Data-Driven Clustering

Digital Asset Data Lakehouse. The concept based on a blockchain research center

Authors: Raul Cristian Bag | Published: 2025-03-20
ETL Process
Cloud Computing
Data-Driven Clustering

ESAFE: Enterprise Security and Forensics at Scale

Authors: Bernard McShea, Kevin Wright, Denley Lam, Steve Schmidt, Anna Choromanska, Devansh Bisla, Shihong Fang, Alireza Sarmadi, Prashanth Krishnamurthy, Farshad Khorrami | Published: 2021-12-08
Data-Driven Clustering
Challenges of Log Analysis
Threat modeling

Dataset: Large-scale Urban IoT Activity Data for DDoS Attack Emulation

Authors: Arvin Hekmati, Eugenio Grippo, Bhaskar Krishnamachari | Published: 2021-10-05
DDoS Attack
Data Generation
Data-Driven Clustering

An Automated Data Engineering Pipeline for Anomaly Detection of IoT Sensor Data

Authors: Xinze Li, Baixi Zou | Published: 2021-09-28
Data Extraction and Analysis
Data-Driven Clustering
Anomaly Detection Method

A Validated Privacy-Utility Preserving Recommendation System with Local Differential Privacy

Authors: Seryne Rahali, Maryline Laurent, Souha Masmoudi, Charles Roux, Brice Mazeau | Published: 2021-09-23
Data Privacy Assessment
Data-Driven Clustering
Privacy Risk Management

Outlier Detection and Spatial Analysis Algorithms

Authors: Jacob John | Published: 2021-06-20
Data Preprocessing
Data Collection
Data-Driven Clustering

Resilient and Adaptive Framework for Large Scale Android Malware Fingerprinting using Deep Learning and NLP Techniques

Authors: ElMouatez Billah Karbab, Mourad Debbabi | Published: 2021-05-27
Data-Driven Clustering
Malware Propagation Means
Natural Language Processing

Equivalence relations and $L^p$ distances between time series with application to the Black Summer Australian bushfires

Authors: Nick James, Max Menzies | Published: 2020-02-07 | Updated: 2023-02-28
Clustering methods
Data-Driven Clustering
Definition of Mathematical Concepts

Machine Learning in Network Security Using KNIME Analytics

Authors: Munther Abualkibash | Published: 2019-11-18
Security Analysis
Data-Driven Clustering
Machine Learning Technology

TG-PSM: Tunable Greedy Packet Sequence Morphing Based on Trace Clustering

Authors: Farzam Fanitabasi | Published: 2019-04-01
Data Protection Method
Data-Driven Clustering
Privacy Protection Method