Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data mining
biblio
Bipartite network model for inferring hidden ties in crime data
Submitted by grigby1 on Tue, 03/07/2017 - 1:30pm
hidden ties inference
vertex level metrics
underground forum data
underground forum
structural analysis
standard network algorithm
Social network services
security of data
relationship mapping
pubcrawl170109
pharmaceutical crime
organised criminal network
network analysis
Measurement
law enforcement
Algorithm design and analysis
group identification
disruption strategies
Data mining
cyber criminals
criminal networks
criminal group structural organisation
criminal datasets
crime data
community structure
community analysis
bipartite network model
bipartite network
Artificial Intelligence
Analytical models
biblio
Pareto Inspired Multi-objective Rule Fitness for Adaptive Rule-based Machine Learning
Submitted by grigby1 on Tue, 03/07/2017 - 1:05pm
classifier systems
Data mining
fitness evaluation
machine learning
Multi-Objective Optimization
pubcrawl170201
biblio
Malicious URL prediction based on community detection
Submitted by grigby1 on Mon, 02/27/2017 - 12:56pm
malicious URL prediction
Uniform resource locators
traditional anti-virus technology
static analysis
pubcrawl170108
pubcrawl170107
program diagnostics
network bandwidth
Monitoring
Mobile communication
malware
anti-virus
Malicious URL
graph-based method
graph theory
dynamic monitoring
Data mining
computer viruses
community detection
association rules
association rule
biblio
"An Artificial Intelligence-Based Trust Model for Pervasive Computing"
Submitted by grigby1 on Thu, 02/23/2017 - 12:56pm
human-like decision making
user trustworthiness
ubiquitous computing scenarios
ubiquitous computing
Trusted Computing
trust model
security
pubcrawl170105
pervasive computing
pattern classification
network interactions
naïve Bayes classifier
Itemsets
Apriori algorithm
effective trust model
Decision Making
Data mining
computers arena
computational services distribution
Computational modeling
Classification algorithms
behavioral patterns
Bayes methods
artificial intelligence-based trust model
Artificial Intelligence
biblio
"DIVa: Decentralized identity validation for social networks"
Submitted by grigby1 on Thu, 02/23/2017 - 12:05pm
learning (artificial intelligence)
user profile attribute
social networking (online)
Social network services
security
real-world OSN dataset
pubcrawl170105
Privacy-preserving Learning
privacy preservation
privacy
online social network
mining technique
association rules
fine-grained community-aware correlation
Ensemble Learning
DIVa
Decentralized Online Social Networks
decentralized learning approach
decentralized identity validation
data privacy
Data mining
Correlation
Computational modeling
Community-aware Identity Validation
biblio
"Securing the Clustered Database Using Data Modification Technique"
Submitted by grigby1 on Thu, 02/23/2017 - 12:02pm
Distributed databases
weka tool
standards
security of data
security
pubcrawl
Privacy preserving protocols
pattern clustering
online media
Iris
information protection
clustering
Distributed Database
distributed clustered database environments
database clustering
Data protection
pubcrawl170105
data privacy
data modification
Data mining
computer science
biblio
"De-identification of Textual Data Using Immune System for Privacy Preserving in Big Data"
Submitted by grigby1 on Thu, 02/23/2017 - 11:45am
immune systems
textual data de-identification
text analysis
specific immune system algorithm
security
pubcrawl170105
privacy preserving
privacy
Informatics
Big Data
Immune system
de-identification
data privacy
Data models
Data mining
Cryptography
CLONALG
biblio
"FCCE: Highly scalable distributed Feature Collection and Correlation Engine for low latency big data analytics"
Submitted by abfox on Tue, 02/14/2017 - 1:28pm
highly scalable distributed feature collection and correlation engine analysis engine
time windows
security of data
security intelligence
security analytics
real-time systems
query processing
pubcrawl170101
production network query
low latency query responses
low latency Big Data analytics
IP networks
advanced persistent threat infection detection
geographically distributed large data sets
fluxing domain name detection
Feature Selection
feature extraction
FCCE
Distributed databases
Data mining
cyber security domain
Correlation
computer security
Big Data
biblio
"Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data"
Submitted by abfox on Tue, 02/14/2017 - 12:41pm
internet
Web proxy logs
system-on-chip
Servers
security products
pubcrawl170101
malware strains
malware
Los Alamos National Lab
large-scale log data mining
LANL
IP networks
invasive software
advanced persistent threat
graph theory
Electronic mail
early-stage enterprise infection detection
early-stage APT infection
DNS logs
Data mining
data analysis
business data processing
belief propagation
belief networks
APT infection attacks
advanced persistent threats
biblio
"Persistent threat pattern discovery"
Submitted by abfox on Tue, 02/14/2017 - 12:36pm
Government
security of data
pubcrawl170101
persistent threat pattern discovery
persistent threat identification
Persistent Threat (PT)
network data
IP networks
Intrusion Detection Systems
Intrusion Detection
advanced persistent threat
frequent pattern discovery
Data mining
cyber-attack
association rules
Association Rule Mining (ARM)
association rule mining
arm
APT
Advanced Persistent Threat (APT)
« first
‹ previous
…
28
29
30
31
32
33
34
35
36
next ›
last »