Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Expectation Regulated
biblio
Analyst Intuition Inspired High Velocity Big Data Analysis Using PCA Ranked Fuzzy K-Means Clustering with Multi-Layer Perceptron (MLP) to Obviate Cyber Security Risk
Submitted by grigby1 on Wed, 11/14/2018 - 1:21pm
pattern classification
learning (artificial intelligence)
log history annotation
malware
malware attacks
manually labelled data
MLP
Monitoring
Multi-layer Perceptron (MLP)
multilayer perceptrons
network datasets
network protocols
network user
neural network classifier multilayer perceptron base
IP networks
pattern clustering
PCA ranked fuzzy k-means clustering
principal component analysis
Principal Component Analysis (PCA)
pubcrawl
resilience
Resiliency
Scalability
scoring system
security
special semisupervise method
statistical data generation
Virus
cyber threats
analyst intuition inspired high velocity big data analysis
Artificial Intelligence
attacker IP addresses characteristics
Big Data
Clustering algorithms
computer networks
computer network security
computer security
cyber-attacks
cyber security
cyber security expert
cyber security log classification
cyber security risk
Analyst Intuition
data analysis
Data mining
efficient security monitoring system
Expectation Regulated
expert system
expert systems
Fuzzy k-means (FKM)
fuzzy set theory
High Velocity
Human behavior
integrated datasets
invasive software
biblio
Analyst Intuition Based Hidden Markov Model on High Speed, Temporal Cyber Security Big Data
Submitted by grigby1 on Wed, 11/14/2018 - 1:21pm
Resiliency
HMM state
Human behavior
IP addresses
malware
Multi-layer Perceptron (MLP)
network protocols
Principal Component Analysis (PCA)
probabilistic models
pubcrawl
resilience
High Velocity
Scalability
scoring system
security
security attacks
security of data
statistical data
temporal cyber security big data
time series
unsure attack
Virus
Data mining
attacker
Big Data
Clustering algorithms
computer security
cyber security
cyber security attack
cyber security data
cyber security expert
cyber security log
data analysis
Analyst Intuition
Data models
Expectation Regulated
expert systems
forecasting time series data
fuzzy k mean cluster
Fuzzy k-means (FKM)
fuzzy set theory
hidden Markov model
Hidden Markov Model (HMM)
Hidden Markov models