Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data mining
biblio
Inference of Suspicious Co-Visitation and Co-Rating Behaviors and Abnormality Forensics for Recommender Systems
Submitted by grigby1 on Thu, 04/08/2021 - 5:10pm
Scalability
Metrics
personalized collaborative recommender systems
pervasiveness
pubcrawl
rating intention
real-world data
recommender system
recommender systems
resilience
Resiliency
Measurement
security of data
spotting anomalies
structure-based property
suspicious co-visitation behavior
suspicious nodes
suspicious ratings
time series
Time series analysis
ubiquitous computing
unified detection framework
Forensics
Anomaly Detection
association rules
Attack detection
co-rating behaviors
co-rating graphs
collaboration
Couplings
Data mining
e-commerce services
electronic commerce
abnormality forensics
forensics metrics including distribution
fundamental vulnerabilities
graph theory
historical ratings
Human behavior
inference
information forensics
malicious attack
malicious attack behaviors
malicious users
biblio
Relating the Empirical Foundations of Attack Generation and Vulnerability Discovery
Submitted by aekwall on Thu, 04/08/2021 - 4:34pm
Payloads
vulnerability discovery
information foraging
automatic exploit generation
automatic attack generation
antivirus tool
Information Reuse and Security
security testing
security auditing
Trojan detection
Compositionality
anti-virus
security
computer viruses
Trojan horses
Data mining
Analytical models
program testing
tools
software security
pubcrawl
Resiliency
Data models
malware detection
biblio
DeepGuard: Deep Generative User-behavior Analytics for Ransomware Detection
Submitted by grigby1 on Tue, 03/30/2021 - 12:04pm
three-sigma limit rule
Organizations
pubcrawl
ransomware activity
ransomware criminals
ransomware detection
ransomware incidence report
security
system monitoring
neural nets
tools
Training
Training data
user activity
User behavior Analytics
user behavior modeling
WannaCry
Ransomware
learning (artificial intelligence)
invasive software
Informatics
Human Factors
Human behavior
file-interaction pattern logging
DeepGuard
deep generative user-behavior analytics
deep generative autoencoder architecture
Deep Autoencoders
Data mining
Cybersecurity
Attack detection
Compositionality
Resiliency
biblio
Tracing and detection of ICS Anomalies Based on Causality Mutations
Submitted by grigby1 on Tue, 03/30/2021 - 11:51am
Entropy
traceability of anomaly
security of data
Scalability
Resiliency
resilience
pubcrawl
production engineering computing
Microwave integrated circuits
information entropy
industrial control system
industrial control physics
industrial control
ICS Anomaly Detection
ICS anomalies
Anomaly Detection
Data mining
Correlation
control engineering computing
comparison algorithm
causality mutations
causality modeling
causality mining algorithm
causal network
causal modeling algorithm
causal anomaly detection
anomaly source traceable
anomaly node
anomaly location strategy
anomaly detection algorithm
biblio
MLTracer: Malicious Logins Detection System via Graph Neural Network
Submitted by grigby1 on Mon, 03/29/2021 - 1:15pm
Graph Neural Network
security
Scalability
real-time systems
pubcrawl
privacy
malicious logins detection
lateral movement
Human Factors
graph neural networks
Neural Network Security
expert systems
Data mining
convolutional neural networks
Conferences
co-attention mechanism
Metrics
policy-based governance
Resiliency
cyber-physical systems
biblio
Research and Application of Improved APRIORI Algorithm Based on Hash Technology
Submitted by aekwall on Mon, 03/29/2021 - 12:07pm
Resiliency
Data mining
pubcrawl
Improvement
Compositionality
file organisation
hash algorithms
Apriori algorithm
association rule mining algorithm
hash technology
biblio
An Improvement of Apriori Mining Algorithm using Linked List Based Hash Table
Submitted by aekwall on Mon, 03/29/2021 - 12:06pm
hash algorithms
LinkedList
linked list
Itemsets
improved apriori algorithm
Improved
important algorithms
Frequent item sets
frequent 1-item sets counts
find frequent item sets
association rules
apriori mining algorithm
apriori
Organizations
hash table
memory space
Compositionality
database management systems
pubcrawl
Random access memory
Data mining
Clustering algorithms
Databases
Resiliency
Classification algorithms
biblio
F-DPC: Fuzzy Neighborhood-Based Density Peak Algorithm
Submitted by aekwall on Mon, 03/22/2021 - 1:11pm
expandability
neighborhood membership
local density
fuzzy neighborhood-based density peak algorithm
fuzzy neighborhood relationship
fuzzy neighborhood density peak clustering
fuzzy neighborhood
F-DPC
degree of membership
Compositionality
Partitioning algorithms
data objects
Classification algorithms
Heuristic algorithms
pattern clustering
fuzzy set theory
Data mining
clustering
Clustering algorithms
Shape
Robustness
Licenses
pubcrawl
Resiliency
biblio
Modeling the Impact of Network Connectivity on Consensus Security of Proof-of-Work Blockchain
Submitted by grigby1 on Tue, 03/09/2021 - 2:50pm
proof-of-work blockchain
honest-majority
Human behavior
modeling analysis
network connectivity
network modeling
node behavior
Peer-to-peer computing
PoW blockchain
Probabilistic logic
honest-but-potentially-colluding
Protocols
pubcrawl
Scalability
security
security impact
security of data
Security Properties
telecommunication security
consensus voting power
Analytical models
bitcoin
blockchain
blockchain forks
blockchain system
central trusted authority
consensus protocol
consensus security
analytical model
Cryptographic Protocols
Cryptography
Data mining
design system
different adversary models
distributed consensus system
electronic money
financial data processing
biblio
An Automatic Detection and Analysis of the Bitcoin Generator Scam
Submitted by grigby1 on Tue, 03/09/2021 - 2:49pm
financial data processing
Web page
USD
security
search engines
scam instances
scam analysis
Scalability
pubcrawl
internet
Human behavior
generic system
Generators
free bitcoins
fraud detection
automatic detection
Data mining
cyberattack
Cryptography
cryptocurrency
cryptocurrencies
Crawlers
Computer crime
blockchain analysis
blockchain
bitcoin-based scam monitoring systems
bitcoin generator scam
bitcoin addresses
bitcoin
BGS
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »