Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
clustering algorithm
biblio
Anomaly Based Distributed Denial of Service Attack Detection and Prevention with Machine Learning
Submitted by grigby1 on Wed, 12/18/2019 - 2:45pm
Human behavior
telecommunication traffic
service attack detection
Resiliency
resilience
pubcrawl
pattern clustering
Particle separators
network traffic
Metrics
Measurement
machine learning
learning (artificial intelligence)
anomaly based distributed denial of service attack detection
feature extraction
DoS-DDoS attacks
DDoS Attack Prevention
DDoS Attack
DBSCAN
computer network security
Computer crime
composability
Clustering algorithms
clustering algorithm
Attack vectors
biblio
A Hybrid Recommendation Algorithm Based on Heuristic Similarity and Trust Measure
Submitted by aekwall on Mon, 12/09/2019 - 12:24pm
SIMT collaborative filtering algorithm
hybrid collaborative filtering recommendation algorithm
K nearest neighbor recommendation
Matrix decomposition
multiple similarity influence factors
recommedation algorithm
recommendation list
recommender systems
similarity measure
heuristic similarity
trust measure
trust model
trust propagation theory
user trust network
user trust relationship computing model
Weight measurement
Computing Theory and Trust
Conferences
data sparsity
cold start
Compositionality
clustering algorithm
Heuristic algorithms
pattern clustering
collaboration
Clustering algorithms
clustering
Prediction algorithms
collaborative filtering
composability
pubcrawl
nearest neighbour methods
Trusted Computing
biblio
Learning Transferable Features For Open-Domain Question Answering
Submitted by aekwall on Mon, 11/25/2019 - 2:01pm
single open-domain QA model
open-domain QA models
open-domain question answering
open-domain Question-Answering models
pattern clustering
pubcrawl
question answering (information retrieval)
Question-Answering
sentence-level QA models
natural language processing
span-level QA benefits
Task Analysis
Training
training corpora
Training data
transfer learning
transferable feature learning
transferable features
domain-specific QA models
Analogies and Transference
clustering algorithm
complementary data
Data models
Deep Networks
domain adaptation approaches
domain-adaptation
domain-specific features
Adaptation models
Human behavior
Human Factors
information retrieval
Knowledge Discovery
learning (artificial intelligence)
Linear programming
natural language
biblio
Multiple Attributes Based Spoofing Detection Using an Improved Clustering Algorithm in Mobile Edge Network
Submitted by aekwall on Mon, 08/05/2019 - 10:44am
MEC network
spoofing detection method
spoofing detection
security problems
security of data
Scalability
Resiliency
pubcrawl
pattern clustering
multiple channel attributes
multiple attributes
mobile edge computing network
Mobile Edge Computing
mobile computing
Cloud Computing
Intrusion Detection
internet
Information Centric Networks
Information Centric Network
Image edge detection
ICN
Heuristic algorithms
edge computing
distributed network architecture
Clustering algorithms
clustering algorithm
cluster algorithm
cloud platform
biblio
Resource allocation based on clustering algorithm for hybrid device-to-device networks
Submitted by K_Hooper on Wed, 12/20/2017 - 11:31am
Algorithm design and analysis
clustering algorithm
Clustering algorithms
D2D communication
Device-to-device communication
Information Reuse
Interference
Manganese
pubcrawl
Resiliency
resource allocation
resource management
security
Signal to noise ratio
biblio
Entropy clustering approach for improving forecasting in DDoS attacks
Submitted by grigby1 on Tue, 03/07/2017 - 1:44pm
pattern clustering
forecasting theory
FPR
IDS
intrusion detection system
k-means clustering analysis
network analysis
network security
online anomaly detection
forecasting
Ports (Computers)
proactive forecast
project industrial partner
pubcrawl170109
Shannon entropy
Shannon-entropy concept
volume anomaly
alert management
feature extraction
false positive rate
entropy clustering approach
Entropy
distributed denial-of-service (DDoS) detection
distributed denial-of-service
Digital Forensics
digital forensic analysis
DDoS Attacks
cyber-range simulation dataset
computer network security
Computer crime
Clustering algorithms
clustering algorithm
Algorithm design and analysis