Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
clustering
biblio
Enhanced p-Sensitive k-Anonymity Models for Achieving Better Privacy
Submitted by grigby1 on Thu, 01/28/2021 - 1:59pm
Metrics
skew attacks
sensitive groups
sensitive attacks
Resists
Resiliency
resilience
Publishing
pubcrawl
Privacy Requirements
privacy
personalized protection characteristic
personalized privacy protection
Partitioning algorithms
one size fits all unified privacy protection level
anonymity
Human behavior
homogeneous attacks
faces
enhanced p-sensitive k-anonymity models
enhanced anonymous models
data utility
data publishing
data privacy
Data models
data anonymity
composability
Clustering algorithms
clustering
biblio
An Energy Efficient Security Aware Clustering approach using Fuzzy Logic for Mobile Adhoc Networks
Submitted by grigby1 on Mon, 12/28/2020 - 1:00pm
MANET
telecommunication security
telecommunication power management
SFLC
security-aware fuzzy-based clustering
security
resilience
pubcrawl
pattern clustering
network topology
mobile adhoc networks
mobile ad hoc networks
manet privacy
Fuzzy logic
energy efficient security aware clustering approach
energy conservation
Energy
computation time
clustering
cluster head selection
ad hoc network
Compositionality
Metrics
Resiliency
biblio
An Energy Aware Fuzzy Trust based Clustering with group key Management in MANET Multicasting
Submitted by aekwall on Mon, 11/02/2020 - 2:41pm
pubcrawl
MANET multicasting
manet privacy
member movement
Metrics
mobile ad hoc networks
multicast communication
pattern clustering
Polynomial-based key management
polynomials
Protocols
lower capacity resources
Reliability
repeated node movement
Resiliency
secure multicast transmission
style
telecommunication power management
telecommunication security
trust
trustable environment fuzzy based trust
Energy states
clustered networks
clustering
clustering concepts
Compositionality
considerably stable environment fuzzy based trust
Cryptography
delays
energy aware fuzzy trust
energy consumption
cluster head
Fuzzy based
Fuzzy logic
fuzzy set theory
group key
group key maintenance
Group key management
highest trust
key refreshment
link breakdown
biblio
Performance Analysis of Cluster based Secured Key Management Schemes in WSN
Submitted by aekwall on Mon, 09/21/2020 - 3:46pm
large scale networks
wireless sensor networks
transmitted information
telecommunication network management
symmetric sets
security of data
security holes
secure transmission
secure information transmission
secure clusters
Routing
Resiliency
pubcrawl
privacy
mystery keys
asymmetric key sets
key management schemes
key management framework
Key Management and Secure Transmission
information security
information records
encoded data
cyber-physical systems
Cryptography
confinement
composability
clustering
cluster-based wireless sensor networks
CBWSN
biblio
Can Reinforcement Learning Address Security Issues? an Investigation into a Clustering Scheme in Distributed Cognitive Radio Networks
Submitted by grigby1 on Fri, 09/18/2020 - 1:56pm
radio networks
White spaces
volatile operating environment
volatile environment
telecommunication security
security issues
security
Scalability
RL parameters
RL model
resource management
Resiliency
resilience
reinforcement learning model
Reinforcement learning
attacks
pubcrawl
pattern clustering
operating region
network scalability
learning rate
learning (artificial intelligence)
launch attacks
Heuristic algorithms
distributed cognitive radio networks
discount factor
Cognitive Radio Security
cognitive radio
clustering scheme
clustering
biblio
ClustCrypt: Privacy-Preserving Clustering of Unstructured Big Data in the Cloud
Submitted by grigby1 on Fri, 08/28/2020 - 3:34pm
resilience
big data security in the cloud
unstructured
topic-based clustering
secure cloud-based semantic search system
privacy-preserving data clustering
encrypted unstructured big data
clustering methods
ClustCrypt
client-side encryption
big data security
Scalability
pattern clustering
clustering
Data Analytics
Cryptography
Metrics
data encryption
Big Data
cloud services
Cloud Computing
data privacy
Indexes
Resiliency
pubcrawl
data analysis
Organizations
privacy
encryption
biblio
Anomaly Detection using Graph Neural Networks
Submitted by grigby1 on Fri, 05/08/2020 - 2:43pm
security of data
Neural networks
pattern classification
pattern clustering
Peer-to-peer computing
policy-based governance
pubcrawl
Resiliency
security
Neural Network Security
social connection graphs
social network
social network statistical measures
social networking (online)
statistical analysis
Twitter
Twitter dataset
Twitter network
email network
Artificial Neural Networks
classification
clustering
Clustering algorithms
collaboration
cyber physical systems
deep learning
deep neural networks
Anomaly Detection
Enron dataset
Graph Neural Network
graph neural networks
graph structure
graph theory
learning (artificial intelligence)
Metrics
neural nets
biblio
K-Means Clustering Analysis Based on Adaptive Weights for Malicious Code Detection
Submitted by grigby1 on Mon, 04/06/2020 - 2:23pm
network coding
traffic characteristics
traditional detection techniques
telecommunication traffic
statistical analysis
Resiliency
resilience
pubcrawl
pattern clustering
network traffic
network security
network scanning
adaptive weights-MMKM
network behavior
Metrics
malicious codes
malicious code detection
malicious code
k-means clustering analysis
cyber physical systems
computer network security
composability
clustering
AW-MMKM
biblio
Lockout-Tagout Ransomware: A Detection Method for Ransomware using Fuzzy Hashing and Clustering
Submitted by aekwall on Mon, 03/23/2020 - 1:25pm
Fuzzy Hashing
WannaCryptor
WannaCry
Syntactics
SSDEEP
similarity preserving hashing
SDHASH
Ransomware
pubcrawl
pam
k-means
Indexes
Scalability
Engines
DIANA
Cryptography
composability
clustering methods
clustering
clara
agnes
Fuzzy Cryptography
Metrics
Resiliency
biblio
Clustering Algorithm Optimized by Brain Storm Optimization for Digital Image Segmentation
Submitted by aekwall on Mon, 01/27/2020 - 10:26am
Compositionality
image processing application
digital image segmentation
digital image processing methods
digital image processing
Clustering algorithms
brain storm optimization algorithm
benchmark images
k-means algorithm
evolutionary computation
learning (artificial intelligence)
Segmentation
image segmentation
clustering
Swarm Intelligence
optimization
composability
pubcrawl
machine learning
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »