Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Clustering algorithms
biblio
DOS and Brute Force Attacks Faults Detection Using an Optimised Fuzzy C-Means
Submitted by grigby1 on Fri, 09/04/2020 - 3:37pm
DOS brute force attacks faults detection
brute force attacks
Subtractive Clustering
specialised MIB dataset
SNMP-MIB variables
SNMP-MIB parameter datasets
SFCM method
optimised fuzzy c-means
network performance
network issues
Network Fault Attacks
MIB feature
Management information base
Fuzzy Cluster Means
Fault Clustering
Servers
computer networks
computer network systems
clustering methods
Clustering algorithms
fault detection
policy-based governance
Human Factors
network administrators
fuzzy set theory
Force
pubcrawl
Protocols
computer network security
biblio
Research on Security Self-defense of Power Information Network Based on Artificial Intelligence
Submitted by grigby1 on Thu, 08/13/2020 - 5:06pm
power system
artificial intelligence security
self-defense research
self-defense
power information network security
network security attack
defense drills
security level
Clustering algorithms
power system stability
Monitoring
network security
information networks
Communication networks
power system security
power engineering computing
electricity
computer network security
pubcrawl
Artificial Intelligence
biblio
An Online System Dependency Graph Anomaly Detection based on Extended Weisfeiler-Lehman Kernel
Submitted by aekwall on Mon, 07/06/2020 - 10:14am
Compositionality
Cyber Dependencies
Weisfeiler-Lehman graph kernel
System dependency graph
streamspot
simHash
online system dependency graph anomaly detection
multitasking systems
multiprogramming
modern operating systems
locality-sensitive hashing
graph similarity
extended Weisfeiler-Lehman kernel
embedding and clustering of heterogeneous graphs
dependency graph
clustering analysis
Intrusion Detection
Human Factors
pattern clustering
Forensics
Anomaly Detection
Clustering algorithms
standards
Metrics
graph theory
pubcrawl
Resiliency
Kernel
Task Analysis
Scalability
security of data
biblio
A PSO clustering based RFID middleware
Submitted by aekwall on Mon, 06/01/2020 - 10:48am
policy-based governance
security of data
security
RFID middleware
Resiliency
resilience
radiofrequency identification
radio frequency identification
pubcrawl
PSO clustering scheme
PSO clustering
Acceleration
particle swarm optimization
particle swarm optimisation
middleware security
middleware
Data Security
data availability
convergence
composability
Clustering algorithms
Birds
biblio
K-nearest Neighbor Search by Random Projection Forests
Submitted by grigby1 on Fri, 05/22/2020 - 2:38pm
Clustering algorithms
Vegetation
tree-based methodology
rpForests
random projection forests
multicore computers
kNN search
kNN distances
exponential decay
ensemble size
ensemble random projection trees
ensemble methods
Ensemble
clustered computers
nearest neighbor search
k-nearest neighbor search
learning (artificial intelligence)
search problems
computational complexity
k-nearest neighbors
nearest neighbour methods
Measurement
Metrics
Big Data
random forests
pubcrawl
Unsupervised Learning
Forestry
Data mining
machine learning algorithms
machine learning
biblio
Indexing in k-Nearest Neighbor Graph by Hash-Based Hill-Climbing
Submitted by grigby1 on Fri, 05/22/2020 - 2:25pm
file organisation
nearest neighbor search
vector quantization
Upper bound
SIFT1M datasets
query assignment process
nearest neighbor graph
k-nearest neighbor graph
Inverted index
indexing
hill-climbing
hashing-based seed generation
hashing
hash-based hill-climbing
GIST1M datasets
pubcrawl
Euclidean distance
Binary codes
approximation theory
approximate nearest neighbor search
query processing
Clustering algorithms
principal component analysis
graph theory
Acceleration
search problems
nearest neighbour methods
Measurement
Metrics
Indexes
biblio
Network Intrusion Detection Using Improved Genetic k-means Algorithm
Submitted by aekwall on Mon, 05/11/2020 - 11:12am
k-means++ algorithm
Training
Time complexity
Resiliency
pubcrawl
Prediction algorithms
personal privacy theft
pattern clustering
Partitioning algorithms
network intrusion detection
network intrusion
Metrics
KDD-99 dataset
KDD-99
Clustering algorithms
intrusion detection system
Intrusion Detection
internet
IGKM algorithm
IGKM
Genetics
genetic k-means algorithm
genetic algorithms
data privacy
computer network security
computer network
composability
biblio
Anomaly Detection using Graph Neural Networks
Submitted by grigby1 on Fri, 05/08/2020 - 2:43pm
security of data
Neural networks
pattern classification
pattern clustering
Peer-to-peer computing
policy-based governance
pubcrawl
Resiliency
security
Neural Network Security
social connection graphs
social network
social network statistical measures
social networking (online)
statistical analysis
Twitter
Twitter dataset
Twitter network
email network
Artificial Neural Networks
classification
clustering
Clustering algorithms
collaboration
cyber physical systems
deep learning
deep neural networks
Anomaly Detection
Enron dataset
Graph Neural Network
graph neural networks
graph structure
graph theory
learning (artificial intelligence)
Metrics
neural nets
biblio
An Improved Privacy Protection Method Based on k-degree Anonymity in Social Network
Submitted by aekwall on Mon, 04/20/2020 - 10:31am
Metrics
structural modifications
social networking (online)
social network
Publishing
pubcrawl
privacy protection
privacy models and measurement
privacy
pattern clustering
original social network
node degrees
network theory (graphs)
network structure stable
network nodes
anonymity
Mathematical model
Loss measurement
k-subgraph method
k-degree anonymous graph
k-degree anonymity
k-anonymity
information losses
information loss
improved privacy protection method
graph theory
data privacy
computer security
Clustering algorithms
anonymity models
biblio
Distributed Threat Intelligence Sharing System: A New Sight of P2P Botnet Detection
Submitted by aekwall on Mon, 04/06/2020 - 10:14am
Human Factors
Threat intelligence sharing
threat intelligence
telecommunication traffic
standards
security
Scalability
Resiliency
pubcrawl
Peer-to-peer computing
peer-to-peer botnet detection
peer to peer security
P2P botnet detection
network traffic analysis
Metrics
invasive software
botnets
Hidden Markov models
evaluating system
distributed threat intelligence sharing system
distributed methods
distributed cyber threat
distributed botnet
cyberspace security
Cyberspace
computer network security
Clustering algorithms
botnet
BAV quantitative TI model
analytic hierarchy process
AHP and HMM based analysis algorithm
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »