Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
clustering methods
biblio
A Swarm-based Data Sanitization Algorithm in Privacy-Preserving Data Mining
Submitted by aekwall on Mon, 12/16/2019 - 1:47pm
artificial cost
swarm-based data sanitization algorithm
privacy-preserving data mining
PPDM
Pareto solutions
multiobjective PSO
multiobjective
missing cost
Itemsets
hierarchical clustering methods
hierarchical clustering method
hiding failure
genetic algorithms
clustering methods
data privacy
Data Sanitization
Compositionality
resilience
pattern clustering
privacy
Data mining
Clustering algorithms
Data protection
PSO
optimization
particle swarm optimisation
pubcrawl
Human behavior
biblio
Detection of Hurriedly Created Abnormal Profiles in Recommender Systems
Submitted by grigby1 on Tue, 10/15/2019 - 2:41pm
profile injection attacks
user-item rating matrix
user rating behavior
system ratings
synthetic coordinates
spurious profiles
specific ratings
specific items
security of data
Scalability
Resiliency
resilience
recommender systems
random ratings
Random Forest
pubcrawl
anomalous rating profiles
pattern clustering
Outliers
learning (artificial intelligence)
Labeling
k-means clustering
information filtering
hurriedly created abnormal profiles
Human Factors
Hidden Markov models
gaussian distribution
feature extraction
dimensionality reduction
clustering methods
attackers
biblio
"Scalable command and control detection in log data through UF-ICF analysis"
Submitted by abfox on Tue, 02/14/2017 - 1:13pm
fixed user agent string
UF-ICF analysis
scalable command-and-control detection
pubcrawl170101
pattern clustering
normal user
networking logs
malware
log data
IP networks
IP addresses
invasive software
intrusion prevention systems
information security
information filtering
Frequency modulation
advanced persistent threat
filtering methods
domain names
Decision support systems
coverage rate
connection behaviors
computer network security
command and control systems
Command and Control (C&C)
clustering methods
C&C sites
C&C server detection
botnet
benign service
APT
antivirus software
« first
‹ previous
1
2