Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Clustering algorithms
biblio
Analysis of Learning Modalities Towards Effective Undergraduate Cybersecurity Education Design
Submitted by grigby1 on Tue, 05/25/2021 - 2:34pm
Classification algorithms
Clustering algorithms
computer security
cyber education
cyber physical systems
cybersecurity education
education
Intelligence augmented education
machine learning algorithms
privacy
pubcrawl
Python
Tailored education
VARK learning styles
biblio
Improving Cellular IoT Security with Identity Federation and Anomaly Detection
Submitted by grigby1 on Tue, 05/25/2021 - 2:20pm
Cross Layer Security
Adaptation models
Anomaly Detection
Clustering algorithms
composability
Data models
IoT security
machine learning
mobile network security
Partitioning algorithms
pubcrawl
resilience
Resiliency
security
biblio
Robust Cross-Layer Security Framework For Internet of Things Enabled Wireless Sensor Networks
Submitted by grigby1 on Tue, 05/25/2021 - 2:18pm
man-in-middle attack
wireless sensor networks
security
Robustness
Resiliency
resilience
pubcrawl
Physical layer
Monitoring
Cross Layer Security
Internet of Things
Energy Efficiency
cross-layer technique
composability
Clustering algorithms
clustering
attacker
biblio
Network Attack Surface Simplification for Red and Blue Teams
Submitted by aekwall on Thu, 05/13/2021 - 11:34am
Organizations
Resiliency
pubcrawl
Metrics
Shape
tools
Clustering algorithms
Complexity theory
Scalability
Software algorithms
Surface treatment
attack surface
cluster analysis
Network Attack Surface
biblio
A Security Situation Prediction Method Based on Improved Deep Belief Network
Submitted by aekwall on Tue, 04/27/2021 - 1:09pm
security
cyber-physical systems
Resiliency
pubcrawl
Sociology
Statistics
Prediction algorithms
Clustering algorithms
Communication networks
Predictive models
Deep Belief Network
belief networks
Active Defense
electricity information network
security situation prediction
biblio
An Improvement of Apriori Mining Algorithm using Linked List Based Hash Table
Submitted by aekwall on Mon, 03/29/2021 - 12:06pm
hash algorithms
LinkedList
linked list
Itemsets
improved apriori algorithm
Improved
important algorithms
Frequent item sets
frequent 1-item sets counts
find frequent item sets
association rules
apriori mining algorithm
apriori
Organizations
hash table
memory space
Compositionality
database management systems
pubcrawl
Random access memory
Data mining
Clustering algorithms
Databases
Resiliency
Classification algorithms
biblio
F-DPC: Fuzzy Neighborhood-Based Density Peak Algorithm
Submitted by aekwall on Mon, 03/22/2021 - 1:11pm
expandability
neighborhood membership
local density
fuzzy neighborhood-based density peak algorithm
fuzzy neighborhood relationship
fuzzy neighborhood density peak clustering
fuzzy neighborhood
F-DPC
degree of membership
Compositionality
Partitioning algorithms
data objects
Classification algorithms
Heuristic algorithms
pattern clustering
fuzzy set theory
Data mining
clustering
Clustering algorithms
Shape
Robustness
Licenses
pubcrawl
Resiliency
biblio
Clustering Based Incident Handling For Anomaly Detection in Cloud Infrastructures
Submitted by aekwall on Mon, 03/01/2021 - 4:48pm
NSL-KDD
work factor metrics
run time metrics
nonclustering based algorithm
local outlier factor(LOF)
Kmeans
Isolation Forest algorithm
isolation forest
incident handling model
f-score
decision based approach
DBSCAN
clustering based algorithm
cloud infrastructures
anomaly detection mechanisms
Anomaly
security of data
cloud
Cloud Security
pattern clustering
Data mining
Anomaly Detection
Clustering algorithms
Prediction algorithms
pubcrawl
Resiliency
Protocols
Servers
Scalability
Cloud Computing
Monitoring
biblio
HAC-T and Fast Search for Similarity in Security
Submitted by aekwall on Mon, 02/22/2021 - 1:43pm
nearest neighbor search
Trend Locality Sensitive Hashing (TLSH)
tree-based index
tools
threshold based hierarchical agglomerative clustering algorithm
standards
similarity digests
security operations center operators
security of data
security analysts
security
search problems
pubcrawl
Predictive Metrics
nearest neighbour methods
Approximate Nearest Neighbour
Measurement
malware
Indexes
Hierarchical Agglomerative Clustering (HAC)
HAC-T
Fuzzy Hashing
fast nearest neighbor search techniques
Cryptography
computer viruses
clustering technique
Clustering algorithms
clustering
cluster quality
cluster malware
biblio
Anomalous IP Address Detection on Traffic Logs Using Novel Word Embedding
Submitted by aekwall on Mon, 02/22/2021 - 1:41pm
natural language processing
word embedding-based feature extraction
word embedding techniques
word embedding
vanilla word embeddings
telecommunication traffic
security of data
security
Scalability
Resiliency
representative features
pubcrawl
network traffic logs
anomalous IP address detection algorithm
machine learning-based anomaly detection
Log Mining
Linear programming
learning (artificial intelligence)
IP networks
IP addresses
Human behavior
feature extraction
detection performance
Clustering algorithms
Anomaly Detection
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »