Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data mining
biblio
Efficient Exploration of Algorithm in Scholarly Big Data Document
Submitted by aekwall on Wed, 09/04/2019 - 11:16am
document handling
Metadata Discovery Problem
TFIDF
textual content
Steaming
Software algorithms
Sentence Extractor
self-learning
searching algorithms
search engine
scholarly digital documents
scholarly Big Data document
Scholarly big data
Pseudo codes
Portable document format
indexing
Scalability
AlgorithmSeer
Algorithms
algorithm representations
algorithm indexing
algorithm database
search engines
Data mining
metadata
internet
composability
pubcrawl
Resiliency
learning (artificial intelligence)
machine learning algorithms
Big Data
biblio
Determination of Security Threat Classes on the Basis of Vulnerability Analysis for Automated Countermeasure Selection
Submitted by aekwall on Mon, 08/26/2019 - 10:08am
security threats
Data mining
Vulnerability Analysis
Metrics
policy-based governance
pubcrawl
Human behavior
resilience
security monitoring
open security data sources
data classification
Automated countermeasure selection
security weaknesses
biblio
Architectural Security Weaknesses in Industrial Control Systems (ICS) an Empirical Study Based on Disclosed Software Vulnerabilities
Submitted by aekwall on Mon, 08/26/2019 - 10:07am
industrial control
supervisory control
Software
security weaknesses
security of data
security
SCADA systems
SCADA configuration
resilience
pubcrawl
policy-based governance
PLC
Metrics
internet
integrated circuits
Industrial Control Systems
architectural root cause
industrial automation
improper input validation
ICS systems
human-machine interfaces
Human Factors
Human behavior
disclosed software vulnerabilities
Data mining
data acquisition
control systems
computer architecture
component-based architectures
common security architectural weaknesses
common architectural security weaknesses
authorisation
biblio
Zero-Trust Hierarchical Management in IoT
Submitted by grigby1 on Mon, 08/05/2019 - 11:39am
IoT networks
Zero-Trust Management
zero-trust hierarchical mining process
zero-trust hierarchical management
zero trust
Scalability
Resiliency
resilience
Reliability
pubcrawl
policy-based governance
middleware
blockchain
Internet of Things
Human Factors
Human behavior
Hierarchical Mining
exponential scalability
edge computing
Data mining
contracts
constrained infrastructure
computer network management
blockchain-based middleware
biblio
Tree-Based Classification to Users' Trustworthiness in OSNs
Submitted by grigby1 on Mon, 08/05/2019 - 11:35am
collaboration
Data mining
false trust
machine learning
policy-based governance
pubcrawl
resilience
Resiliency
Scalability
social media
trust
Twitter
users' trustworthiness
biblio
A Multi-Classifier Framework for Open Source Malware Forensics
Submitted by grigby1 on Mon, 07/01/2019 - 10:06am
pattern classification
machine learning models
malware
malware analysis reports
malware attacks
malware forensics
manual analysis
multiclassifier framework
open source malware forensics
open source malware sandbox
machine learning algorithms
pubcrawl
resilience
Resiliency
Scalability
Security Heuristics
security of data
traditional anti-virus technologies
Training
ever-evolving threats
Bayes methods
computer network security
computer viruses
cyber attack pattern
Cyber Attacks
data cleaning
Data mining
Data models
automated manner
extensive pre-modeling techniques
feature extraction
future cyber threats
Gaussian Naive Bayes classifier
heuristics updates
invasive software
learning (artificial intelligence)
machine learning
biblio
A Parallel Proof of Work to Improve Transaction Speed and Scalability in Blockchain Systems
Submitted by grigby1 on Fri, 06/28/2019 - 10:37am
nonce
transactions
transaction verification process
transaction speed
solo mining
software engineering
scalable verification
Scalability
reward system
Resiliency
resilience
pubcrawl
Proof of Work
parallel processing
parallel mining
bitcoin
Metrics
financial sector
financial data processing
distributed ledger
distributed consensus
Data mining
cryptocurrency
cryptocurrencies
Compositionality
blockchain systems
blockchain
Bitcoin mining
Bitcoin cryptocurrency
biblio
Static and Dynamic Malware Analysis Using Machine Learning
Submitted by aekwall on Mon, 06/24/2019 - 2:41pm
Internet oriented machines security
summary information
static malware analysis
static analysis
sandboxing
Resiliency
registry keys changed
pubcrawl
PEFILE
obfuscate
Metrics
malwares
malware
machine learning
learning (artificial intelligence)
invasive software
Malware Analysis
Human behavior
feature extraction
evade
Dynamic Malware Analysis
dynamic analysis
DLLs
Data mining
cuckoo sandbox
Classification algorithms
Binary
application program interfaces
APIs
privacy
Predictive Metrics
biblio
An Automata-based Security Policy Translation for Network Security Functions
Submitted by aekwall on Mon, 06/17/2019 - 10:21am
Network Security Architecture
security policy translator
security policy translations
security policies
security of data
security controller
security
Resiliency
pubcrawl
Production
policy-based governance
Policy Translation
automata
IP networks
interface to network security functions
I2NSF user
I2NSF framework
Generators
Data models
Data mining
creating policies
computer network security
automata-based security policy translation
automata theory
biblio
Optimal Machine Learning Algorithms for Cyber Threat Detection
Submitted by grigby1 on Mon, 06/10/2019 - 1:56pm
Regression
Logistics
machine learning
machine learning algorithms
minimisation
ML-based analytics
Numerical Clustering
optimal machine learning algorithm
prediction
privacy
pubcrawl
learning (artificial intelligence)
resilience
Resiliency
security
security data
security log analytics
security logs
security machine data
security of data
SoC
Decision trees
Anomaly Detection
automated cyber threat detection
classification
Classification algorithms
Clustering algorithms
composability
cyber security
cyber threat detection model
Data mining
data science
advanced targeted cyber threats
deep learning
Dimensionality
efficient machine
Ensemble Learning
exponential hike
false detection rates
false-positive detections
global Security Operations Center environments
Kernel
« first
‹ previous
…
18
19
20
21
22
23
24
25
26
…
next ›
last »