Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network analysis
biblio
NAMData: A Web-application for the Network Analysis of Microbiome Data
Submitted by aekwall on Fri, 08/12/2022 - 3:57pm
community detection
Zero Treatment
Taxa Filtration
normalization
Network Visualization
Network analyzers
network analysis
Microbiome Data
Metagenomics
feature extraction
Centrality
Compositionality
pubcrawl
Correlation
programming
Pipelines
Data visualization
Knowledge engineering
biblio
Anonymity Analysis of Bitcoin, Zcash and Ethereum
Submitted by grigby1 on Wed, 02/09/2022 - 2:47pm
zero knowledge proof
standards
smart contracts
Resiliency
resilience
pubcrawl
network analysis
Metrics
Memory
Internet of Things
Human behavior
composability
blockchain
bitcoin
anonymity
forum
NEW OPEN ACCESS JOURNAL: IEEE Open Journal of Control Systems (OJCS)
Submitted by ve.rodriguez066 on Thu, 10/07/2021 - 12:48pm
General Announcements
Information theory and control
Systems Biology
stochastic systems
social networks
Smart Grids
robotics
Resilient Control Systems
optimization
system analysis stability and control
Network analysis and control
and control
stability
network analysis
mechatronics
Machine Learning and control
adaptive systems
Human in the loop systems
Healthcare and medical systems
formal verification synthesis
economic systems
finance
embedded systems
delay systems
decision theory
computational methods
Biomolecular systems
Communication networks
Cognitive systems and their control
Agents and Autonomous systems
biblio
Abnormal transaction detection of Bitcoin network based on feature fusion
Submitted by grigby1 on Tue, 03/09/2021 - 2:49pm
Anomaly Detection
bitcoin
blockchain
data analysis
feature extraction
Feature fusion
History
Human behavior
network analysis
pubcrawl
Scalability
security
tools
biblio
Wormhole Attack Detection using Energy Model in MANETs
Submitted by grigby1 on Thu, 10/29/2020 - 11:22am
node energy
dynamic route discovery
dynamic route request
encrypted values
energy level
energy model
high power transmission
intruder nodes
network analysis
dynamic request
NS2 simulator
packet drop ratio
performance curves
static table driven technique
unsecure transmission
wormhole attack detection
MANET Attack Detection
wormhole attacks
pubcrawl
Metrics
resilience
Resiliency
telecommunication network routing
Compositionality
network communication
wormhole attack
Cryptography
AODV
end to end delay
MANETs
mobile ad hoc networks
AODV routing
Apptool
Apptool simulator
biblio
Insider Threat Detection Through Attributed Graph Clustering
Submitted by grigby1 on Tue, 12/12/2017 - 1:23pm
Insider Threats
trusted source
security of data
security
Resiliency
pubcrawl
psychology
policy-based governance
pattern clustering
outlier ranking mechanism
Organizations
organizational dynamics
network analysis
Metrics
malicious insider access
malicious attacker unpredictability
Anomaly Detection
Insider Threat Detection
Human Factors
Human behavior
heterogeneous data analysis
graph theory
enterprise users
Electronic mail
data analysis
cybersecurity threats
collaboration
Clustering algorithms
business data processing
Bipartite graph
attributed graph clustering
biblio
Significance Analysis for Edges in a Graph by Means of Leveling Variables on Nodes
Submitted by grigby1 on Fri, 09/15/2017 - 11:03am
Centrality
graph theory
Human behavior
Malware Analysis
Metrics
network analysis
privacy
pubcrawl
Resiliency
biblio
Consensus Speed Maximisation in Engineered Swarms with Autocratic Leaders
Submitted by grigby1 on Fri, 08/18/2017 - 2:08pm
composability
Compositionality
consensus speed
network analysis
pubcrawl
swarm engineering
Swarm Intelligence
biblio
Entropy clustering approach for improving forecasting in DDoS attacks
Submitted by grigby1 on Tue, 03/07/2017 - 1:44pm
pattern clustering
forecasting theory
FPR
IDS
intrusion detection system
k-means clustering analysis
network analysis
network security
online anomaly detection
forecasting
Ports (Computers)
proactive forecast
project industrial partner
pubcrawl170109
Shannon entropy
Shannon-entropy concept
volume anomaly
alert management
feature extraction
false positive rate
entropy clustering approach
Entropy
distributed denial-of-service (DDoS) detection
distributed denial-of-service
Digital Forensics
digital forensic analysis
DDoS Attacks
cyber-range simulation dataset
computer network security
Computer crime
Clustering algorithms
clustering algorithm
Algorithm design and analysis
biblio
Bipartite network model for inferring hidden ties in crime data
Submitted by grigby1 on Tue, 03/07/2017 - 1:30pm
hidden ties inference
vertex level metrics
underground forum data
underground forum
structural analysis
standard network algorithm
Social network services
security of data
relationship mapping
pubcrawl170109
pharmaceutical crime
organised criminal network
network analysis
Measurement
law enforcement
Algorithm design and analysis
group identification
disruption strategies
Data mining
cyber criminals
criminal networks
criminal group structural organisation
criminal datasets
crime data
community structure
community analysis
bipartite network model
bipartite network
Artificial Intelligence
Analytical models
1
2
3
next ›
last »