Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Itemsets
biblio
Mining Frequent and Rare Itemsets With Weighted Supports Using Additive Neural Itemset Embedding
Submitted by aekwall on Fri, 08/12/2022 - 3:56pm
Neural networks
Linguistics
Scalability
Databases
Semantics
pubcrawl
Compositionality
Additives
additive compositionality
itemset mining
Itemsets
neural embedding
vector sum problems
weighted support
biblio
Detection of Undesired Events on Real-World SCADA Power System through Process Monitoring
Submitted by grigby1 on Wed, 05/05/2021 - 12:31pm
SCADA
SCADA Systems Security
undesired events
process-related threats
malicious actions
Itemsets
logs
SCADA System Security
power systems
Substations
Monitoring
Compositionality
Data mining
SCADA systems
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
Servers
biblio
An Improvement of Apriori Mining Algorithm using Linked List Based Hash Table
Submitted by aekwall on Mon, 03/29/2021 - 12:06pm
hash algorithms
LinkedList
linked list
Itemsets
improved apriori algorithm
Improved
important algorithms
Frequent item sets
frequent 1-item sets counts
find frequent item sets
association rules
apriori mining algorithm
apriori
Organizations
hash table
memory space
Compositionality
database management systems
pubcrawl
Random access memory
Data mining
Clustering algorithms
Databases
Resiliency
Classification algorithms
biblio
A GA-based Data Sanitization for Hiding Sensitive Information with Multi-Thresholds Constraint
Submitted by grigby1 on Tue, 02/16/2021 - 1:24pm
privacy preservation
multi-threshold
Itemsets
Data Sanitization
Statistics
Sociology
genetic algorithm
genetic algorithms
optimization
Compositionality
privacy
Data mining
Databases
Data models
security
Resiliency
resilience
Human behavior
pubcrawl
biblio
A Multiple Objective PSO-Based Approach for Data Sanitization
Submitted by aekwall on Mon, 12/16/2019 - 1:47pm
resilience
privacy-preserving and security
nondominated solutions
multiple objective PSO-based approach
multiple objective
multiobjective particle swarm optimization-based framework
grid-based algorithm
Itemsets
genetic algorithms
Data Sanitization
Compositionality
security
probability
privacy
Data mining
particle swarm optimization
particle swarm optimisation
optimization
pubcrawl
Human behavior
Task Analysis
biblio
A Swarm-based Data Sanitization Algorithm in Privacy-Preserving Data Mining
Submitted by aekwall on Mon, 12/16/2019 - 1:47pm
artificial cost
swarm-based data sanitization algorithm
privacy-preserving data mining
PPDM
Pareto solutions
multiobjective PSO
multiobjective
missing cost
Itemsets
hierarchical clustering methods
hierarchical clustering method
hiding failure
genetic algorithms
clustering methods
data privacy
Data Sanitization
Compositionality
resilience
pattern clustering
privacy
Data mining
Clustering algorithms
Data protection
PSO
optimization
particle swarm optimisation
pubcrawl
Human behavior
biblio
Privacy-Preserving Frequent Pattern Mining from Big Uncertain Data
Submitted by grigby1 on Wed, 03/06/2019 - 4:26pm
imprecise and uncertain data
uncertainty
transaction-centric mining approach
Program processors
privacy-preserving mining
privacy-preserving frequent pattern mining
privacy and security
knowledge management
knowledge discovery in databases
Itemsets
item-centric mining approach
item-centric mining
data privacy
fruition processes
frequent patterns
data science
big uncertain data
big data science solutions
big data privacy
Data Analytics
Clustering algorithms
Data mining
pubcrawl
Big Data
biblio
"An Artificial Intelligence-Based Trust Model for Pervasive Computing"
Submitted by grigby1 on Thu, 02/23/2017 - 12:56pm
human-like decision making
user trustworthiness
ubiquitous computing scenarios
ubiquitous computing
Trusted Computing
trust model
security
pubcrawl170105
pervasive computing
pattern classification
network interactions
naïve Bayes classifier
Itemsets
Apriori algorithm
effective trust model
Decision Making
Data mining
computers arena
computational services distribution
Computational modeling
Classification algorithms
behavioral patterns
Bayes methods
artificial intelligence-based trust model
Artificial Intelligence
biblio
"Ctracer: Uncover C amp;amp;C in Advanced Persistent Threats Based on Scalable Framework for Enterprise Log Data"
Submitted by abfox on Tue, 02/14/2017 - 12:05pm
scalable framework
internet
invasive software
Itemsets
malware
MapReduce
network signature
networking logs
pubcrawl170101
hackers
Security Operations Center
Servers
SoC
stealthy activities detection
stealthy command and control channel detection
targeted attacks
traffic data
Computer crime
Advanced Persistent Threat (APT)
APT attack
business data processing
C&C channel
C&C sessions
C)
Command and Control (C&
command and control systems
advanced persistent threat
Computers
Ctracer
Digital Forensics
digital signatures
Electronic mail
enterprise log data
forensic report
biblio
Data mining for privacy preserving association rules based on improved MASK algorithm
Submitted by BrandonB on Tue, 05/05/2015 - 9:27am
Itemsets
Time complexity
security issues
scanning database
query processing
privacy preserving association rules
privacy preservation
multi-parameters perturbation
mining associations with secrecy konstraints
matrix algebra
Algorithm design and analysis
inverse matrix
information privacy
improved MASK algorithm
DPQR algorithm
data privacy
data perturbation strategy
data perturbation and query restriction
Data mining
association rules
1
2
next ›
last »