Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Data mining
biblio
RNN-based Prediction for Network Intrusion Detection
Submitted by grigby1 on Tue, 02/23/2021 - 1:47pm
Internet of Things
security of data
Predictive models
Anomaly Detection
Data mining
Intrusion Detection
pubcrawl
Metrics
resilience
Resiliency
Data models
recurrent neural nets
production engineering computing
composability
regression analysis
prediction model
network intrusion detection
Euclidean distance
IDS
LSTM
N-gram
RNN
anomaly detection methods
cosine similarity
data mining regression techniques
industrial IoT environments
LSTM model
RNN-based prediction
scoring function
sliding window
biblio
An intrusion detection system integrating network-level intrusion detection and host-level intrusion detection
Submitted by grigby1 on Tue, 02/23/2021 - 1:46pm
learning (artificial intelligence)
machine learning
security
Data mining
convolutional neural nets
Intrusion Detection
pubcrawl
Metrics
resilience
Resiliency
computer network security
cyber security
intrusion detection system
Computer crime
composability
cyber-attacks
software reliability
neural network
network intrusion detection
Scalability
software quality
NSL-KDD dataset
ADFA dataset
cyber-attackers
host-level IDS
host-level intrusion detection
IDS field
network-level intrusion detection
scalable neural-network-based hybrid IDS framework
biblio
Binarized Attributed Network Embedding via Neural Networks
Submitted by grigby1 on Tue, 02/23/2021 - 1:36pm
learning (artificial intelligence)
feature extraction
Neural networks
pubcrawl
Metrics
resilience
Resiliency
matrix algebra
optimization
composability
Data mining
pattern classification
neural nets
Task Analysis
network theory (graphs)
pattern clustering
Binary codes
neural network training
network coding
Knowledge engineering
autoencoder
attribute similarity penalizing term
Attributed Network
binary code learning
data reduction
dimension reduction
feature aggregation
Hamming space
learned binary representation vectors
network embedding
node classification
node clustering
relaxation-quantization method
unsupervised neural based binarized attributed network embedding
Weisfeiler-Lehman Proximity Matirx
Weisfeiler-Lehman proximity matrix
biblio
Fast Scalable Approximate Nearest Neighbor Search for High-dimensional Data
Submitted by aekwall on Mon, 02/22/2021 - 12:45pm
machine learning algorithms
learning (artificial intelligence)
machine learning
pubcrawl
graph theory
Big Data
query processing
trees (mathematics)
Data mining
Measurement
application program interfaces
Predictive Metrics
Partitioning algorithms
approximation theory
Approximation algorithms
message passing
search problems
nearest neighbor search
Load management
high-dimensional data
graph-based sequential approximate k-NN search algorithm
hierarchical navigable small world
HNSW
k-d tree-based solution
k-nearest neighbor search
K-NN search
load balancing
MPI one-sided communication
MPI-OpenMP solution
Nearest neighbor methods
parallel algorithms
similarity search
Vantage Point Tree
vantage point trees
biblio
Research and Implementation of Data Extraction Method Based on NLP
Submitted by aekwall on Mon, 02/22/2021 - 12:40pm
Scalability
Conferences
security
feature extraction
Resiliency
Human behavior
pubcrawl
text analysis
Data mining
natural language processing
NLP
information extraction
Chinese Text
data extraction
data extraction method
feature word lists
language expression rules
regular expression
rule template
rule-based method
unstructured Chinese text
biblio
A GA-based Data Sanitization for Hiding Sensitive Information with Multi-Thresholds Constraint
Submitted by grigby1 on Tue, 02/16/2021 - 12:24pm
privacy
pubcrawl
Human behavior
resilience
Resiliency
security
Data models
Databases
Data mining
privacy preservation
Compositionality
optimization
genetic algorithms
genetic algorithm
Sociology
Statistics
Data Sanitization
Itemsets
multi-threshold
biblio
MiNo: The Chrome Web Browser Add-on Application to Block the Hidden Cryptocurrency Mining Activities
Submitted by grigby1 on Wed, 02/10/2021 - 12:12pm
Data mining
cryptocurrencies
pubcrawl
Human behavior
Metrics
resilience
Resiliency
security
internet
online front-ends
invasive software
bitcoin
malware
cryptojacking
cash money
Chrome Web browser add-on application
Coin Mining
Coinhive
computer resources
cryptocurrency mining
digital currencies
Hidden Cryptocurrency Mining
hidden cryptocurrency mining activities
malicious mining activities
MiNo
biblio
CryingJackpot: Network Flows and Performance Counters against Cryptojacking
Submitted by grigby1 on Wed, 02/10/2021 - 12:11pm
feature extraction
Servers
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Cryptography
Intrusion Detection
Data mining
malware
Task Analysis
clustering
Clustering algorithms
security analytics
network flows
cryptojacking
performance counters
biblio
Is Cryptojacking Dead After Coinhive Shutdown?
Submitted by grigby1 on Wed, 02/10/2021 - 12:11pm
Data mining
pubcrawl
Human behavior
Metrics
resilience
Resiliency
internet
Computer crime
online front-ends
Web sites
malicious script
cyberattack
cryptocurrency
cryptojacking
cryptomining
coinhive scripts
coinhive shutdown
cryptocurrency mining
cryptojacking dead
in-browser mining
in-browser mining activities
legal mining scripts
legal mining service
malicious scripts
victims
biblio
Are You a Favorite Target For Cryptojacking? A Case-Control Study On The Cryptojacking Ecosystem
Submitted by grigby1 on Wed, 02/10/2021 - 12:10pm
Cryptography
Data mining
cryptocurrencies
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Ecosystems
privacy
Semantics
bitcoin
Web sites
Hash functions
Web servers
cryptocurrency
cryptojacking
browser-based mining
Case-control study
compromised websites
cryptojacking campaigns
cryptojacking ecosystem
CryptoJacking websites
risk assessment
1
2
3
4
5
6
7
8
9
…
next ›
last »