Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Clustering algorithms
biblio
.Net library for SMS spam detection using machine learning: A cross platform solution
Submitted by
aekwall
on Mon, 02/25/2019 - 10:40am
Algorithms
classification
Classification algorithms
clustering
Clustering algorithms
cross platform .Net development
C\#
C\# languages
C\# library
detection
electronic messaging
email spam detection
filtering algorithms
Human behavior
learning (artificial intelligence)
Libraries
machine learning
machine learning algorithms
Metrics
Net library
online detection
pattern classification
pubcrawl
random forest algorithm
random processes
Scalability
security of data
short message service
SMS
SMS spam detection
spam dataset classification
spam detection
spam filter
spam messages
tools
unsolicited e-mail
biblio
Detection and Prevention of Routing Attacks in Internet of Things
Submitted by
grigby1
on Wed, 01/16/2019 - 1:25pm
6LoWPAN
authentication techniques
CBA algorithm
Cluster-Based Algorithm
Clustering algorithms
composability
Cryptography
encryption techniques
internet
Internet of Things
Intrusion Detection
intrusion detection system
Intrusion Detection System (IDS)
IoT based network
Key Match Algorithm
MatLab simulation
message authentication
Protocols
pubcrawl
Resiliency
Routing
Routing attack
routing attack detection
routing attack prevention
RPL
security
Selective Forwarding
Sinkhole
smart network
smart objects
Trusted Computing
biblio
Analyst Intuition Inspired High Velocity Big Data Analysis Using PCA Ranked Fuzzy K-Means Clustering with Multi-Layer Perceptron (MLP) to Obviate Cyber Security Risk
Submitted by
grigby1
on Wed, 11/14/2018 - 12:21pm
Analyst Intuition
analyst intuition inspired high velocity big data analysis
Artificial Intelligence
attacker IP addresses characteristics
Big Data
Clustering algorithms
computer networks
computer network security
computer security
cyber-attacks
cyber security
cyber security expert
cyber security log classification
cyber security risk
cyber threats
data analysis
Data mining
efficient security monitoring system
Expectation Regulated
expert system
expert systems
Fuzzy k-means (FKM)
fuzzy set theory
High Velocity
Human behavior
integrated datasets
invasive software
IP networks
learning (artificial intelligence)
log history annotation
malware
malware attacks
manually labelled data
MLP
Monitoring
Multi-layer Perceptron (MLP)
multilayer perceptrons
network datasets
network protocols
network user
neural network classifier multilayer perceptron base
pattern classification
pattern clustering
PCA ranked fuzzy k-means clustering
principal component analysis
Principal Component Analysis (PCA)
pubcrawl
resilience
Resiliency
Scalability
scoring system
security
special semisupervise method
statistical data generation
Virus
biblio
Analyst Intuition Based Hidden Markov Model on High Speed, Temporal Cyber Security Big Data
Submitted by
grigby1
on Wed, 11/14/2018 - 12:21pm
Analyst Intuition
attacker
Big Data
Clustering algorithms
computer security
cyber security
cyber security attack
cyber security data
cyber security expert
cyber security log
data analysis
Data mining
Data models
Expectation Regulated
expert systems
forecasting time series data
fuzzy k mean cluster
Fuzzy k-means (FKM)
fuzzy set theory
hidden Markov model
Hidden Markov Model (HMM)
Hidden Markov models
High Velocity
HMM state
Human behavior
IP addresses
malware
Multi-layer Perceptron (MLP)
network protocols
Principal Component Analysis (PCA)
probabilistic models
pubcrawl
resilience
Resiliency
Scalability
scoring system
security
security attacks
security of data
statistical data
temporal cyber security big data
time series
unsure attack
Virus
biblio
Gray hole attack detection in MANETs
Submitted by
grigby1
on Wed, 06/20/2018 - 11:31am
Ad hoc networks
Ad-hoc on demand distance vector protocol
AES security algorithm
Attack detection
batteries
battery power
Clustering algorithms
Compositionality
data transmission rate
dynamic cluster head selection
dynamic nodes
Election Algorithm
gray hole attack detection
gray hole nodes
identical broadcast range
intrusion detection system
intrusion revealing system
MANET
MD5 algorithm
