Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
clustering
biblio
Robust Cross-Layer Security Framework For Internet of Things Enabled Wireless Sensor Networks
Submitted by grigby1 on Tue, 05/25/2021 - 2:18pm
man-in-middle attack
wireless sensor networks
security
Robustness
Resiliency
resilience
pubcrawl
Physical layer
Monitoring
Cross Layer Security
Internet of Things
Energy Efficiency
cross-layer technique
composability
Clustering algorithms
clustering
attacker
biblio
WSNB: Wearable Sensors with Neural Networks Located in a Base Station for IoT Environment
Submitted by grigby1 on Thu, 05/20/2021 - 12:14pm
neural network
wearables security
EEG signal
base station
wearable sensor
Accuracy
Wearable sensors
Base stations
clustering
Intelligent sensors
Labeling
Internet of Things
wireless sensor networks
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
Neural networks
privacy
biblio
Machine Learning based Malware Detection in Cloud Environment using Clustering Approach
Submitted by grigby1 on Wed, 05/05/2021 - 12:56pm
machine learning
Trend Micro Locality Sensitive Hashing (TLSH)
Training
Solid modeling
Scalability
sandboxing
pubcrawl
Principal Component Analysis (PCA)
policy-based governance
malware detection
malware
cloud
feature extraction
False Positive Rate (FPR)
cuckoo sandbox
Computational modeling
composability
collaboration agreements
collaboration
clustering
Cloud Computing
biblio
F-DPC: Fuzzy Neighborhood-Based Density Peak Algorithm
Submitted by aekwall on Mon, 03/22/2021 - 1:11pm
expandability
neighborhood membership
local density
fuzzy neighborhood-based density peak algorithm
fuzzy neighborhood relationship
fuzzy neighborhood density peak clustering
fuzzy neighborhood
F-DPC
degree of membership
Compositionality
Partitioning algorithms
data objects
Classification algorithms
Heuristic algorithms
pattern clustering
fuzzy set theory
Data mining
clustering
Clustering algorithms
Shape
Robustness
Licenses
pubcrawl
Resiliency
biblio
Nested Pipeline Hardware Self-Organizing Map for High Dimensional Vectors
Submitted by aekwall on Mon, 03/22/2021 - 1:10pm
neural net architecture
fully parallel computation
high dimensional vectors
homogeneous modular structure
low-dimensional vectors
multiple clocks
nested architecture
nested pipeline hardware self-organizing map
neural chips
frequency 60.0 MHz
operable clock frequency
original nested SOM
pipeline computation
Self-Organizing Map
sequential computation
single vector
VHDL
weight vector update
Pipelines
FPGA
Hardware
computer architecture
Resiliency
pubcrawl
Neurons
clustering
Vectors
field programmable gate arrays
expandability
Compositionality
Clocks
pipeline processing
MNIST
self-organising feature maps
Self-organizing feature maps
biblio
Evaluation of Security and Performance of Master Node Protocol in the Bitcoin Peer-to-Peer Network
Submitted by grigby1 on Tue, 03/09/2021 - 2:48pm
electronic money
telecommunication network topology
security
pubcrawl
proximity-aware extensions
Protocols
propagation delay
physical topology
Peer-to-peer computing
named Master Node
Master Node protocol
logical neighbors
information propagation delay
Human behavior
peer to peer security
Electronic mail
delays
delay overhead
current Bitcoin protocol
clustering
Bitcoin peer-to-peer network
Bitcoin network
bitcoin
Human Factors
Metrics
Resiliency
Scalability
biblio
Towards Data-Driven Characterization of Brute-Force Attackers
Submitted by grigby1 on Tue, 03/09/2021 - 2:37pm
IP networks
unrelated IP addresses
timing information
timing
threat hunters
targeted attack campaigns
public Internet
pubcrawl
Protocols
policy-based governance
password
Organizations
meta data
malicious login attempts
low-threat attacks
attacker dictionary
invasive software
internet
Human Factors
Human behavior
dictionary-based brute-force attack
defensive measures
data-driven characterization
coordinated attacks
connection metadata
computer network security
clustering
brute-force login attempts
brute-force attackers
brute force attacks
biblio
HAC-T and Fast Search for Similarity in Security
Submitted by aekwall on Mon, 02/22/2021 - 1:43pm
nearest neighbor search
Trend Locality Sensitive Hashing (TLSH)
tree-based index
tools
threshold based hierarchical agglomerative clustering algorithm
standards
similarity digests
security operations center operators
security of data
security analysts
security
search problems
pubcrawl
Predictive Metrics
nearest neighbour methods
Approximate Nearest Neighbour
Measurement
malware
Indexes
Hierarchical Agglomerative Clustering (HAC)
HAC-T
Fuzzy Hashing
fast nearest neighbor search techniques
Cryptography
computer viruses
clustering technique
Clustering algorithms
clustering
cluster quality
cluster malware
biblio
CryingJackpot: Network Flows and Performance Counters against Cryptojacking
Submitted by grigby1 on Wed, 02/10/2021 - 1:11pm
Data mining
performance counters
cryptojacking
network flows
security analytics
Clustering algorithms
clustering
Task Analysis
malware
feature extraction
Intrusion Detection
Cryptography
Resiliency
resilience
Metrics
Human behavior
pubcrawl
Servers
biblio
Differential Privacy Information Publishing Algorithm based on Cluster Anonymity
Submitted by grigby1 on Thu, 01/28/2021 - 2:01pm
differential privacy information publishing algorithm
Running efficiency
Resiliency
resilience
Publishing
pubcrawl
privacy budget
pattern clustering
Metrics
internet technology
Internet of Things
internet
information loss
Human behavior
anonymity
differential privacy
data privacy
composability
Complexity theory
complex background knowledge
clustering anonymity
Clustering algorithms
clustering
cluster anonymity
Big Data
background attack
Artificial Intelligence
anonymous
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »