Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data mining
biblio
Non-Repudiable Provable Data Possession Scheme With Designated Verifier in Cloud Storage Systems
Submitted by grigby1 on Wed, 05/16/2018 - 1:47pm
provable data possession
Metrics
non-repudiation
nonrepudiable PDP scheme
nonrepudiable provable data possession scheme
nonrepudiation issue
outsourced data
private auditability
private verifier
human factor
pubcrawl
Repudiation
resilience
Resiliency
security
Servers
storage management
associated tags
Human behavior
DV-PDP schemes
digital signatures
designated verifier
Data models
Data mining
data integrity
concrete DV-NRPDP scheme
Computational modeling
composability
cloud storage systems
cloud storage server
cloud storage
Cloud Computing
Cascading style sheets
biblio
Session Based Behavioral Clustering in Open World Sandbox Game TUG
Submitted by grigby1 on Wed, 05/09/2018 - 2:54pm
clustering
collaboration
composability
Data mining
open world sandbox games
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
pubcrawl
sandboxing
user behavioral clustering
biblio
A security aware scheduling in fog computing by hyper heuristic algorithm
Submitted by K_Hooper on Wed, 05/09/2018 - 11:03am
scheduling
Internet of Things
job scheduling
latency
Processor scheduling
pubcrawl
Resiliency
resource allocation
Scalability
integrity parameter
security
security aware scheduling
Security Heuristics
security of data
security overhead
sensor nodes
Task Analysis
data mining technique
authorisation
average energy consumption
Cloud Computing
computational overhead
confidentiality parameter
CPU utilization
data integrity
Data mining
authentication parameter
edge computing
Fog computing
fog devices
heterogeneous distributed environment
heuristic algorithm
Heuristic algorithms
hyper heuristic algorithm
biblio
A heuristic attack detection approach using the \#x201C;least weighted \#x201D; attributes for cyber security data
Submitted by K_Hooper on Wed, 05/09/2018 - 11:02am
learning (artificial intelligence)
telecommunication traffic
Support vector machines
Security Heuristics
Scalability
Resiliency
pubcrawl
pattern classification
network traffic data
network systems
network intrusion detection
machine-learning techniques
machine learning
least weighted attributes
Cloud Computing
Intrusion Detection
heuristic attack detection approach
Feature Selection
feature extraction
Entropy
dimensionality problem
dimensional reduction
Data mining
cyber security data
cyber security
computer network security
Computational modeling
cloud-based computer networks
biblio
Accelerated Stochastic Gradient Method for Support Vector Machines Classification with Additive Kernel
Submitted by grigby1 on Tue, 05/01/2018 - 11:38am
machine learning
Training
testing
SVM classification
support vector machines classification
Support vector machines (SVMs)
Support vector machines
Stochastic processes
Resiliency
resilience
pubcrawl
polynomials
pattern classification
Nesterov's acceleration strategy
mini-batch stochastic gradient descent
Metrics
accelerated mini-batch stochastic gradient descent algorithm
linear classifier
learning (artificial intelligence)
Kernel
gradient methods
gradient approximation
Data mining
composability
Classification algorithms
Additives
additive kernel version
additive kernel
acceleration strategy
Acceleration
accelerated stochastic gradient method
biblio
A Case Study for Automatic Detection of Steganographic Images in Network Traffic
Submitted by grigby1 on Tue, 05/01/2018 - 11:33am
Image coding
telecommunication traffic
steganography detection
Steganography
steganographic images
statistical signature based steganalysis algorithms
pubcrawl
privacy
open source tool
network traffic
Metrics
Media
internet
Algorithm design and analysis
embedded messages
Data mining
data encapsulation
data breach prevention
data breach detection
Cryptography
cover file
corporate networks
concealed data
composability
automatic detection
biblio
Rethinking the High Capacity 3D Steganography: Increasing Its Resistance to Steganalysis
Submitted by grigby1 on Tue, 05/01/2018 - 11:33am
Mathematical model
Three-dimensional displays
stereo image processing
steganography detection
Steganography
steganalysis
shape distortion
Resistance
pubcrawl
privacy
Metrics
3D shape
Information hiding
Image edge detection
high capacity 3D steganographic method
Hamiltonian path quantization
Face
distortion
Data mining
composability
3D steganography
biblio
Extracting Cyber Threat Intelligence from Hacker Forums: Support Vector Machines versus Convolutional Neural Networks
Submitted by grigby1 on Wed, 04/11/2018 - 2:49pm
learning (artificial intelligence)
vital information
threat vectors
text classification
Support vector machines
relevant threat intelligence
relevant threat information
pubcrawl
privacy
pattern classification
Open-Source Intelligence
Metrics
machine learning
Learning systems
Computer crime
hacker forums
hacker forum
feedforward neural nets
error-prone process
Data mining
Cyber Threat Intelligence (CTI)
cyber threat intelligence
cyber security threats
cyber security
convolutional neural networks
Convolutional Neural Network algorithms
Computer hacking
biblio
Dynamic Malware Detection Using API Similarity
Submitted by grigby1 on Mon, 04/02/2018 - 12:33pm
malware
user-confidential information
Trojans
Trojan horses
trojan
tools
Sea measurements
Resiliency
resilience
pubcrawl
pattern matching
malware-detection method
malware samples
Malware Analysis
API
invasive software
information security
Hacker
feature extraction
dynamic Malware detection method
Data mining
credit card details
credit card
Computer crime
Compositionality
application program interfaces
APIs
API similarity
biblio
Fine Tuning Lasso in an Adversarial Environment against Gradient Attacks
Submitted by grigby1 on Mon, 03/19/2018 - 1:59pm
robust classifier
known weaknesses
labeled training data
learning (artificial intelligence)
Metrics
optimization
pattern classification
probability
pubcrawl
resilience
Resiliency
Input variables
Scalability
security of data
single convex optimization
source domain
supervised learning
Synthetic Data
Task Analysis
testing
Toxicology
Training
data set testing
adversarial data
adversarial environment
adversarial learning research
adversarial learning setting
Adversarial Machine Learning
Adversary Models
convex programming
data analysis
Data mining
data mining algorithms
adversarial component
data testing
domain adaptation
domain adaption
feature extraction
Feature Selection
fine tuning lasso
fixed probability distribution
gradient attacks
Human behavior
« first
‹ previous
…
23
24
25
26
27
28
29
30
31
…
next ›
last »