Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
regression analysis
biblio
Reputation Metrics Design to Improve Intermediary Incentives for Security of TLDs
Submitted by grigby1 on Tue, 05/01/2018 - 11:22am
Phishing
unsolicited e-mail
top-level domains security
top-level domains
TLDs security
statistical regression model
software metrics
Servers
security performance measurement
security
reputation metrics design
reputation metrics
regression analysis
phishing datasets
Computer crime
Measurement
malware datasets
malware
IP networks
invasive software
internet
intermediary incentives
Feeds
Ecosystems
domain name system
domain abuse
DNS ecosystem
cybercriminals
biblio
Reputation Metrics Design to Improve Intermediary Incentives for Security of TLDs
Submitted by grigby1 on Mon, 04/30/2018 - 3:09pm
Phishing
unsolicited e-mail
top-level domains security
top-level domains
TLDs security
statistical regression model
software metrics
Servers
security performance measurement
Security Metrics
security
reputation metrics design
reputation metrics
regression analysis
pubcrawl
phishing datasets
Computer crime
Metrics
Measurement
malware datasets
malware
IP networks
invasive software
internet
intermediary incentives
Feeds
Ecosystems
domain name system
domain abuse
DNS ecosystem
cybercriminals
biblio
Application of Generalized Regression Neural Network in Cloud Security Intrusion Detection
Submitted by grigby1 on Mon, 04/02/2018 - 12:39pm
Metrics
security of data
robots
Resiliency
resilience
regression analysis
pubcrawl
policy-based governance
pattern clustering
pattern classification
neural nets
network intrusion behavior modes
network intrusion
Artificial Neural Networks
learning (artificial intelligence)
Intrusion Detection
intrusion data
Intelligent systems
individual owned invasion category
Hafnium compounds
generalized regression neural network clustering analysis
generalized regression neural network
data training
clustering training samples
cloud security intrusion detection
Cloud Security
biblio
A Regression Model Based Approach for Identifying Security Requirements in Open Source Software Development
Submitted by grigby1 on Mon, 03/05/2018 - 1:08pm
open source software development
up-front RE
textual information retrieval techniques
testing
software engineering
security requirements identification methods
security requirements identification
security of data
security
Resiliency
resilience
requirements engineering
regression model based approach
regression analysis
pubcrawl
OSS projects
coding theory
Open Source Software
Metrics
Measurement
Logistics
logistic regression
lightweight representation
just-in-time requirements engineering
information retrieval
Formal Specification
Cryptography
Compositionality
Complexity theory
comment writing
comment security aspect
biblio
Evaluation of Automated Identity Masking Method (AIM) in Naturalistic Driving Study (NDS)
Submitted by grigby1 on Tue, 01/23/2018 - 4:02pm
image annotation
video signal processing
video data
vehicles
signal detection theory
signal detection
Resiliency
regression analysis
pubcrawl
personalized supervised bilinear regression method
NDS
naturalistic driving study
mirrors
Image edge detection
action perception
FAT mask
facial behavior annotation
facial action transfer deidentification algorithm
face recognition
Face
edge-detection filter
edge detection
driver information systems
composability
Automated Response Actions
automated identity masking method
Algorithm design and analysis
AIM
biblio
Exploring linguistic features for extremist texts detection (on the material of Russian-speaking illegal texts)
Submitted by K_Hooper on Wed, 01/10/2018 - 11:14am
Scalability
psycholinguistic features
pubcrawl
Random Forest
regression analysis
Resiliency
Russian language
Russian legislation
Russian-speaking illegal text material
psych olinguistic features
semantic features
Semantics
Social network services
Support vector machines
Terrorism
text analysis
text classification
text detection
Human behavior
Bayes methods
classification methods
classification quality
Dictionaries
differentiating feature
extremist texts
feature extraction
gradient boosting
automatic extremist text detection
learning (artificial intelligence)
linear SVM
linguistic features
logistic regression
multinomial naive Bayes
natural language processing
pattern classification
Pragmatics
biblio
Linear regression based multi-state logic decomposition approach for efficient hardware implementation
Submitted by grigby1 on Thu, 12/28/2017 - 1:17pm
pattern matching
multi-valued logic
multistate logic decomposition approach
multivalued logic
multivalued logic circuits
multivalued minterms
MVL decomposition
nanoelectronics
Nanoscale devices
more-than-Moore scaling
polynomials
pubcrawl
quaternary sum circuit
regression analysis
technology mapping
visual pattern matching
word length 4 bit
decision diagrams
binary CMOS
binary switches
CMOS adder
CMOS logic circuits
complex polynomials
Compositionality
data conversion
data science
adders
decomposition
domain selection
efficient hardware implementation
interconnection requirements
linear regression
logic design
Metrics
biblio
An ensemble model with hierarchical decomposition and aggregation for highly scalable and robust classification
Submitted by grigby1 on Thu, 12/28/2017 - 1:17pm
highly scalable classification
Xgboost
Training
sub-model training
sub-model integration
regression analysis
pubcrawl
Predictive models
pattern classification
model decomposition
Metrics
machine learning
Logistics
logistic regression
learning (artificial intelligence)
binary classification problem
Hearthstone
game state information
flexible robust scheme
feature extraction
extreme gradient boosted decision trees
ensemble model
deep learning
decomposition
Decision trees
Data models
computer games
computer game
Computational modeling
Compositionality
biblio
A study on the fast system recovery: Selecting the number of surrogate nodes for fast recovery in industrial IoT environment
Submitted by grigby1 on Tue, 12/12/2017 - 1:21pm
machine learning
System recovery
surrogate nodes
Servers
sensors
Resiliency
regression analysis
pubcrawl
network servers
Algorithm design and analysis
IoT gateway
Internet of Things
Industrial IoT(IIoT)
industrial IoT environment
fast system recovery mechanism
Fast Recovery
Conferences
biblio
A Scalable Meta-Model for Big Data Security Analyses
Submitted by grigby1 on Fri, 11/03/2017 - 11:31am
network anomaly detection
Training data
sufficient statistics
statistical data models
security of data
security analyses
security
Scalable Security
scalable meta-model
Scalability
regression analysis
pubcrawl
Predictive models
Big Data
meta-model sufficient statistics
meta-model matrix
Meta-Model
matrix algebra
machine learning algorithms
linear regressions
linear regression models
linear regression
learning (artificial intelligence)
Data models
Conferences
Big Data security analysis
« first
‹ previous
1
2
3
4
5
6
next ›
last »