Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data mining
biblio
Multiplicative Data Perturbation Using Fuzzy Logic in Preserving Privacy
Submitted by grigby1 on Tue, 09/19/2017 - 11:59am
cyber physical systems
Data mining
Data Perturbation
Fuzzy logic
Metrics
Multidimensional
privacy
pubcrawl
Resiliency
biblio
Compressing Graphs and Indexes with Recursive Graph Bisection
Submitted by grigby1 on Fri, 09/15/2017 - 11:03am
Algorithms
Approximation algorithms
Compression
Data mining
distributed algorithms
Experimentation
graph algorithms
graph theory
Human behavior
linear arrangement
Malware Analysis
Metrics
privacy
pubcrawl
Resiliency
social networks
biblio
Content-Agnostic Malware Detection in Heterogeneous Malicious Distribution Graph
Submitted by grigby1 on Fri, 09/15/2017 - 10:50am
Malware Analysis
semi-supervised learning
security
Scalability
Resiliency
pubcrawl
Metrics
malware mitigation
malware detection
Algorithm
label propagation
graph theory
edge detection
download activity graph
Data mining
composability
Bayesian inference
biblio
The Troll-Trust Model for Ranking in Signed Networks
Submitted by grigby1 on Wed, 08/02/2017 - 1:52pm
composability
Data mining
pubcrawl
ranking
Resiliency
signed networks
web of trust
biblio
Fast Mining of Large-Scale Logs for Botnet Detection: A Field Study
Submitted by grigby1 on Wed, 03/08/2017 - 2:32pm
information quality
Workstations
Servers
pubcrawl170112
proxy
normal data streams
network-based attack
mining
malwares
malware
logs
large-scale proxy log mining
invasive software
internet
information quantity
abnormal data streams
Heuristics
feature pattern
feature extraction
digital signatures
Data mining
computer network security
computer network behavioral analysis
Cloud Computing
C and C Servers
botnet life cycle
botnet detection methods
botnet
algorithmically generated domains
AGD
biblio
Educational Data Mining with Python and Apache Spark: A Hands-on Tutorial
Submitted by grigby1 on Tue, 03/07/2017 - 1:50pm
Big Data
Data mining
educational data mining
exploratory data analysis
learning analytics
machine learning
parallel computing
Predictive Analytics
pubcrawl170201
Python
simulation
Spark
visualization
biblio
ID2T: A DIY dataset creation toolkit for Intrusion Detection Systems
Submitted by grigby1 on Tue, 03/07/2017 - 1:41pm
intrusion detection dataset toolkit
user defined synthetic attacks
telecommunication traffic
security of data
pubcrawl170109
Ports (Computers)
network traffic
network attacks
labeled dataset creation
IP networks
Intrusion Detection Systems
Computer crime
Intrusion Detection
IDS
ID2T
Entropy
DIY dataset creation toolkit
defense tool
Data visualization
data visualisation
Data mining
cyber-attacks
biblio
Identifying digital threats in a hacker web forum
Submitted by grigby1 on Tue, 03/07/2017 - 1:39pm
Discussion forums
Social network services
sentiment analysis tool
sentiment analysis
query processing
pubcrawl170109
parts of speech tagger
natural language processing
malicious hackers
internet
HTML
Hacking
hacker Web forum
hacker language analysis
discussion posts
automated analysis tools
digital threat identification
Databases
data systems
data querying
Data mining
cyber-attacks
customized Web-crawler
critical infrastructures
critical infrastructure
critical computer networks
Computer hacking
Computer crime
communication platform
biblio
DC scanner: Detecting phishing attack
Submitted by grigby1 on Tue, 03/07/2017 - 1:33pm
hypermedia markup languages
who is command
Web pages
visualization
URL verification
Servers
Script scanning
script codes
pubcrawl170109
phishing attack probability
internet
Computer crime
HTML contents
Electronic mail
e-mail based phishing attack detection
domain related authority details
domain name
DC scanner
Data mining
data analysis
cyber-attacks
Content analysis
biblio
Internet of Vulnerable Things (IoVT): Detecting Vulnerable SOHO Routers
Submitted by grigby1 on Tue, 03/07/2017 - 1:33pm
internet
vulnerable SOHO router detection
vulnerabilities
telecommunication network routing
SOHO routers
Servers
pubcrawl170109
Object recognition
man-in-the-middle attacks
IP networks
Internet of Vulnerable Things
Internet of Things
ASN space
information security
Indian autonomous system number space
domain name space settings
DNS settings
DNS information extraction
DNS Changer
Data mining
consumer grade small scale routers
computer network security
Computer crime
attack patterns
« first
‹ previous
…
27
28
29
30
31
32
33
34
35
…
next ›
last »