Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Inference Detection
biblio
A Hybrid Machine Learning and Data Mining Based Approach to Network Intrusion Detection
Submitted by aekwall on Wed, 03/23/2022 - 8:22am
network intrusion detection
k-nearest neighbors
Inference Detection
support vector machine
intrusion
Naive Bayes
Network interfaces
Predictive Metrics
Decision trees
Support vector machines
Decision Tree
testing
composability
Resiliency
pubcrawl
machine learning
Training
biblio
A unified model for cherishing privacy in database system an approach to overhaul vulnerabilities
Submitted by BrandonB on Thu, 04/30/2015 - 2:01pm
Inference Detection
security policy
security of data
security
privacy cherished database architecture model
intrusion tolerance subsystem
intrusion thwarting
Intrusion Detection
inference thwarting
data privacy
Handheld computers
Decision support systems
database system privacy
database static protection
Database Security Configurations
Database Security
database management systems
biblio
A unified model for cherishing privacy in database system an approach to overhaul vulnerabilities
Submitted by BrandonB on Thu, 04/30/2015 - 2:01pm
Inference Detection
security policy
security of data
security
privacy cherished database architecture model
intrusion tolerance subsystem
intrusion thwarting
Intrusion Detection
inference thwarting
data privacy
Handheld computers
Decision support systems
database system privacy
database static protection
Database Security Configurations
Database Security
database management systems
biblio
A unified model for cherishing privacy in database system an approach to overhaul vulnerabilities
Submitted by BrandonB on Thu, 04/30/2015 - 2:01pm
Inference Detection
security policy
security of data
security
privacy cherished database architecture model
intrusion tolerance subsystem
intrusion thwarting
Intrusion Detection
inference thwarting
data privacy
Handheld computers
Decision support systems
database system privacy
database static protection
Database Security Configurations
Database Security
database management systems