Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
clustering
biblio
Inferring OpenFlow Rules by Active Probing in Software-Defined Networks
Submitted by grigby1 on Tue, 02/06/2018 - 2:05pm
delays
Receivers
Reconnaissance
Resiliency
rule inference
security threats
software defined networking
Software-Defined Networks
telecommunication security
active probing
Apriori algorithm
clustering
control systems
controllers
reactive rules
Denial-of-Service
DoS attacks
inferring sdn by probing and rule extraction
INSPIRE
IP networks
k-means clustering
Network reconnaissance
OpenFlow rules
packet delay time
Probes
Probing
probing packets
pubcrawl
biblio
DDoS attack detection approach using an efficient cluster analysis in large data scale
Submitted by grigby1 on Tue, 01/16/2018 - 6:25pm
network security
genuine network flow identification
host-based resources
Human behavior
Intrusion Detection
intrusion detection system
large data scale
legitimate users
Metrics
network resources
flooding attack packets
packets windowing
pattern clustering
Phi coefficient
pubcrawl
Resiliency
resource allocation
Shape
unsupervised data mining
wireless sensor networks
CURE
CAIDA2008 datasets
cluster analysis
clustering
Clustering algorithms
clustering using representative
composability
Computer crime
computer network security
congestion-based attack
CAIDA2007 datasets
DARPA2000 datasets
Data mining
DDoS attack detection
detection rate
Distributed Denial of Service (DDoS)
distributed denial of service attack
Entropy
F measure
false alarm rate
biblio
Combining convolutional neural network and self-adaptive algorithm to defeat synthetic multi-digit text-based CAPTCHA
Submitted by grigby1 on Wed, 12/20/2017 - 1:03pm
character recognition
human beings
text-based scheme
synthetic multidigit text-based CAPTCHA
self-adaptive algorithm
Segmentation
reverse Turing test
Optical character recognition software
image segmentation
data entry
convolutional neural network
convolution
China
character segmentation
pubcrawl
CAPTCHA segmentations
Business
add-on recognition part
Neural networks
captchas
CAPTCHA
Clustering algorithms
neural nets
text analysis
composability
clustering
Human Factors
Human behavior
biblio
Automatic Application Identification from Billions of Files
Submitted by grigby1 on Tue, 12/12/2017 - 1:20pm
big data security metrics
aknn
application
Big Data
clustering
Compositionality
files
hsnw
KNN
malware
Metadata Discovery Problem
pubcrawl
Resiliency
Scalability
security
sketch
biblio
Incremental Discovery of Inclusion Dependencies
Submitted by grigby1 on Tue, 12/12/2017 - 1:19pm
clustering
Compositionality
data deletion
Data discovery
Incremental discovery
metadata
Metadata Discovery Problem
pubcrawl
Resiliency
Scalability
biblio
Development of the Hierarchal Trust Management System for Mobile Cluster-based Wireless Sensor Network
Submitted by grigby1 on Tue, 09/05/2017 - 1:49pm
Anomaly Detection
attacks
authenticity
clustering
Human behavior
Intrusion Detection
pubcrawl
Resiliency
Scalability
sensor security
trust
wireless sensor networks
biblio
Authentication As a Service for Cloud Computing
Submitted by grigby1 on Tue, 09/05/2017 - 1:34pm
authentication
Cloud Computing
clustering
feature extraction
Human behavior
iobt
keystroke analysis
keystroke dynamics
Metrics
pubcrawl
Resiliency
Scalability
biblio
Intrusion Detection in Enterprise Systems by Combining and Clustering Diverse Monitor Data
Submitted by grigby1 on Tue, 08/22/2017 - 12:16pm
Anomaly Detection
clustering
composability
Intrusion Detection
machine learning
Monitoring
privacy
pubcrawl
Resiliency
security
biblio
Tracked Without a Trace: Linking Sessions of Users by Unsupervised Learning of Patterns in Their DNS Traffic
Submitted by grigby1 on Mon, 06/05/2017 - 12:33pm
artificial intelligence security
attack
behavioral fingerprints
clustering
composability
Human behavior
k-means
Metrics
privacy
pubcrawl
Resiliency
biblio
resMBS: Constructing a Financial Supply Chain from Prospectus
Submitted by grigby1 on Wed, 05/17/2017 - 1:33pm
clustering
community detection
mortgage backed securities (MBS)
named entity recognition
pubcrawl
Resiliency
Rule based text extraction
supply chain risk assessment
supply chain security
SystemT
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »