Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
unsolicited e-mail
biblio
Performance evaluation of Spam and Non-Spam E-mail detection using Machine Learning algorithms
Submitted by grigby1 on Fri, 02/17/2023 - 5:39pm
support vector machine classification
Costs
support vector machine (SVM)
social networking (online)
unsolicited e-mail
renewable energy sources
programming
Scalability
Metrics
Human behavior
pubcrawl
machine learning algorithms
Naïve Bayesian classification
k-nearest neighbor algorithm
and neural networks
spam detection
biblio
Finding Collusive Spam in Community Question Answering Platforms: A Pattern and Burstiness Based Method
Submitted by grigby1 on Fri, 02/17/2023 - 5:38pm
Vocabulary
machine learning
pubcrawl
Human behavior
Metrics
Scalability
Big Data
unsolicited e-mail
Knowledge engineering
Q&A Spam Detection
crowdsourcing
Web and internet services
spam detection
Burstiness Detecting
Collusive Spamming Activities
community question answering
Frequent Pattern
biblio
Research on Filtering Feature Selection Methods for E-Mail Spam Detection by Applying K-NN Classifier
Submitted by grigby1 on Fri, 02/17/2023 - 5:38pm
spam detection
text categorization
human computer interaction
Euclidean distance
Feature Selection
unsolicited e-mail
Scalability
Filtering
robots
Metrics
Human behavior
pubcrawl
feature extraction
K-NN classifier
biblio
A Detour Strategy for Visiting Phishing URLs Based on Dynamic DNS Response Policy Zone
Submitted by grigby1 on Thu, 10/13/2022 - 12:16pm
security
Monitoring
Servers
pubcrawl
Human behavior
DNS
Phishing
unsolicited e-mail
Electronic mail
Uniform resource locators
overload mitigation
phishing URL
Response Policy Zone
route detouring
RPZ
URL Phishing attack
biblio
No Phishing With the Wrong Bait: Reducing the Phishing Risk by Address Separation
Submitted by grigby1 on Thu, 10/13/2022 - 12:15pm
security
pubcrawl
Human behavior
Registers
taxonomy
Phishing
unsolicited e-mail
Electronic mail
usability
biblio
Cyber Threat Detection Using Machine Learning Techniques: A Performance Evaluation Perspective
Submitted by aekwall on Mon, 11/08/2021 - 3:22pm
cyber threat
Measurement
threat vectors
unsolicited e-mail
spam classification
performance evaluation
Machine Learning Application
Cyberspace
Cybercrime
Support vector machines
intrusion detection system
Decision trees
malware detection
malware
machine learning
privacy
pubcrawl
Computer crime
biblio
APTrace: A Responsive System for Agile Enterprise Level Causality Analysis
Submitted by aekwall on Tue, 04/27/2021 - 1:35pm
network security
Scalability
malware
Resiliency
pubcrawl
Phishing
Security Heuristics
predictability
unsolicited e-mail
Backtracking
Backtracking analysis
domain language
Domain Specific Languages
expressiveness
responsiveness
biblio
A Two-stage P2P Botnet Detection Method Based on Statistical Features
Submitted by grigby1 on Tue, 03/09/2021 - 2:25pm
Payloads
unsolicited e-mail
two-stage P2P botnet detection method
traffic statistical features
telecommunication traffic
statistical feature
statistical analysis
software engineering
Resiliency
resilience
real-time systems
pubcrawl
Peer-to-peer computing
benign P2P hosts
p2p
network security
Monitoring
Metrics
machine learning
invasive software
feature extraction
detection
computer network security
composability
botnets
botnet
biblio
Reliability Analysis of Concurrent Data based on Botnet Modeling
Submitted by grigby1 on Tue, 03/09/2021 - 2:23pm
network modelling
unsolicited e-mail
time series
telecommunication traffic
spam
security risks
security of data
Resiliency
resilience
reliability analysis
Reliability
pubcrawl
pattern clustering
network traffic time series
botnet modeling
multidimensional permutation entropy
Metrics
invasive software
high-privilege systems
Entropy
detection methods
data complex structure analysis
concurrent data
computer network security
composability
clustering variance method
botnets
biblio
Compositional Data Analysis with PLS-DA and Security Applications
Submitted by aekwall on Mon, 11/09/2020 - 1:13pm
Euclidean distance
Information Reuse and Security
spam filters
PLS-DA algorithm
partial least squares discriminant analysis
Least squares approximations
isometric log ratio transformation
information system security applications
ILR
data-based power transformation
data science models
compositional vectors
compositional data analysis
Compositional data
Aitchison transformation
Intrusion Detection
Loading
Compositionality
statistical analysis
data analysis
Mathematical model
spam filtering
unsolicited e-mail
standards
pubcrawl
Resiliency
Electronic mail
Data models
security of data
1
2
3
4
5
6
next ›
last »