Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Feature Selection
biblio
A New Mobile Botnet Classification Based on Permission and API Calls
Submitted by grigby1 on Mon, 04/02/2018 - 12:33pm
pubcrawl
malware
mobile botnet attacks
mobile botnet classification
mobile botnet detection
Mobile communication
mobile computing
pattern classification
program diagnostics
malicious mobile applications
random forest algorithm
random processes
resilience
Resiliency
smart phones
smartphone
static analysis
Android (operating system)
machine learning algorithms
machine learning
learning (artificial intelligence)
invasive software
Humanoid robots
Feature Selection
feature extraction
Drebin dataset
Compositionality
application programming interface
application program interfaces
APIs
API calls
Androids
Android botnet
biblio
Zero-Day Attack Identification in Streaming Data Using Semantics and Spark
Submitted by grigby1 on Mon, 03/26/2018 - 1:13pm
semantic reasoning
MRMR feature selection algorithm
parallel detection
pattern classification
pubcrawl
Resiliency
security of data
semantic learning
Semantic learning and reasoning
semantic link networks
minimum redundancy maximum relevance feature selection algorithm
Semantics
SLN
Spark Streaming
Spark streaming platform
Sparks
Training
Zero day attacks
zero-day attack identification
feature extraction
cognition
collaborative classification methods
Collaborative mining
composability
Computer hacking
Data Streaming
defense
dynamic semantic graph generation
Anomaly Detection
Feature Selection
Flow Creation
graph theory
groupware
IDS
Intrusion Detection Systems
learning (artificial intelligence)
Metrics
biblio
Fine Tuning Lasso in an Adversarial Environment against Gradient Attacks
Submitted by grigby1 on Mon, 03/19/2018 - 1:59pm
robust classifier
known weaknesses
labeled training data
learning (artificial intelligence)
Metrics
optimization
pattern classification
probability
pubcrawl
resilience
Resiliency
Input variables
Scalability
security of data
single convex optimization
source domain
supervised learning
Synthetic Data
Task Analysis
testing
Toxicology
Training
data set testing
adversarial data
adversarial environment
adversarial learning research
adversarial learning setting
Adversarial Machine Learning
Adversary Models
convex programming
data analysis
Data mining
data mining algorithms
adversarial component
data testing
domain adaptation
domain adaption
feature extraction
Feature Selection
fine tuning lasso
fixed probability distribution
gradient attacks
Human behavior
biblio
Software Metrics as Indicators of Security Vulnerabilities
Submitted by grigby1 on Mon, 03/05/2018 - 1:08pm
resilience
vulnerable software units
Software systems
software security vulnerabilities
software quality
software operational phase
software metrics
Software Architecture
software architectural characteristics
security vulnerabilities
security of data
security
search problems
Resiliency
coding theory
pubcrawl
nonvulnerable code
Metrics
heuristic search technique
function levels
file levels
Feature Selection
Cryptography
correlation coefficients
Correlation
Compositionality
Complexity theory
biblio
A Big Data Framework for Intrusion Detection in Smart Grids Using Apache Spark
Submitted by grigby1 on Tue, 02/06/2018 - 1:44pm
pattern classification
Voltage measurement
synchrophasor dataset classification
Support vector machines
smart power grids
Smart Grids
Smart Grid
self-healing system
security of data
Scalability
Resiliency
pubcrawl
Power industry
power engineering computing
Phasor Measurement Unit
phasor measurement
apache spark
Metrics
machine learning techniques
learning (artificial intelligence)
intrusion detection system
Intrusion Detection
Feature Selection
feature extraction
Electricity supply industry
dimensionality reduction algorithm
Data mining
data analysis
big data security metrics
big data framework
Big Data Analytics
Big Data
biblio
A fast information-theoretic approximation of joint mutual information feature selection
Submitted by grigby1 on Thu, 12/28/2017 - 1:37pm
polynomial time
JMI maximization
JMI scales
joint mutual information feature selection
joint mutual information maximization
Metrics
minimum features subset
Mutual information
pattern classification
Policy-Governed Secure Collaboration
information theory
pubcrawl
Redundancy
Resiliency
Scalability
Science of Security
search problems
UCI datasets
unified framework
Upper bound
fast information-theoretic approximation
classification
collaboration
Complexity theory
composability
computational complexity
data analysis
data reduction
dimensionality reduction
Entropy
approximation theory
Feature Selection
feature size
filtering theory
greedy algorithms
greedy forward search
greedy search complexity
high dimensional datasets
Human behavior
Human Factors
biblio
The Effect of Dimensionality Reduction on Software Vulnerability Prediction Models
Submitted by grigby1 on Thu, 12/28/2017 - 1:30pm
predictive security metrics
vulnerable components
vulnerability prediction models
text mining features
Text Mining
text analysis
term frequencies
statistical prediction models
statistical learning machinery
software metrics
security
pubcrawl
principal component analysis
computer security
Predictive models
Open Source Software
Metrics
machine learning
learning (artificial intelligence)
large software projects
Feature Selection
dimensionality reduction technique
Data mining
cross-validation
cross-project prediction experiments
confirmatory factor analysis
biblio
Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning
Submitted by grigby1 on Wed, 12/20/2017 - 1:02pm
Metrics
smartwatch
smartphone user authentication
smartphone
smart phones
sensors
Sensor Systems
sensor security
Sensor phenomena and characterization
security of data
security
Resiliency
pubcrawl
privacy
mobile computing
Accelerometers
machine learning
learning (artificial intelligence)
Human Factors
Human behavior
Global Positioning System
Feature Selection
contextual machine learning
context-based authentication models
context detection
Context
composability
Biomedical monitoring
authentication
biblio
Feature selection to detect botnets using machine learning algorithms
Submitted by grigby1 on Mon, 12/04/2017 - 12:57pm
ISCX repositories
Training
testing
Servers
Resiliency
pubcrawl
Proposals
pattern classification
Metrics
malware detection
machine learning algorithms
machine learning
learning (artificial intelligence)
ISOT repositories
botnet
invasive software
genetic algorithms
genetic algorithm
Feature Selection
feature extraction
feature evaluation
Compositionality
command and control systems
command and control
C4.5 algorithm
C&c
botnets
Botnet detection
biblio
Ensemble of Sparse Cross-Modal Metrics for Heterogeneous Face Recognition
Submitted by grigby1 on Tue, 09/19/2017 - 12:00pm
Computing Theory
Ensemble Learning
facial recognition
Feature Selection
heterogeneous face recognition
Human behavior
metric learning
Metrics
multi-modal learning
pubcrawl
Resiliency
Security Metrics
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »