Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
neural nets
biblio
Media Forensics and DeepFakes: An Overview
Submitted by grigby1 on Thu, 04/08/2021 - 5:11pm
fake media
Media
multimedia computing
Deepfakes
Information integrity
data-driven forensic methods
deep learning tools
digital image forensics
elections
Videos
false multimedia content
forensic tools
Media Forensics
real media
realistic fake images
synthetic media
Video Forensics
visual media integrity verification
fraud
learning (artificial intelligence)
Digital Forensics
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
deep learning
security threats
neural nets
Forensics
software packages
public opinion
information forensics
generative adversarial networks
biblio
An I/O Request Packet (IRP) Driven Effective Ransomware Detection Scheme using Artificial Neural Network
Submitted by aekwall on Thu, 04/08/2021 - 4:36pm
ransomware behavior
malware
microsoft windows
neural nets
Neural networks
newly found research paradigm
pubcrawl
Ransomware
ransomware attacks
low-level file system
ransomware detection
ransomware families
ransomware researchers
ransomware samples
ransomware samples every day
Resiliency
retail to critical infrastructure
global surge
artificial neural network
Compositionality
Cryptography
cyber-attacks
Data collection
discovering novel ransomware families
driven effective ransomware detection scheme
effective artificial neural network structure
i-o systems security
I/O Monitoring
industry-based security researchers
Information Reuse and Security
invasive software
IRP logs
Kernel
learning (artificial intelligence)
biblio
Agent Based Cybersecurity Model for Business Entity Risk Assessment
Submitted by grigby1 on Tue, 03/30/2021 - 12:04pm
Predator prey systems
Mathematical model
multi-agent systems
network agents
network setting
network threats
network traffic features
network transactions
neural nets
neural network
Neural networks
Organizations
internal attacks
pubcrawl
risk assessment
risk management
risk-based approach
security
security solutions
self-organizing behavior
telecommunication traffic
third-party users
time-state chart
Workstations
Cybersecurity
agent-based modelling
agent-based system modelling
attack-state
Business
business data processing
business entity risk assessment
complex enterprise systems
computer network security
computer networks
critical infrastructure
cyber-attacks
agent based cybersecurity
data access
defense mechanism
defense strategies
dynamic state changes
external attacks
Human behavior
Human Factors
human interactions
information exchange
innovative information technology
biblio
DeepGuard: Deep Generative User-behavior Analytics for Ransomware Detection
Submitted by grigby1 on Tue, 03/30/2021 - 12:04pm
three-sigma limit rule
Organizations
pubcrawl
ransomware activity
ransomware criminals
ransomware detection
ransomware incidence report
security
system monitoring
neural nets
tools
Training
Training data
user activity
User behavior Analytics
user behavior modeling
WannaCry
Ransomware
learning (artificial intelligence)
invasive software
Informatics
Human Factors
Human behavior
file-interaction pattern logging
DeepGuard
deep generative user-behavior analytics
deep generative autoencoder architecture
Deep Autoencoders
Data mining
Cybersecurity
Attack detection
Compositionality
Resiliency
biblio
Hybrid Attack Detection Framework for Industrial Control Systems using 1D-Convolutional Neural Network and Isolation Forest
Submitted by grigby1 on Tue, 03/30/2021 - 11:53am
Industrial Control System (ICS)
SWaT testbed
sensors
secure water treatment
Scalability
Resiliency
resilience
pubcrawl
production engineering computing
process control
neural nets
learning (artificial intelligence)
isolation forest-based detection model
Isolation Forest (IF)
industrial plants
1D-CNN model
industrial control system
industrial control
ICS Anomaly Detection
ICs
Forestry
feature extraction model
feature extraction
Data models
Convolutional Neural Network models
convolutional neural network (CNN)
control engineering computing
Auto-Encoder (AE)
Anomaly Detection
actuators
biblio
Facial recognition and 3D non-rigid registration
Submitted by grigby1 on Mon, 03/29/2021 - 1:04pm
iterative closest points (ICP)
tools
Three-dimensional displays
Resiliency
resilience
resampling method
pubcrawl
point clouds
nonrigid Iterative Closest Point algorithm
non-rigid ICP
Neural networks
neural nets
nanotechnology
Metrics
Iterative methods
3D nonrigid registration
image registration
human faces
human face recognition
Human behavior
facial recognition performance
facial recognition
facial expressions
face recognition
convolutional neural networks
convolutional neural network (CNN)
convolutional neural network
canonical face representation
3D point clouds
biblio
Effect of Age and Gender on Facial Emotion Recognition
Submitted by grigby1 on Mon, 03/29/2021 - 1:03pm
Human behavior
Support vector machines
Resiliency
resilience
Reactive power
pubcrawl
Neural networks
neural nets
Metrics
human computer interaction
facial recognition
gender effect
feature extraction
facial emotion recognition
faces
face recognition
emotion recognition
classification
Artificial Neural Networks
age effect
biblio
A General Difficulty Control Algorithm for Proof-of-Work Based Blockchains
Submitted by aekwall on Mon, 03/29/2021 - 12:09pm
speech processing
two-layer neural network
Proof-of-Work based blockchains
PoW based blockchains
network hash rate
hash rate
general difficulty control algorithm
efficient difficulty control algorithm
difficulty control algorithm
difficulty adjustment rules
block difficulty
hash algorithms
Cryptography
Compositionality
signal processing
Signal processing algorithms
pubcrawl
Neural networks
neural nets
blockchain
Resiliency
Data models
Memory management
biblio
A Learning-based Data Augmentation for Network Anomaly Detection
Submitted by aekwall on Mon, 03/29/2021 - 11:58am
divide-augment-combine strategy
sampling methods
class imbalance problem
network anomaly detection
attack instances
augments data
data augmentation
data instances
Divide-Augment-Combine
Gallium nitride
generative adversarial model
high-quality data
learning-based data augmentation
network traffic traces
public network datasets
statistical sampling
synthetic instances
Generative Adversarial Learning
pattern classification
Scalability
Data models
Support vector machines
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
neural nets
security of data
Anomaly Detection
network traffic
Generators
generative adversarial networks
generative adversarial network
Predictive Metrics
data handling
biblio
Detecting Adversarial Examples for Network Intrusion Detection System with GAN
Submitted by aekwall on Mon, 03/29/2021 - 11:58am
machine learning
Training
security
Scalability
Resiliency
pubcrawl
Predictive Metrics
neural nets
network intrusion system
network intrusion detection
network and data security
machine learning algorithms
adversarial examples detection
learning (artificial intelligence)
intelligent network intrusion detection system
Generators
generative adversarial networks
Generative Adversarial Learning
gan
defense technology
data distribution
computer network security
bidirectional generative adversarial network
adversarial sample
1
2
3
4
5
6
7
8
9
…
next ›
last »