Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
feature extraction
biblio
Detecting anomalies in Online Social Networks using graph metrics
Submitted by grigby1 on Wed, 03/08/2017 - 2:02pm
Measurement
structural characteristic analysis
Stars
social networking (online)
Social network services
security of data
Regression
pubcrawl170111
personalized user profile
online social networks
Oddball algorithm
Anomaly
Image edge detection
graph theory
graph metrics
Fitting
feature extraction
Curve fitting
Cliques
Brokerage
anomaly activity detection
biblio
Entropy clustering approach for improving forecasting in DDoS attacks
Submitted by grigby1 on Tue, 03/07/2017 - 1:44pm
pattern clustering
forecasting theory
FPR
IDS
intrusion detection system
k-means clustering analysis
network analysis
network security
online anomaly detection
forecasting
Ports (Computers)
proactive forecast
project industrial partner
pubcrawl170109
Shannon entropy
Shannon-entropy concept
volume anomaly
alert management
feature extraction
false positive rate
entropy clustering approach
Entropy
distributed denial-of-service (DDoS) detection
distributed denial-of-service
Digital Forensics
digital forensic analysis
DDoS Attacks
cyber-range simulation dataset
computer network security
Computer crime
Clustering algorithms
clustering algorithm
Algorithm design and analysis
biblio
Multi-scale wavelet kernel extreme learning machine for EEG feature classification
Submitted by grigby1 on Tue, 03/07/2017 - 1:42pm
learning (artificial intelligence)
wavelet transforms
Training
Support vector machines
signal classification
pubcrawl170109
multiscale wavelet kernel extreme learning machine classifier
multi-scale wavelet kernel
medical signal processing
Accuracy
Kernel
feature extraction
ELM
electroencephalography
electroencephalographic signal feature classification
EEG feature classification
EEG classification
Classification algorithms
biblio
P2V: Effective Website Fingerprinting Using Vector Space Representations
Submitted by grigby1 on Tue, 03/07/2017 - 1:40pm
online activists
word vector representations
Web sites
Web site fingerprinting attack
Web pages
Web page destination
VSM
vector space representations
users navigation privacy
Servers
real-valued vector
pubcrawl170109
passive traffic analysis attack
packet to vector approach
P2V
anonymous communication
natural language processing
Mathematical model
machine learning
learning (artificial intelligence)
language vector space models
Internet users
Fingerprint recognition
features extraction
feature extraction
data privacy
cyber security
Context
Computer crime
Computational modeling
biblio
Cloud-based Android botnet malware detection system
Submitted by grigby1 on Tue, 03/07/2017 - 1:37pm
feature extraction
Vyatta
smart phones
Servers
runtime Android malware analysis
pubcrawl170109
open source development framework
multilayered algorithm
malware
Java
invasive software
Humanoid robots
Android (operating system)
digital crime groups
Cloud-based malware detection
cloud-based Android botnet malware detection system
Cloud Computing
Classification algorithms
botnet detection learning dataset
Androids
Android Sandbox
Android on VirtualBox
Android botnet family detection
Android botnet
biblio
"P2V: Effective Website Fingerprinting Using Vector Space Representations"
Submitted by grigby1 on Thu, 02/23/2017 - 12:45pm
natural language processing
word vector representations
Web sites
Web site fingerprinting attack
Web pages
Web page destination
VSM
vector space representations
users navigation privacy
Servers
real-valued vector
pubcrawl
passive traffic analysis attack
packet to vector approach
P2V
online activists
anonymous communication
Mathematical model
machine learning
learning (artificial intelligence)
language vector space models
Internet users
Fingerprint recognition
features extraction
feature extraction
data privacy
cyber security
pubcrawl170105
Context
Computer crime
Computational modeling
biblio
"Towards Making Systems Forget with Machine Unlearning"
Submitted by grigby1 on Thu, 02/23/2017 - 12:32pm
machine learning algorithms
usability perspective
Training data
summation form
statistical query learning
security perspective
security of data
recommender systems
recommendation engine
pubcrawl170105
pubcrawl
privacy risks
machine unlearning
Adversarial Machine Learning
Learning systems
learning (artificial intelligence)
forgetting systems
Forgetting System
Feature Selection
feature modeling
feature extraction
data privacy
Data models
data lineage
Computational modeling
complex data propagation network
biblio
"Reconstruction-free inference on compressive measurements"
Submitted by grigby1 on Tue, 02/21/2017 - 1:10pm
Image reconstruction
SWIR
subNyquist sampling rates
SPC
spatial-multiplexing cameras
single-pixel camera
signal-to-noise ratios
short-wave infrared region
reconstruction-free inference
pubcrawl170104
pseudorandom spatial masks
nonlinear feature extraction
inference mechanisms
imaging devices
action recognition
Image coding
high-level visual inference problems
high-dimensional signals
feature extraction
face recognition
Face
Databases
correlational features
Correlation
compressive measurements
compressive cameras
coded measurements
Cameras
biblio
"Visual tracking based on compressive sensing and particle filter"
Submitted by grigby1 on Tue, 02/21/2017 - 12:37pm
particle filter
visual tracking
target tracking
Sparse matrices
random projection
pubcrawl170104
pose variation
Particle filters
particle filtering (numerical methods)
Classification algorithms
image filtering
image classification
illumination variation
filtering algorithms
feature extraction
compressive sensing theory
compressed sensing
biblio
"A New Static Detection Method of Malicious Document Based on Wavelet Package Analysis"
Submitted by abfox on Tue, 02/14/2017 - 2:18pm
malware
zero-day exploit
wavelet transforms
wavelet transform
wavelet package analysis
wavelet analysis
static detection method
pubcrawl170101
Portable document format
persistent threat attacks
Compounds
malicious program
malicious document detection system
malicious document detection
malicious code
invasive software
infected compound document
feature extraction
entropy analysis componen
document handling
« first
‹ previous
…
80
81
82
83
84
85
86
87
88
next ›
last »