Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Statistics
biblio
Toward Limiting Social Botnet Effectiveness while Detection Is Performed: A Probabilistic Approach
Submitted by grigby1 on Fri, 09/11/2020 - 12:08pm
social networking (online)
social media botnets
social botnet effectiveness
social botnet
deterministic propagation actions
Physics
social media platforms
botnet
game theory
Statistics
Sociology
social media
social media networks
pubcrawl
Social network services
probability
probabilistic model
Probabilistic logic
Compositionality
Metrics
botnets
invasive software
computer science
security
Resiliency
biblio
Semi-black-box Attacks Against Speech Recognition Systems Using Adversarial Samples
Submitted by grigby1 on Fri, 09/04/2020 - 4:10pm
automatic speech recognition systems
Black Box Security
targeted ASR systems
semiblack-box attack
semi-black-box attacks
security vulnerabilities
Kaldi
high attack success rate
gradient-independent genetic algorithm
gradient descent algorithm
adversary-expected transcript texts
adversarial samples
adversarial attacks
white-box attacks
Speech recognition
gradient methods
security of data
Deep Neural Network
Perturbation methods
deep neural networks
Statistics
Sociology
genetic algorithms
neural nets
resilience
Resiliency
Metrics
composability
pubcrawl
Hidden Markov models
Computational modeling
biblio
Targeted Adversarial Examples for Black Box Audio Systems
Submitted by grigby1 on Fri, 09/04/2020 - 4:10pm
adversarial perturbations
Black Box Security
white-box attacks
speech-to-text
Speech recognition
gradient methods
gradient estimation
fooling ASR systems
estimation
deep recurrent networks
black-box
black box audio systems
automatic speech recognition systems
audio transcription
audio systems
adversarial generation
security of data
Approximation algorithms
recurrent neural nets
adversarial attack
deep neural networks
Statistics
Sociology
genetic algorithms
Decoding
resilience
Resiliency
Metrics
composability
pubcrawl
Task Analysis
biblio
A genetic algorithm for obtaining memory constrained near-perfect hashing
Submitted by grigby1 on Fri, 06/12/2020 - 12:10pm
near-perfect hashing
uniform data distribution
Statistics
Sociology
search problems
Resiliency
resilience
pubcrawl
operating systems
open-addressing double-hashing approach
nonlinear transformation
Next generation networking
binary search
memory-constrained applications
Memory management
hash table
hash algorithms
genetic algorithms
genetic algorithm
file organisation
fast items retrieval
Compositionality
Cohttps://ieeexplore.ieee.org/document/8402794mplexity theory
biblio
K-Nearest Neighbors and Grid Search CV Based Real Time Fault Monitoring System for Industries
Submitted by grigby1 on Fri, 05/22/2020 - 2:23pm
model-based techniques
flask
graphical user interface (GUI)
grid search cross validation
grid search CV
induction machine
Induction machines
K-Nearest Neighbors (KNN)
KNN
knowledge-based approach
Feature Selection
Python
python web framework
real time fault monitoring
signature extraction-based approach
Statistics
time fault monitoring system
user friendly interface
nearest neighbor search
nearest neighbour methods
pubcrawl
Circuit faults
Data models
internet
Industries
production engineering computing
Classification algorithms
Metrics
Measurement
grid search
Prediction algorithms
k-nearest neighbors
user interfaces
condition monitoring (CM)
cross validation (CV)
fault detection
fault detection techniques
fault diagnosis
biblio
Multiple Fault Diagnosis for Sucker Rod Pumping Systems Based on Matter Element Analysis with F-statistics
Submitted by aekwall on Mon, 05/18/2020 - 10:49am
Metrics
sucker rod pumping wells
sucker rod pumping systems
Statistics
rods (structures)
Resiliency
pumps
pubcrawl
process control
Petroleum
oilfield production
oil technology
Multiple Faults
multiple fault diagnosis
cyber physical systems
matter-element analysis
matter element analysis
Knowledge Discovery
Human Factors
fuzzy systems
faults classification
fault diagnosis problem
fault diagnosis
F-statistics
dynamometers
dynamometer cards
down-hole working conditions
biblio
Simultaneous diagnosis of multiple parametric faults based on differential evolution algorithm
Submitted by aekwall on Mon, 05/18/2020 - 10:48am
fault diagnosis
multiple fault diagnosis
simultaneous diagnosis
multiple parametric faults
multiple abrupt faults diagnosis
multifault parameters estimation
Lipschitz nonlinear system
differential evolution algorithm
differential evolution
fault detection
nonlinear systems
Resiliency
evolutionary computation
Nonlinear system
estimation
Human Factors
cyber physical systems
Statistics
Sociology
optimization
Metrics
pubcrawl
biblio
Adversarially Adapting Deceptive Views and Reconnaissance Scans on a Software Defined Network
Submitted by grigby1 on Fri, 05/15/2020 - 11:35am
optimized configuration
threat model presumes
subnets
Statistics
Software Defined Networks
software defined networking
Software Defined Network
Software
Sociology
Scalability
Resiliency
resilience
reconnaissance scans
Reconnaissance
pubcrawl
Artificial Intelligence
NMAP ping scans
Network reconnaissance
Network Deception
IP networks
IP addresses
honeypots
high performing static defenses
genetic algorithms
Generators
evading detection
deceptive network view
computer network security
coevolutionary genetic algorithm
coevolution
biblio
An Adaptive Threshold Method for Anomaly-based Intrusion Detection Systems
Submitted by aekwall on Mon, 05/11/2020 - 11:19am
microsoft windows
suspicious behaviors
normal data instances
normal behaviors
dynamic network environment
dynamic environment
Bipartite graph
Anomaly-based Detection Systems attempt
ADS
adaptive threshold method
adaptive systems
abnormal behaviors
intrusion
Trust management
anomaly-based Intrusion Detection Systems
network security
computer network security
statistical analysis
probability
Anomaly Detection
Cybersecurity
internet
network intrusion detection
Statistics
trust
Metrics
Peer-to-peer computing
composability
pubcrawl
Resiliency
IP networks
biblio
Detect Me If You… Oh Wait. An Internet-Wide View of Self-Revealing Honeypots
Submitted by aekwall on Mon, 04/13/2020 - 10:06am
Open Source Software
Security by Default
simple signature-based detection
self-revealing honeypots
mail server
Internet-wide view
hosting networks
government incentive
FTP mirror
default open-source honeypots
cloud network
Censys scan data
attack monitoring
computer network security
IoT device
digital signatures
Market research
tools
internet
Statistics
Sociology
pubcrawl
Resiliency
security
Servers
Scalability
« first
‹ previous
1
2
3
4
5
6
next ›
last »