MD6 security algorithm
Message Digest 5
Metrics
mobile ad hoc networks
mobile ad-hoc network
Mobile communication
mobile computing
networking system
pubcrawl
resilience
Resiliency
routing overhead
Routing protocols
self-stabilizing election algorithm
telecommunication network routing
telecommunication security
voting
biblio
Grid-Based Indexing and Search Algorithms for Large-Scale and High-Dimensional Data
Submitted by
grigby1
on Mon, 06/11/2018 - 2:43pm
approximate nearest neighbor search
Clustering algorithms
data handling
data index structure
database indexing
feature extraction
graph theory
grid cells
grid computing
grid-based index structure
high-dimensional data
high-dimensional database
high-dimensional feature vectors
index data
indexing
internet
large-scale data
large-scale database
massive information
Measurement
Metrics
nearest neighbor search
nearest neighbor search algorithm
Nearest neighbor searches
parallel implementation
Partitioning algorithms
pubcrawl
public databases
Quantization (signal)
query processing
retrieval
search algorithms
Search methods
search problems
single machine
synthetic databases
biblio
Predicting Signatures of Future Malware Variants
Submitted by
grigby1
on Wed, 05/30/2018 - 3:05pm
Clustering algorithms
defensive system
feature extraction
future family developments
future malware signatures
future malware variants
History
invasive software
learning (artificial intelligence)
malware
malware defense
malware detection systems
malware evolution
Predictive models
pubcrawl
resilience
Resiliency
Scalability
security of data
signature based defense
significant scientific development
Training
Vaccines
biblio
A Hybrid Routing Algorithm for Secure Environmental Monitoring System in WSN
Submitted by
grigby1
on Wed, 04/11/2018 - 1:54pm
Algorithm design and analysis
bio inspired algorithms
Channel measurement
Clustering algorithms
cyber physical systems
Data Transmission
environmental monitoring (geophysics)
firefly algorithm
Fireflyalgorithm
hybrid routing algorithm
LAL users
Localizability aided localization routing protocol
metaheuristic hybrid algorithm
Metrics
network lifetime
packet drop
Packet loss
Protocol frequency
pubcrawl
resilience
Resiliency
Routing
routing algorithms
Routing protocols
Scalability
secure environmental monitoring system
security
sensor nodes
telecommunication power management
telecommunication security
Time Frequency Analysis
time latency
Wireless communication
wireless sensor area
wireless sensor networks
WSN routing
biblio
Incremental knowledge acquisition and self-learning for autonomous video surveillance
Submitted by
K_Hooper
on Wed, 04/04/2018 - 8:56am
action recognition
Anomaly Detection
autonomous video surveillance
benchmark video dataset
Change detection
Clustering algorithms
cognition
event detection
feature extraction
hazard detection
Hazards
Heuristic algorithms
Human behavior
imperative security
incremental knowledge acquisition
incremental learning
incremental machine learning
Industry 4.0
industry/smart factory settings
intelligent high-level video analysis
Intelligent Video Analysis
knowledge acquisition
object detection
pubcrawl
Resiliency
safety purpose
Scalability
self-learning
Self-Organizing Maps
standard machine learning pipelines
unlabeled video streams
Unsupervised Learning
unsupervised machine learning
video feed
video frame
video signal processing
video stream
video streaming
video surveillance
video surveillance systems
biblio
Human Detection and Tracking for Video Surveillance: A Cognitive Science Approach
Submitted by
K_Hooper
on Wed, 04/04/2018 - 8:56am
Clustering algorithms
cognitive science approach
Computational modeling
computer vision
computer vision algorithms
deep multilevel network
feature extraction
histograms of oriented gradients
HOG feature vectors
Human behavior
human being detection
human detection
human resources
human tracking
image classification
k-means algorith
object detection
positively detected windows
Prediction algorithms
pubcrawl
Resiliency
saliency prediction model
Scalability
Support vector machines
video sequences
video surveillance
visual saliency
visualization
« first
‹ previous
1
2
3
4
5
next ›
last »