Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
clustering
biblio
Feature-Weighted Fuzzy K-Modes Clustering
Submitted by aekwall on Mon, 01/27/2020 - 10:25am
pubcrawl
composability
Swarm Intelligence
clustering
Entropy
Compositionality
Categorical data
Feature weights
Feature-weighted FKM (FW-FKM)
Fuzzy k-modes (FKM)
biblio
A Hybrid Recommendation Algorithm Based on Heuristic Similarity and Trust Measure
Submitted by aekwall on Mon, 12/09/2019 - 12:24pm
SIMT collaborative filtering algorithm
hybrid collaborative filtering recommendation algorithm
K nearest neighbor recommendation
Matrix decomposition
multiple similarity influence factors
recommedation algorithm
recommendation list
recommender systems
similarity measure
heuristic similarity
trust measure
trust model
trust propagation theory
user trust network
user trust relationship computing model
Weight measurement
Computing Theory and Trust
Conferences
data sparsity
cold start
Compositionality
clustering algorithm
Heuristic algorithms
pattern clustering
collaboration
Clustering algorithms
clustering
Prediction algorithms
collaborative filtering
composability
pubcrawl
nearest neighbour methods
Trusted Computing
biblio
Trust Evaluation for Light Weight Security in Sensor Enabled Internet of Things: Game Theory Oriented Approach
Submitted by aekwall on Mon, 12/09/2019 - 12:24pm
illegitimate sensor nodes
cluster head
cluster member
clustered-sensor enabled IoT
control packets
EETE scheme
Energy
Energy Efficiency
energy efficient trust evaluation scheme
game theory oriented approach
hierarchical trust evaluation model
cluster formation game
light weight security
malicious activity
Nash Equilibrium
network wide dissemination
optimal cluster formation dilemma game
sensor enabled Internet of Things
sensor networks
trust recommendations
trust requests
Computing Theory and Trust
Computational modeling
Internet of Things
telecommunication security
Internet of Things (IoT)
Trusted Computing
game theory
pubcrawl
composability
wireless sensor networks
energy conservation
Cryptography
security
clustering
trust
network lifetime
Games
energy consumption
Compositionality
anomaly detection technique
activity-based trust dilemma game
CH
biblio
Trust Based Certificate Revocation and Attacks in MANETs
Submitted by grigby1 on Mon, 09/09/2019 - 10:56am
Metrics
vector-based trust mechanism
telecommunication security
security
Routing protocols
Routing
Resiliency
resilience
pubcrawl
mobile computing
mobile ad-hoc network security
mobile ad hoc networks
Ad hoc networks
MANET security
MANET
enhanced certificate revocation scheme
data packets
Conferences
Compositionality
clustering
Certificate Revocation
blackhole attacker
attacks
biblio
Validation and Correction of Large Security Policies: A Clustering and Access Log Based Approach
Submitted by grigby1 on Wed, 05/01/2019 - 11:34am
Metrics
verifying security policies
security policies
security of data
security
Scalability
Resiliency
resilience
Redundancy
pubcrawl
potential security breaches
Policy Validation and Correction.
pattern clustering
obtained clusters
nonallowed accesses
ABAC Policy
Image edge detection
edge detection
Conferences
composability
clustering technique
clustering
big data environments
Big Data
Anomaly Detection and Resolution
Anomaly Detection
access log based approach
Access Log
Access Control
biblio
Botnet Homology Method Based on Symbolic Approximation Algorithm of Communication Characteristic Curve
Submitted by grigby1 on Fri, 04/05/2019 - 10:23am
pattern clustering
internet
invasive software
IP networks
IRC botnet
IRC protocol
Metrics
most significant botnet group
multiple zombies hosts
network servers
network traffic
packet capture traffic monitoring
homology
Protocols
pubcrawl
resilience
Resiliency
Servers
symbolic approximation algorithm
telecommunication traffic
time series
Time series analysis
time warp simulation
Compositionality
botnet
botnet client
botnet control server
botnet homology method
botnets
clustering
Clustering algorithms
command and control systems
command control channels
command interaction
communication characteristic curve
Approximation algorithms
computational complexity
computer network security
dynamic network communication characteristic curves
dynamic time warping distance clustering
earliest botnet group
effective detection method
extracted curve
Heuristic algorithms
homogenous botnet
homologous botnets
biblio
Simplex Based Vector Mapping for Categorical Attributes Clustering
Submitted by aekwall on Mon, 03/04/2019 - 10:47am
human-in-the-loop security center paradigm
Human behavior
pubcrawl
composability
Metrics
attribution
Categorical Attributes
clustering
Simplex Theory
Vector Mapping
biblio
.Net library for SMS spam detection using machine learning: A cross platform solution
Submitted by aekwall on Mon, 02/25/2019 - 11:40am
short message service
Net library
online detection
pattern classification
pubcrawl
random forest algorithm
random processes
Scalability
security of data
Metrics
SMS
SMS spam detection
spam dataset classification
spam detection
spam filter
spam messages
tools
unsolicited e-mail
detection
classification
Classification algorithms
clustering
Clustering algorithms
cross platform .Net development
C\#
C\# languages
C\# library
Algorithms
electronic messaging
email spam detection
filtering algorithms
Human behavior
learning (artificial intelligence)
Libraries
machine learning
machine learning algorithms
biblio
Bit Localization in Least Significant Bit Using Fuzzy C-Means
Submitted by grigby1 on Fri, 02/22/2019 - 4:08pm
Market research
Watermarking
steganography methods
steganography detection
Steganography
Seminars
pubcrawl
PSNR
privacy
pattern clustering
MSE
Metrics
message decryption
mean square error methods
bit localization
LSB\\_FCM
least significant bit
Image Processing
Image edge detection
Image coding
hidden message
fuzzy C-means clustering method
Fuzzy C Means
embedded message
discrete cosine transforms
Cryptography
composability
clustering
biblio
Differential Privacy Data Protection Method Based on Clustering
Submitted by grigby1 on Fri, 09/28/2018 - 11:58am
information loss
Scalability
risk reduction
Resiliency
pubcrawl
privacy protection
pattern clustering
numerical attribute
mixed data
Knowledge Discovery
insensitive clustering method
insensitive clustering algorithm
categorical attribute
information disclosure
ICMD-DP method
Human behavior
distributed computing
differential privacy data protection method
differential privacy
data privacy
data availability
composability
clustering
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »