Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
clustering methods
biblio
Effect of Clustering in Federated Learning on Non-IID Electricity Consumption Prediction
Submitted by grigby1 on Fri, 01/20/2023 - 2:47pm
smart grid consumer privacy
clustering methods
collaboration
energy consumption
Europe
federated learning
load forecasting
Policy Based Governance
Predictive models
privacy
pubcrawl
Smart Grids
biblio
An Efficient Recommender System Based on Collaborative Filtering Recommendation and Cluster Ensemble
Submitted by grigby1 on Fri, 07/15/2022 - 11:19am
Partitioning algorithms
recommender system for big data
expectation maximization
EM
collaborative filtering recommendation
cluster ensemble
collaborative filtering
System performance
recommender system
clustering methods
pubcrawl
social networking (online)
recommender systems
Prediction algorithms
Scalability
Filtering
Resiliency
resilience
Human behavior
biblio
Scalable Fact-checking with Human-in-the-Loop
Submitted by grigby1 on Fri, 06/10/2022 - 12:48pm
pubcrawl
Scalability
Manuals
Semantics
Forensics
social networking (online)
Pipelines
clustering methods
Inspection
human in the loop
biblio
A Framework for Mobile Forensics Based on Clustering of Big Data
Submitted by grigby1 on Mon, 06/06/2022 - 11:14am
tools
Digital Forensics
pubcrawl
Human behavior
resilience
performance evaluation
Scalability
Big Data
Metrics
wireless networks
clustering
Distributed databases
clustering methods
law enforcement
Resiliency
mobile forensics framework
biblio
Identifying Ubiquitious Third-Party Libraries in Compiled Executables Using Annotated and Translated Disassembled Code with Supervised Machine Learning
Submitted by aekwall on Mon, 02/22/2021 - 12:44pm
Databases
vector
Matrices
k-nearest neighbor search
clustering methods
Bayes method
nearest neighbor search
supervised learning
Classification algorithms
Microprogramming
Predictive Metrics
reverse engineering
Software
Measurement
neural network
supply chain management
Libraries
tools
internet
graph theory
pubcrawl
machine learning
Support vector machines
Task Analysis
biblio
DOS and Brute Force Attacks Faults Detection Using an Optimised Fuzzy C-Means
Submitted by grigby1 on Fri, 09/04/2020 - 2:37pm
DOS brute force attacks faults detection
brute force attacks
Subtractive Clustering
specialised MIB dataset
SNMP-MIB variables
SNMP-MIB parameter datasets
SFCM method
optimised fuzzy c-means
network performance
network issues
Network Fault Attacks
MIB feature
Management information base
Fuzzy Cluster Means
Fault Clustering
Servers
computer networks
computer network systems
clustering methods
Clustering algorithms
fault detection
policy-based governance
Human Factors
network administrators
fuzzy set theory
Force
pubcrawl
Protocols
computer network security
biblio
ClustCrypt: Privacy-Preserving Clustering of Unstructured Big Data in the Cloud
Submitted by grigby1 on Fri, 08/28/2020 - 2:34pm
resilience
big data security in the cloud
unstructured
topic-based clustering
secure cloud-based semantic search system
privacy-preserving data clustering
encrypted unstructured big data
clustering methods
ClustCrypt
client-side encryption
big data security
Scalability
pattern clustering
clustering
Data Analytics
Cryptography
Metrics
data encryption
Big Data
cloud services
Cloud Computing
data privacy
Indexes
Resiliency
pubcrawl
data analysis
Organizations
privacy
encryption
biblio
Lockout-Tagout Ransomware: A Detection Method for Ransomware using Fuzzy Hashing and Clustering
Submitted by aekwall on Mon, 03/23/2020 - 12:25pm
Fuzzy Hashing
WannaCryptor
WannaCry
Syntactics
SSDEEP
similarity preserving hashing
SDHASH
Ransomware
pubcrawl
pam
k-means
Indexes
Scalability
Engines
DIANA
Cryptography
composability
clustering methods
clustering
clara
agnes
Fuzzy Cryptography
Metrics
Resiliency
biblio
Cyberthreat Hunting - Part 2: Tracking Ransomware Threat Actors Using Fuzzy Hashing and Fuzzy C-Means Clustering
Submitted by grigby1 on Wed, 02/26/2020 - 3:41pm
signature based defense
fuzzy techniques
Indexes
Locky
malicious code writing
Measurement
pattern clustering
privacy
pubcrawl
Ransomware
ransomware threat actor
SDHASH
fuzzy similarity scores
Similarity Preserving
SSDEEP
successful attack vectors
threat actors
threat vectors
Triaging
unknown ransomware
unlimited polymorphic samples
WannaCry
WannaCryptor
Writing
Cryptography
Resiliency
Metrics
Fuzzy Cryptography
Attack Surfaces
c-means clustering
Cerber
cluster ransomware samples
clustering methods
clustering techniques
composability
Context-Triggered Piecewise Hashing
Scalability
CryptoWall
CTPH
cyberthreat hunting
efficient fuzzy analysis approach
FCM
FCM clustering results
fuzzy c-means clustering
Fuzzy Hashing
fuzzy hashing methods
fuzzy set theory
biblio
Combining Tensor Decompositions and Graph Analytics to Provide Cyber Situational Awareness at HPC Scale
Submitted by grigby1 on Mon, 02/17/2020 - 4:16pm
resilience
metadata
Metrics
multidimensional anomaly detection fusing HPC Analytics and Tensors
network topology
parallel processing
parallelized graph analysis
pattern clustering
pubcrawl
MADHAT
Resiliency
security of data
sensor fusion
situational awareness
structured network sensor logs
Tensile stress
tensors
tools
groupware
Security Metrics
clustering methods
composability
data structures
Detectors
Electronic mail
graph analytics
graph theory
Computing Theory
high-performance packages
HPC architecture for cyber situational awareness
HPC resources
HPC scale
integrated workflow
IP networks
large-scale sparse tensor decompositions
1
2
next ›
last »