Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
association rules
biblio
Mining Learner-friendly Security Patterns from Huge Published Histories of Software Applications for an Intelligent Tutoring System in Secure Coding
Submitted by grigby1 on Wed, 06/08/2022 - 12:54pm
intelligent tutoring systems
Vulnerability
Training
Software
Scalability
Resiliency
resilience
pubcrawl
Prototypes
Knowledge Discovery
expert systems
intelligent data
Explainable Knowledege
encoding
Comprehensibility
Compositionality
Big Data in Software Engineering
Big Data
association rules
security
biblio
Network Protocol Reverse Parsing Based on Bit Stream
Submitted by grigby1 on Tue, 03/15/2022 - 1:16pm
Cloud Computing
security
pubcrawl
Conferences
Scalability
Protocols
cyber security
Computer crime
Syntactics
Clustering algorithms
Pattern recognition
association rules
Scalable Security
hierarchical clustering
reverse parsing
biblio
Inference of Suspicious Co-Visitation and Co-Rating Behaviors and Abnormality Forensics for Recommender Systems
Submitted by grigby1 on Thu, 04/08/2021 - 4:10pm
Scalability
Metrics
personalized collaborative recommender systems
pervasiveness
pubcrawl
rating intention
real-world data
recommender system
recommender systems
resilience
Resiliency
Measurement
security of data
spotting anomalies
structure-based property
suspicious co-visitation behavior
suspicious nodes
suspicious ratings
time series
Time series analysis
ubiquitous computing
unified detection framework
Forensics
Anomaly Detection
association rules
Attack detection
co-rating behaviors
co-rating graphs
collaboration
Couplings
Data mining
e-commerce services
electronic commerce
abnormality forensics
forensics metrics including distribution
fundamental vulnerabilities
graph theory
historical ratings
Human behavior
inference
information forensics
malicious attack
malicious attack behaviors
malicious users
biblio
An Improvement of Apriori Mining Algorithm using Linked List Based Hash Table
Submitted by aekwall on Mon, 03/29/2021 - 11:06am
hash algorithms
LinkedList
linked list
Itemsets
improved apriori algorithm
Improved
important algorithms
Frequent item sets
frequent 1-item sets counts
find frequent item sets
association rules
apriori mining algorithm
apriori
Organizations
hash table
memory space
Compositionality
database management systems
pubcrawl
Random access memory
Data mining
Clustering algorithms
Databases
Resiliency
Classification algorithms
biblio
An Efficient Hash-Tree-Based Algorithm in Mining Sequential Patterns with Topology Constraint
Submitted by aekwall on Mon, 06/08/2020 - 10:34am
Sun
efficient hash-tree-based algorithm
hash tree efficiency
hash-tree based mining
hash-tree search method
mining efficiency
network physical connection data
sequential mining algorithm
sequential pattern mining
association rules
topology constraint
topology relation
topology structure
transmission network
transmission networks
warning Weblogs
hash algorithms
Pattern recognition
Resiliency
pubcrawl
internet
Business
trees (mathematics)
Data mining
network topology
network nodes
Conferences
Topology
telecommunication network topology
Compositionality
Hash functions
hash tree
tree searching
alarm association rules
biblio
Explanation Mining: Post Hoc Interpretability of Latent Factor Models for Recommendation Systems
Submitted by aekwall on Wed, 01/16/2019 - 1:09pm
association rules
black-box
composability
Explanations
interpretability
latent factor models
Metrics
pubcrawl
recommendation systems
resilience
White Box Security
white-box
biblio
Malicious URL prediction based on community detection
Submitted by grigby1 on Mon, 02/27/2017 - 11:56am
malicious URL prediction
Uniform resource locators
traditional anti-virus technology
static analysis
pubcrawl170108
pubcrawl170107
program diagnostics
network bandwidth
Monitoring
Mobile communication
malware
anti-virus
Malicious URL
graph-based method
graph theory
dynamic monitoring
Data mining
computer viruses
community detection
association rules
association rule
biblio
"DIVa: Decentralized identity validation for social networks"
Submitted by grigby1 on Thu, 02/23/2017 - 11:05am
learning (artificial intelligence)
user profile attribute
social networking (online)
Social network services
security
real-world OSN dataset
pubcrawl170105
Privacy-preserving Learning
privacy preservation
privacy
online social network
mining technique
association rules
fine-grained community-aware correlation
Ensemble Learning
DIVa
Decentralized Online Social Networks
decentralized learning approach
decentralized identity validation
data privacy
Data mining
Correlation
Computational modeling
Community-aware Identity Validation
biblio
"Persistent threat pattern discovery"
Submitted by abfox on Tue, 02/14/2017 - 11:36am
Government
security of data
pubcrawl170101
persistent threat pattern discovery
persistent threat identification
Persistent Threat (PT)
network data
IP networks
Intrusion Detection Systems
Intrusion Detection
advanced persistent threat
frequent pattern discovery
Data mining
cyber-attack
association rules
Association Rule Mining (ARM)
association rule mining
arm
APT
Advanced Persistent Threat (APT)
biblio
Terms Mining in Document-Based NoSQL: Response to Unstructured Data
Submitted by BrandonB on Tue, 05/05/2015 - 12:30pm
document-based NoSQL
Viterbi algorithm
unstructured data storage
Unstructured Data Mining
topics mining
text analysis
terms mining
terms
term classification
Semantics
pattern clustering
pattern classification
NoSQL database
NoSQL
analytics-as-a-service framework
document handling
Dictionaries
Databases
database management systems
data mining techniques
Data mining
clustering
Classification algorithms
classification
Big Data
Big Bata
association rules
1
2
next ›
last »