Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mutual information
biblio
Dendritic Cell Algorithm Enhancement Using Fuzzy Inference System for Network Intrusion Detection
Submitted by aekwall on Mon, 01/20/2020 - 11:55am
genetic algorithms
TSK+ fuzzy inference system
TSK+
Statistics
Sociology
Resiliency
pubcrawl
pattern classification
pathogenic associated molecular pattern
network intrusion detection
Mutual information
Intrusion Detection Systems
immune-inspired classification algorithm
Immune system
Anomaly Detection
Fuzzy sets
fuzzy reasoning
Fuzzy logic
Fuzzy inference systems
feature extraction
dendritic cell algorithm enhancement
Dendritic cell algorithm
danger theory
computer networks
computer network security
composability
artificial immune systems
artificial immune system
biblio
Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat Intelligence
Submitted by aekwall on Mon, 03/04/2019 - 10:48am
Entropy
Automated Response Actions
Trojan horses
timely defense decision making
Text Mining
Stanford typed dependency parser
rapid growth
publicly available CTI sources
NLP techniques
NLP
Mutual information
Malware behavior analysis
low-level cyber threat actions
information theory
extract threat actions
security of data
enabling timely response
cybersecurity texts
cyber threat intelligence sharing
cyber threat intelligence
Cyber Attacks
advance threat notice
ActionMiner
natural language processing
Data mining
Decision Making
Cybersecurity
composability
pubcrawl
Resiliency
biblio
Information-Theoretic Attacks in the Smart Grid
Submitted by grigby1 on Mon, 11/19/2018 - 12:32pm
Mutual information
utility function
state variables
state estimation
smart power grids
Smart Grids
Smart Grid Sensors
Smart Grid
sensors
security
second order statistics
Resiliency
resilience
pubcrawl
probability
power system security
attack detection probability
kullback-leibler divergence
KL divergence
information-theoretic attacks
information theory
IEEE 30-Bus test system
Human Factors
Human behavior
higher order statistics
Gaussian random attacks
gaussian distribution
covariance matrix
Covariance matrices
Compositionality
Bayes methods
biblio
Individually-Secure Multi-Source Multicast
Submitted by grigby1 on Mon, 03/05/2018 - 1:08pm
network links
zero mutual information
telecommunication security
SMSM
security
secure MSM
Resiliency
resilience
Reliability
rate region
pubcrawl
nonsecure MSM
network topology
coding theory
network coding
Mutual information
multicast communication
Metrics
individually-secure multisource multicast
encoding
eavesdropper
cut-set bound
Cryptography
Compositionality
common secure model
biblio
Differential mutual information forward search for multi-kernel discriminant-component selection with an application to privacy-preserving classification
Submitted by grigby1 on Thu, 02/15/2018 - 11:39am
privacy
Measurement
mKDCA feature-map
mobile computing
mobile sensing
multi-kernel learning
multikernel discriminant-component selection
multiple Kernel Discriminant Component Analysis feature-map
Mutual information
pattern classification
machine learning
privacy-aware classification
privacy-preserving classification
pubcrawl
Redundancy
resilience
Resiliency
Scalability
utility classification performance
Human behavior
Artificial Intelligence
Compressive Privacy
data privacy
Differential mutual information
Differential Mutual Information (DMI)
DMI forward search method
feature engineering
Fisher's discriminant analysis
high-quality predictor
AI
human factor
Human Factors
incremental forward search
Kernel
Kernel Discriminant Component Analysis (KDCA)
kernel selection
Kernels
learning (artificial intelligence)
biblio
Prioritized active learning for malicious URL detection using weighted text-based features
Submitted by K_Hooper on Wed, 01/10/2018 - 11:14am
Scalability
Mutual information
natural language processing
pattern classification
Phishing
phishing categorization
PhishMonger's Targeted Brand dataset
prioritized active learning
pubcrawl
Resiliency
Man-machine systems
security analytics
supervised security analytics task
text analysis
text analytics
Training
Uniform resource locators
unlabelled data
weighted text-based features
data-driven analytics
batch learning framework
classification performance
collaboration
Computer crime
computer security
Cyber-security
cyber-security scenario
Data Analytics
data annotations
active learning
feature weight update technique
ground-truth labels
Human behavior
human-machine collaborative approach
learning (artificial intelligence)
machine learning
Malicious threat detection
malicious URL detection
biblio
A fast information-theoretic approximation of joint mutual information feature selection
Submitted by grigby1 on Thu, 12/28/2017 - 1:37pm
polynomial time
JMI maximization
JMI scales
joint mutual information feature selection
joint mutual information maximization
Metrics
minimum features subset
Mutual information
pattern classification
Policy-Governed Secure Collaboration
information theory
pubcrawl
Redundancy
Resiliency
Scalability
Science of Security
search problems
UCI datasets
unified framework
Upper bound
fast information-theoretic approximation
classification
collaboration
Complexity theory
composability
computational complexity
data analysis
data reduction
dimensionality reduction
Entropy
approximation theory
Feature Selection
feature size
filtering theory
greedy algorithms
greedy forward search
greedy search complexity
high dimensional datasets
Human behavior
Human Factors
biblio
Chaos-based video steganography
Submitted by grigby1 on Wed, 12/27/2017 - 1:08pm
Metrics
video coding
Tinkerbell 2D chaotic map
Tinkerbell
Steganography
shift registers
Resiliency
randomized data hiding points
pubcrawl
PSNR
NonLinear Feedback Shift Register
nonlinear dynamics physics
NLFSR
Mutual information
chaos
information technology
Image Steganography
Image color analysis
frame embedding position
data hiding limit
data hiding
Cryptography
composability
chaotic map
chaotic cryptography
chaotic communication
chaos-based video steganography mechanism
biblio
Information security analysis of deterministic encryption and chaotic encryption in spatial domain and frequency domain
Submitted by grigby1 on Wed, 12/27/2017 - 1:08pm
Entropy
Resiliency
pubcrawl
Mutual information
Metrics
Logistics
information security
Image color analysis
frequency-domain analysis
chaotic cryptography
encryption
Discrete Fourier transforms
digital images
Deterministic Encryption
Correlation
composability
chaotic encryption
biblio
A Method for Hybrid Bayesian Network Structure Learning from Massive Data Using MapReduce
Submitted by K_Hooper on Wed, 12/20/2017 - 11:31am
MapReduce
uncertain knowledge representation
styling
Structure Learning
security
search problems
score-and-search-based algorithm
Resiliency
pubcrawl
parallel processing
network theory (graphs)
Mutual information
Massive Data
Markov processes
Algorithm design and analysis
learning (artificial intelligence)
Knowledge representation
Information Reuse
Hybrid Learning
hybrid Bayesian network structure learning
distributed hybrid structure learning algorithm
directed graphs
Data models
data mining model
Data mining
constraint-based algorithm
Bayes methods
Bayesian network
« first
‹ previous
1
2
3
next ›
last »