Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
false alarm rates
biblio
A Hybrid Feature Extraction Network for Intrusion Detection Based on Global Attention Mechanism
Submitted by grigby1 on Tue, 02/23/2021 - 2:46pm
intrusion detection task
AI methods
false alarm rates
feature extraction layer
fully connected layer
Global Attention Mechanism
global attention mechanism layer
hybrid feature extraction network
hybrid network
temporal features
intrusion detection tasks
large-scale network traffic
low recognition performance
network monitoring system
network traffic attributes
Residual U Net
RULA-IDS
SVM classification layer
computer network security
feature extraction
machine learning
Support vector machines
Intrusion Detection
pubcrawl
Metrics
resilience
Resiliency
Training
telecommunication traffic
composability
pattern classification
neural nets
deep learning
testing
network intrusion detection
spatial features
biblio
A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns
Submitted by BrandonB on Thu, 04/30/2015 - 1:23pm
high-level programming languages
UNM data sets
system calls
semantic structure
security of data
Registers
program anomaly behaviour
operating systems (computers)
modern operating system
Logic gates
KDD98 data sets
Intrusion Detection
host-based IDS
host-based anomaly intrusion detection system design
ADFA-LD
high level languages
Gaussian processes
false alarm rates
discontiguous system call patterns
Cryptography
contiguous system call patterns
contemporary hacking methods
computer security
computer architecture
Complexity theory
Clocks
Anomaly Detection
biblio
A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns
Submitted by BrandonB on Tue, 04/28/2015 - 1:06pm
high-level programming languages
UNM data sets
system calls
semantic structure
security of data
Registers
program anomaly behaviour
operating systems (computers)
modern operating system
Logic gates
KDD98 data sets
Intrusion Detection
host-based IDS
host-based anomaly intrusion detection system design
ADFA-LD
high level languages
Gaussian processes
false alarm rates
discontiguous system call patterns
Cryptography
contiguous system call patterns
contemporary hacking methods
computer security
computer architecture
Complexity theory
Clocks
Anomaly Detection