Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pattern clustering
biblio
Scalable Security Event Aggregation for Situation Analysis
Submitted by grigby1 on Tue, 03/07/2017 - 1:43pm
scalable security event aggregation
on-demand aggregation
parallel processing
pattern clustering
performance evaluation
periodic aggregation
pubcrawl170109
query languages
query support
large-scale data processing
SEAS-MR
security
security analytics
Security event aggregation
security event aggregation system over MapReduce
sensors
situation analysis
stealthy hacking processes
Computer crime
Aggregates
Analytical models
APT
attack methodologies
Big Data
big-data analytics
big-data computing
big-data security analytics
advanced persistent threats
Computers
cyber-attacks
data analysis
Data processing
Database languages
Hadoop cluster
high-level query languages
large-scale data analysis
biblio
Fuzzy clustering of incomplete data based on missing attribute interval size
Submitted by grigby1 on Mon, 02/27/2017 - 12:53pm
interval data set
TICI data set
standards
similar object cluster identification
pubcrawl170107
Prototypes
pattern clustering
nearest neighbor rule
missing attribute interval size
Iris
Interval size
interval median
Algorithm design and analysis
incomplete data clustering
Incomplete Data
fuzzy set theory
fuzzy clustering
fuzzy c-means algorithm
Fuzzy C-Means
data structures
data handling
Clustering algorithms
Breast
biblio
"Securing the Clustered Database Using Data Modification Technique"
Submitted by grigby1 on Thu, 02/23/2017 - 12:02pm
Distributed databases
weka tool
standards
security of data
security
pubcrawl
Privacy preserving protocols
pattern clustering
online media
Iris
information protection
clustering
Distributed Database
distributed clustered database environments
database clustering
Data protection
pubcrawl170105
data privacy
data modification
Data mining
computer science
biblio
"On segmentation of CS reconstructed MR images"
Submitted by grigby1 on Tue, 02/21/2017 - 1:02pm
pubcrawl170104
low-measurement space
magnetic resonance image reconstruction
medical image processing
MR Images
Noise
noise reduction
noise removal
pattern clustering
performance improvement
image segmentation
random noise injection
Segmentation
sharpen MR image segmentation
spatial domain denoising
Transforms
unobserved space
weighted entropy values
weighted linear prediction
weighted variance values
edge enhancement
adaptive recursive filtering
approximate subband suppression
biomedical MRI
compressed sensing
compressive sampling
CS reconstructed MR image segmentation
curvelet transform
curvelet transforms
edge detection
adaptive filters
Entropy
GA-based clustering
genetic algorithms
hard thresholding
image denoising
Image edge detection
image enhancement
Image reconstruction
biblio
"Scalable Security Event Aggregation for Situation Analysis"
Submitted by abfox on Tue, 02/14/2017 - 1:43pm
scalable security event aggregation
large-scale data processing
on-demand aggregation
parallel processing
pattern clustering
performance evaluation
periodic aggregation
pubcrawl170101
query languages
query support
large-scale data analysis
SEAS-MR
security
security analytics
Security event aggregation
security event aggregation system over MapReduce
sensors
situation analysis
stealthy hacking processes
big-data security analytics
advanced persistent threats
Aggregates
Analytical models
APT
attack methodologies
Big Data
big-data analytics
big-data computing
advanced persistent threat
Computer crime
Computers
cyber-attacks
data analysis
Data processing
Database languages
Hadoop cluster
high-level query languages
biblio
"Scalable command and control detection in log data through UF-ICF analysis"
Submitted by abfox on Tue, 02/14/2017 - 1:13pm
fixed user agent string
UF-ICF analysis
scalable command-and-control detection
pubcrawl170101
pattern clustering
normal user
networking logs
malware
log data
IP networks
IP addresses
invasive software
intrusion prevention systems
information security
information filtering
Frequency modulation
advanced persistent threat
filtering methods
domain names
Decision support systems
coverage rate
connection behaviors
computer network security
command and control systems
Command and Control (C&C)
clustering methods
C&C sites
C&C server detection
botnet
benign service
APT
antivirus software
biblio
Autonomic Intelligent Cyber-Sensor to Support Industrial Control Network Awareness
Submitted by BrandonB on Wed, 05/06/2015 - 1:55pm
PERL
meta data
metadata access point external communication layer
mixed-use test network
Network interfaces
network security
network security sensor
networked industrial ecosystem
pattern clustering
legacy software
proof of concept prototype
self-managed framework
service oriented architecture
service-oriented architecture
simple object access protocol-based interface
SOAP-based interface
traffic monitor
virtual network hosts
field buses
anomaly detection algorithm
Autonomic computing
autonomic intelligent cyber-sensor
C++
computer network security
control systems
digital device proliferation
fault tolerant computing
access protocols
flexible two-level communication layer
Fuzzy logic
IF-MAP
industrial control
industrial control network awareness
industrial ecosystems
Intelligent sensors
internal D-Bus communication mechanism
biblio
Autonomic Intelligent Cyber-Sensor to Support Industrial Control Network Awareness
Submitted by BrandonB on Wed, 05/06/2015 - 9:53am
PERL
meta data
metadata access point external communication layer
mixed-use test network
Network interfaces
network security
network security sensor
networked industrial ecosystem
pattern clustering
legacy software
proof of concept prototype
self-managed framework
service oriented architecture
service-oriented architecture
simple object access protocol-based interface
SOAP-based interface
traffic monitor
virtual network hosts
field buses
anomaly detection algorithm
Autonomic computing
autonomic intelligent cyber-sensor
C++
computer network security
control systems
digital device proliferation
fault tolerant computing
access protocols
flexible two-level communication layer
Fuzzy logic
IF-MAP
industrial control
industrial control network awareness
industrial ecosystems
Intelligent sensors
internal D-Bus communication mechanism
biblio
Terms Mining in Document-Based NoSQL: Response to Unstructured Data
Submitted by BrandonB on Tue, 05/05/2015 - 1:30pm
document-based NoSQL
Viterbi algorithm
unstructured data storage
Unstructured Data Mining
topics mining
text analysis
terms mining
terms
term classification
Semantics
pattern clustering
pattern classification
NoSQL database
NoSQL
analytics-as-a-service framework
document handling
Dictionaries
Databases
database management systems
data mining techniques
Data mining
clustering
Classification algorithms
classification
Big Data
Big Bata
association rules
biblio
Semantic Properties of Customer Sentiment in Tweets
Submitted by BrandonB on Tue, 05/05/2015 - 1:27pm
textual documents
Semantics
sentiment analysis
social networking (online)
tagging
text analysis
text analytics
Text Mining
textual data semantic properties
retail data processing
topic modeling
topic modeling algorithm
tweet analysis
tweet semantic patterns
Twitter
US retail companies
Vectors
Business
pattern clustering
part-of-speech tagging
online social networking services
Media
latent Dirichlet allocation
K-means clustering methods
document similarity
Data mining
customer sentiment semantic properties
cosine similarity
Correlation
consumer sentiment polarities
consumer opinions
consumer behaviour
clustering
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »