Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
semantic structure
biblio
Style-Aware Neural Model with Application in Authorship Attribution
Submitted by grigby1 on Fri, 08/28/2020 - 11:22am
Neural networks
writing style
Training
text analysis
syntax encoding
syntax
Syntactics
syntactic structure
syntactic representations
syntactic representation
stylometry
stylistic levels
style-aware neural model
semantic structure
pubcrawl
part of speech tags
attention-based hierarchical neural network
neural nets
neural model
natural language processing
Metrics
lexical representations
Human behavior
encoding
document information
Computational modeling
composability
Blogs
Benchmark testing
benchmark datasets
authorship attribution
attribution
biblio
A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns
Submitted by BrandonB on Thu, 04/30/2015 - 12:23pm
high-level programming languages
UNM data sets
system calls
semantic structure
security of data
Registers
program anomaly behaviour
operating systems (computers)
modern operating system
Logic gates
KDD98 data sets
Intrusion Detection
host-based IDS
host-based anomaly intrusion detection system design
ADFA-LD
high level languages
Gaussian processes
false alarm rates
discontiguous system call patterns
Cryptography
contiguous system call patterns
contemporary hacking methods
computer security
computer architecture
Complexity theory
Clocks
Anomaly Detection
biblio
A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns
Submitted by BrandonB on Tue, 04/28/2015 - 12:06pm
high-level programming languages
UNM data sets
system calls
semantic structure
security of data
Registers
program anomaly behaviour
operating systems (computers)
modern operating system
Logic gates
KDD98 data sets
Intrusion Detection
host-based IDS
host-based anomaly intrusion detection system design
ADFA-LD
high level languages
Gaussian processes
false alarm rates
discontiguous system call patterns
Cryptography
contiguous system call patterns
contemporary hacking methods
computer security
computer architecture
Complexity theory
Clocks
Anomaly Detection