Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Credit cards
biblio
Detection method of phishing email based on persuasion principle
Submitted by grigby1 on Thu, 10/13/2022 - 12:16pm
feature extraction
machine learning
security
pubcrawl
Human behavior
Phishing
Electronic mail
Market research
Credit cards
passwords
persuasion principle
phishing email detection
biblio
A StackNet Based Model for Fraud Detection
Submitted by aekwall on Fri, 05/06/2022 - 12:56pm
Credit cards
expandability
Stacked
LightGBM
GradientBoosting
fraud detection
CatBoost
Forestry
information management
Measurement
network architecture
Random Forest
Companies
Compositionality
Resiliency
pubcrawl
Training
biblio
Phishing Detection Using Machine Learning Technique
Submitted by aekwall on Mon, 11/08/2021 - 3:23pm
password
Support vector machines
machine learning
pubcrawl
privacy
standards
Phishing
Credit cards
electronic commerce
principal component analysis
support vector machine
Web
threat vectors
Measurement
biblio
Anomaly Detection with Autoencoder and Random Forest
Submitted by grigby1 on Tue, 03/30/2021 - 11:51am
Anomaly Detection
autoencoder
Computational modeling
Credit cards
deep learning
feature extraction
ICS Anomaly Detection
pubcrawl
Radio frequency
Random Forest
random forests
resilience
Resiliency
Scalability
tuning
biblio
Identity theft on e-government/e-governance digital forensics
Submitted by grigby1 on Fri, 10/16/2020 - 11:22am
Neural networks
fraudulent transactions
genetic algorithms
Government
government data processing
governments
identity theft
internet
Law
malicious online activity
fraud
policy-based governance
product reviews
pubcrawl
resilience
Resiliency
system intrusions
time 13.0 month
user anonymity
Cybercrime
collaboration
Computer crime
corporate users
credit card fraud
credit card transactions
Credit cards
credit transactions
cyber-threats
blockchain technology
Cybersecurity
cyberspace-low entry barriers
Digital Forensics
E-Governance
E-Government
electronic commerce
Electronic government
financial fraud
biblio
Modeling and Reducing the Attack Surface in Software Systems
Submitted by grigby1 on Fri, 08/28/2020 - 11:50am
reduction
system
Software systems
software system
Software
sensitive
security vulnerabilities
security of data
security
Scalability
Resiliency
resilience
attack surface
pubcrawl
Organizations
Metrics
location
Graphical Model
graph theory
Data models
data
Credit cards
Computational modeling
biblio
Fraud Detection using Machine Learning and Deep Learning
Submitted by aekwall on Mon, 08/24/2020 - 1:37pm
credit card
Europe
Forestry
Credit cards
area under the ROC curve
Australian dataset
autoencoder
benchmark multiple machine learning methods
Boltzmann machines
cost of failure
financial data processing
data mining techniques
Deep belief networks
EU
European dataset
German dataset
k nearest neighbor
Matthews correlation coefficient
restricted boltzmann machine
security checks
pattern classification
Support vector machines
support vector machine
learning (artificial intelligence)
machine learning
Random Forest
Resiliency
pubcrawl
composability
deep learning
Data models
convolutional neural nets
deep learning methods
Data mining
convolutional neural networks
Artificial Neural Networks
belief networks
fraud
fraud detection
biblio
A Scalable (\$\textbackslashtextbackslashalpha, k\$)-Anonymization Approach using MapReduce for Privacy Preserving Big Data Publishing
Submitted by grigby1 on Fri, 08/07/2020 - 3:47pm
big data privacy
Velocity of data
timely anonymization
scenarios efficient anonymization
Scalable k-Anonymization approach
Scalable k-Anonymization (SKA)
scalable anonymization approach
Publishing
privacy preserving big data publishing
privacy preserving approaches scalability
MapReduce based Anonymization (MRA)
k-anonymity
data publishing approaches
Credit cards
security of data
anonymity
AI
Government
Scalability
Big Data
privacy issues
privacy
data privacy
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
biblio
Using Probabilistic Attribute Aggregation for Increasing Trust in Attribute Assurance
Submitted by aekwall on Mon, 07/13/2020 - 11:19am
online services
aggregation model
attribute aggregation method
attribute assurance
Credit cards
decentralized peer to peer scheme
Digital identity
identity assurance
identity management attribute aggregation
Aggregates
probabilistic attribute aggregation
self-sovereign identity solutions
Service Provisioning
statistical distributions
trust demand
trust requirement
trusted third party
trust
Trusted Computing
Resiliency
pubcrawl
composability
Peer-to-peer computing
internet
authentication
service providers
security of data
Probabilistic logic
Logic gates
trust model
Identity management
Identity provider
probability distributions
web of trust
biblio
Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops
Submitted by grigby1 on Tue, 03/07/2017 - 1:43pm
hacker Web
Web sites
vulnerabilities
threats
threat identification
Servers
pubcrawl170109
online hacker communities
machine learning methodology
learning (artificial intelligence)
IRC channels
information retrieval techniques
information retrieval
carding shops
Hacker IRC
hacker forums
Cybersecurity
cybercriminals
cyber threat detection
cyber security
cyber defenses
Credit cards
Computer hacking
Computer crime
Communities
1
2
next ›
last »