Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pattern detection
biblio
Text Mining in Unclean, Noisy or Scrambled Datasets for Digital Forensics Analytics
Submitted by grigby1 on Tue, 02/06/2018 - 1:34pm
LERP-RSA
Text Mining
text analytics
Social network services
Scalability
pubcrawl
pattern detection
Noise measurement
Metrics
ARPaD
Human Factors
Human behavior
email analysis
Electronic mail
Digital Forensics
composability
arrays
biblio
A quantitative and qualitative analysis of tensor decompositions on spatiotemporal data
Submitted by grigby1 on Thu, 12/28/2017 - 1:17pm
pattern detection
Urban areas
tensors
tensor model
tensor decompositions
Tensile stress
Spatiotemporal phenomena
spatiotemporal data analysis
Spatial resolution
quantitative analysis
qualitative analysis
Public transportation
pubcrawl
Anomaly Detection
pattern clustering
Metrics
Matrix decomposition
Indexes
high-dimensional data analysis technique
GPS data
georeferenced data sets
geographic information systems
decomposition
data analysis
convergence
Compositionality
biblio
Detecting mobile botnets through machine learning and system calls analysis
Submitted by grigby1 on Mon, 12/04/2017 - 12:57pm
malware
threat minimization
system call analysis
statistical feature extraction
statistical analysis
self-generated dataset
Resiliency
pubcrawl
pattern detection
Monitoring
Mobile handsets
mobile environment
mobile computing
Mobile communication
mobile botnet detection
Metrics
anomalous behavior identification
machine learning algorithms
machine learning
legitimate application
learning (artificial intelligence)
invasive software
Internet security
internet
host-based approach
feature extraction
desktop domain
computer network security
Compositionality
close-to-reality scenario
botnets
anomaly-based approach