pubcrawl
Predictive models
pattern clustering
nonmutable part identification
Neural networks
neural nets
neural language model
Clustering algorithms
natural language processing
log message
log line clustering
learning (artificial intelligence)
knowledge based systems
Human behavior
Heuristics
handcrafted algorithms
Forensics
forensic log analysis
error-prone
Digital Forensics
data analysis
complex relationship learning
biblio
A quantitative and qualitative analysis of tensor decompositions on spatiotemporal data
Submitted by grigby1 on Thu, 12/28/2017 - 1:17pm
pattern detection
Urban areas
tensors
tensor model
tensor decompositions
Tensile stress
Spatiotemporal phenomena
spatiotemporal data analysis
Spatial resolution
quantitative analysis
qualitative analysis
Public transportation
pubcrawl
Anomaly Detection
pattern clustering
Metrics
Matrix decomposition
Indexes
high-dimensional data analysis technique
GPS data
georeferenced data sets
geographic information systems
decomposition
data analysis
convergence
Compositionality
biblio
Insider Threat Detection Through Attributed Graph Clustering
Submitted by grigby1 on Tue, 12/12/2017 - 1:23pm
Insider Threats
trusted source
security of data
security
Resiliency
pubcrawl
psychology
policy-based governance
pattern clustering
outlier ranking mechanism
Organizations
organizational dynamics
network analysis
Metrics
malicious insider access
malicious attacker unpredictability
Anomaly Detection
Insider Threat Detection
Human Factors
Human behavior
heterogeneous data analysis
graph theory
enterprise users
Electronic mail
data analysis
cybersecurity threats
collaboration
Clustering algorithms
business data processing
Bipartite graph
attributed graph clustering
biblio
The Unreasonable Effectiveness of Address Clustering
Submitted by grigby1 on Fri, 11/03/2017 - 11:33am
merging
Upper bound
transaction microstructure
Size measurement
security of data
Scalability
Resiliency
pubcrawl
Protocols
pattern clustering
Online banking
one-to-many mapping
address clustering
financial data processing
electronic money
Electronic mail
cryptocurrency
blockchain security
blockchain
Bitcoin system
bitcoin
Bipartite graph
address reuse
biblio
Entropy clustering approach for improving forecasting in DDoS attacks
Submitted by grigby1 on Tue, 03/07/2017 - 1:44pm
pattern clustering
forecasting theory
FPR
IDS
intrusion detection system
k-means clustering analysis
network analysis
network security
online anomaly detection
forecasting
Ports (Computers)
proactive forecast
project industrial partner
pubcrawl170109
Shannon entropy
Shannon-entropy concept
volume anomaly
alert management
feature extraction
false positive rate
entropy clustering approach
Entropy
distributed denial-of-service (DDoS) detection
distributed denial-of-service
Digital Forensics
digital forensic analysis
DDoS Attacks
cyber-range simulation dataset
computer network security
Computer crime
Clustering algorithms
clustering algorithm
Algorithm design and analysis
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »