Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
hybrid approach
biblio
Towards the Detection of Phishing Attacks
Submitted by grigby1 on Thu, 10/13/2022 - 12:15pm
IP networks
pubcrawl
Human behavior
Browsers
blacklisting
Phishing
Web pages
Electronic mail
Uniform resource locators
social engineering
Anti-phishing approaches
evasion techniques
hybrid approach
Phishing types
biblio
Evaluation of Collaborative Filtering Based Recommender Systems against Segment-Based Shilling Attacks
Submitted by aekwall on Mon, 03/23/2020 - 1:30pm
CF techniques
stand-alone rating user-based recommendation
stand-alone rating item-based recommendation
segmentation attack
segment-focused attack
segment-based shilling attacks
push attack
prediction shift
nuke attack
hybrid system
hybrid approach
F-measure
collaborative filtering based recommender systems
security of data
binary rating
binary collaborative filtering
Accuracy
recommender systems
recommender system
Human Factors
Vulnerability
collaborative filtering
pubcrawl
Resiliency
Scalability
biblio
A Secure Autonomic Mobile Ad-Hoc Network Based Trusted Routing Proposal
Submitted by grigby1 on Wed, 02/26/2020 - 4:34pm
Scalability
Mobile Ad-hoc Network host
mobile radio
packet count
privacy
Protocols
pubcrawl
Resiliency
route detection
route discovery
Routing
Routing protocols
Mobile Ad-Hoc Network (MANET)
Secure Autonomic Mobile Ad-hoc Network
telecommunication network routing
trust administration approach
Trust estimation dependent
trust management approach
trust organization approaches
Trust Routing
trusted path
trusted Routing proposal
wireless sensor networks
Informatics
Adaptive Information Dissemination (AID)
attacker
composability
Compositionality
data privacy
Data Transmission
different occurrences ease
direction-finding procedure
fuzzy trust approach
hybrid approach
inaccessible systems
Adaptive Information Dissemination
information dissemination
internet
Internet of Things
Internet of Things (IoT)
Internet of Things gadgets
IoT
MANET Attack Detection
manet privacy
Metrics
mobile ad hoc networks
biblio
Hybrid Approach for Intrusion Detection Using Fuzzy Association Rules
Submitted by grigby1 on Wed, 05/01/2019 - 11:29am
reduced dataset
Intrusion Detection
intrusion detection system
Metrics
misuse detection
network technologies
pattern clustering
pubcrawl
rapid development
Internet rapid development
resilience
Resiliency
security
security of data
Time complexity
Training
weighted fuzzy C-mean clustering algorithm
Anomaly Detection
input data space
hybrid approach
Fuzzy sets
fuzzy set theory
fuzzy logic scheme
Fuzzy logic
fuzzy association rules
feature extraction
deep learning
decrease resource utilization
Decision Making
considerable increase
computer networks
Clustering algorithms
anomaly intrusions
biblio
HyDroid: A Hybrid Approach for Generating API Call Traces from Obfuscated Android Applications for Mobile Security
Submitted by grigby1 on Mon, 04/02/2018 - 12:33pm
mobile computing
Static and Dynamic Analysis of Apps
static analysis
source code
security threats
security of data
security
Resiliency
resilience
Repackaging
Registers
reflection
pubcrawl
program diagnostics
obfuscated Android applications
Mobile Security
Android (operating system)
malware
Java
HyDroid
hybrid approach
Humanoid robots
dynamic analysis
Compositionality
application services
application program interfaces
APIs
API call trace generation
Androids
Android applications
Android API call traces
Android API