Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
weka tool
biblio
IoT Botnet Malware Classification Using Weka Tool and Scikit-learn Machine Learning
Submitted by grigby1 on Tue, 03/09/2021 - 1:25pm
Resiliency
machine learning
machine learning algorithms
malware
malware attack
Metrics
network traffic
packet traffic
pubcrawl
resilience
learning (artificial intelligence)
scikit-learn
Scikit-learn analysis tools machine learning
Scikit-learn machine learning
telecommunication traffic
Time measurement
tools
WEKA
weka tool
false positive rate
botmaster
botnet
botnet IoT
botnet malware attacks
botnets
classification
composability
computer network security
Decision trees
accurate classification methods
inconspicuousness characteristics
inexpensive power
internet network security
Internet of Things
Internet of Things network infrastructure
invasive software
IoT botnet malware classification
IoT devices
biblio
Detection of DDoS Attack and Classification Using a Hybrid Approach
Submitted by grigby1 on Tue, 02/16/2021 - 11:58am
hybrid feature selection method
Classifiers.
cross-validation
DDoS category
DDoS detection
DDoS detection rate
decision table
discretize dataset
Feature Selection
Bayes Net classifiers
J48 classifier
KDD DDoS dataset
Naive Bayes Classifiers
naive Bayes methods
NSL DDoS dataset
NSL KDD dataset
selected DDoS packets
weka tool
computer network security
security of data
Cloud Computing
machine learning
pubcrawl
Human behavior
Metrics
resilience
Resiliency
learning (artificial intelligence)
random forests
composability
pattern classification
Random Forest
Cloud Security
machine learning classifiers
DDoS Attack
DDoS attack detection
biblio
"Securing the Clustered Database Using Data Modification Technique"
Submitted by grigby1 on Thu, 02/23/2017 - 11:02am
Distributed databases
weka tool
standards
security of data
security
pubcrawl
Privacy preserving protocols
pattern clustering
online media
Iris
information protection
clustering
Distributed Database
distributed clustered database environments
database clustering
Data protection
pubcrawl170105
data privacy
data modification
Data mining
computer science