Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Clustering algorithms
biblio
CryingJackpot: Network Flows and Performance Counters against Cryptojacking
Submitted by grigby1 on Wed, 02/10/2021 - 1:11pm
Data mining
performance counters
cryptojacking
network flows
security analytics
Clustering algorithms
clustering
Task Analysis
malware
feature extraction
Intrusion Detection
Cryptography
Resiliency
resilience
Metrics
Human behavior
pubcrawl
Servers
biblio
Differential Privacy Information Publishing Algorithm based on Cluster Anonymity
Submitted by grigby1 on Thu, 01/28/2021 - 2:01pm
differential privacy information publishing algorithm
Running efficiency
Resiliency
resilience
Publishing
pubcrawl
privacy budget
pattern clustering
Metrics
internet technology
Internet of Things
internet
information loss
Human behavior
anonymity
differential privacy
data privacy
composability
Complexity theory
complex background knowledge
clustering anonymity
Clustering algorithms
clustering
cluster anonymity
Big Data
background attack
Artificial Intelligence
anonymous
biblio
Enhanced p-Sensitive k-Anonymity Models for Achieving Better Privacy
Submitted by grigby1 on Thu, 01/28/2021 - 1:59pm
Metrics
skew attacks
sensitive groups
sensitive attacks
Resists
Resiliency
resilience
Publishing
pubcrawl
Privacy Requirements
privacy
personalized protection characteristic
personalized privacy protection
Partitioning algorithms
one size fits all unified privacy protection level
anonymity
Human behavior
homogeneous attacks
faces
enhanced p-sensitive k-anonymity models
enhanced anonymous models
data utility
data publishing
data privacy
Data models
data anonymity
composability
Clustering algorithms
clustering
biblio
Differential Privacy Algorithm Based on Personalized Anonymity
Submitted by grigby1 on Thu, 01/28/2021 - 1:58pm
pattern classification
tuple personality factor classification value
security of data
Resiliency
resilience
quasiidentifier attribute
Publishing
pubcrawl
privacy protection relevance
privacy
personalized k-anonymity model
personalized anonymity
anonymity
Metrics
Human behavior
existing anonymized differential privacy
differential privacy data publishing algorithm
differential privacy
Data protection
Data models
composability
Clustering algorithms
Classification algorithms
biblio
Pattern Extraction for Behaviours of Multi-Stage Threats via Unsupervised Learning
Submitted by grigby1 on Fri, 01/22/2021 - 1:39pm
Training data
pattern extraction
multistage threats
Multi-stage threats
malicious behaviour
Log-files Analysis
heterogeneous log-files
Cyber Threats Intelligence
Behaviour Analysis
advanced persistent threats
pattern clustering
Clustering algorithms
APT
advanced persistent threat
security of data
Cybersecurity
Scalability
Correlation
Resiliency
resilience
Metrics
Human behavior
pubcrawl
IP networks
Unsupervised Learning
data analysis
Anomaly Detection
feature extraction
biblio
Monitoring Algorithm in Malicious Vehicular Adhoc Networks
Submitted by grigby1 on Mon, 12/28/2020 - 1:02pm
Monitoring
vehicular ad hoc networks
VANET
threshold value
security
Safety
resilience
pubcrawl
privacy
MANET security
malicious vehicle detection
distrust value
Clustering algorithms
authentication
ad hoc network
Compositionality
Metrics
Resiliency
biblio
A Study of Big Data Security on a Partitional Clustering Algorithm with Perturbation Technique
Submitted by grigby1 on Mon, 12/28/2020 - 12:40pm
parallel processing
security of data
security
Scalability
Resiliency
resilience
pubcrawl
privacy preserving
principal component analysis
Precision
perturbation technique
Perturbation methods
PCA
pattern clustering
Partitioning algorithms
partitional clustering algorithm
Accuracy
Metrics
Human behavior
HDFS
Hadoop distributed file system
F-Socre Measure
execution time
Distributed databases
data privacy
Conferences
Clustering Tme
Clustering algorithms
big data security
big data privacy
Big Data
biblio
User Credibility Assessment Based on Trust Propagation in Microblog
Submitted by grigby1 on Wed, 12/02/2020 - 2:15pm
online social network
user social relationship graph
user credibility assessment
Uniform resource locators
two-way propagation trust scoring
trustworthiness-based user credibility evaluation algorithm
Trusted Computing
trust propagation
trust
social networking (online)
Social network services
seed node selection algorithm
pubcrawl
pruning algorithm
optimisation
online social networking platform
Clustering algorithms
network topology
microblog user credibility evaluation algorithm
Microblog platform
microblog
Manuals
malicious users
low trusted user
Human Factors
Human behavior
graph theory
feature extraction
Fans
false social relationships
Computing Theory
biblio
High-Quality Fault-Resiliency in Fat-Tree Networks (Extended Abstract)
Submitted by grigby1 on Wed, 12/02/2020 - 2:01pm
massive topology degradation
fabric management
Fabrics
fast deterministic routing algorithm
fat tree
Fat-tree networks
Fault resiliency
forwarding tables
high-quality fault-resiliency
high-quality routing tables
HPC systems
InfiniBand control software
interconnection networks
large-scale HPC clusters
equipment failure
modulo-based computation
near-optimal SP congestion risk
OpenSM
optimized routing algorithms
Parallel Generalized Fat-Trees
PGFT
pre-modulo division
random degradation
random permutation
routing tables
RP congestion
shift permutation
network topology
resilience
Resiliency
Scalability
fault tolerant computing
Topology
Routing
telecommunication network routing
telecommunication traffic
Runtime
parallel processing
trees (mathematics)
computer networks
pubcrawl
optimisation
static analysis
Clustering algorithms
telecommunication network topology
Degradation
HPC
coupled congestion control
A2A congestion
all-to-all traffic patterns
congestion risk
coupling regular topologies
Dmodc
biblio
Research of Personalized Recommendation Algorithm Based on Trust and User's Interest
Submitted by grigby1 on Tue, 12/01/2020 - 1:36pm
pubcrawl
Videos
user interest
trustworthyness model
Trusted Computing
trust similarity
trust
sparse subspace clust algorithm
social networking (online)
robust trust
Robot Trust
Resiliency
resilience
recommender systems
Accuracy
Prediction algorithms
personalized recommendation algorithm
pattern clustering
online video site
Motion pictures
joint interest-content recommendation
Human Factors
Human behavior
History
filtering algorithms
collaboration
Clustering algorithms
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »