Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Neural networks
biblio
Anomaly Detection using Graph Neural Networks
Submitted by grigby1 on Fri, 05/08/2020 - 2:43pm
security of data
Neural networks
pattern classification
pattern clustering
Peer-to-peer computing
policy-based governance
pubcrawl
Resiliency
security
Neural Network Security
social connection graphs
social network
social network statistical measures
social networking (online)
statistical analysis
Twitter
Twitter dataset
Twitter network
email network
Artificial Neural Networks
classification
clustering
Clustering algorithms
collaboration
cyber physical systems
deep learning
deep neural networks
Anomaly Detection
Enron dataset
Graph Neural Network
graph neural networks
graph structure
graph theory
learning (artificial intelligence)
Metrics
neural nets
biblio
APT Attack Situation Assessment Model Based on optimized BP Neural Network
Submitted by grigby1 on Fri, 05/08/2020 - 2:42pm
APT
Neural Network Security
Training samples
timing
Situation Prediction
security situation
neural network
genetic algorithms
attack situation assessment model
Attack Path
adaptive genetic algorithm
BP Neural Network
Backpropagation
security of data
advanced persistent threat
Metrics
neural nets
Trojan horses
network security
collaboration
policy-based governance
pubcrawl
Neural networks
security
Predictive models
Training
biblio
Research on Computer Network Security Evaluation Method Based on Levenberg-Marquardt Algorithms
Submitted by grigby1 on Fri, 05/08/2020 - 2:42pm
Metrics
Neural Network Security
training process
local minimum point
LM-BP algorithm
Levenberg-Marquardt algorithms
evaluation
computer network security evaluation method
computer networks
BP Neural Network
Backpropagation
Training
neural nets
Communication networks
Safety
Indexes
computer network security
collaboration
policy-based governance
pubcrawl
Neural networks
security
biblio
Understanding the Influence of Graph Kernels on Deep Learning Architecture: A Case Study of Flow-Based Network Attack Detection
Submitted by aekwall on Mon, 05/04/2020 - 11:15am
deep learning
networked system
network security practices
network attack detection technology
network attack detection tasks
network attack detection
Graph Kernel
flow-based network attack detection
deep learning architecture
anomaly-based approaches
Network Security Architecture
deep neural networks
Computer crime
network traffic
convolutional neural nets
Neural networks
graph theory
pubcrawl
Resiliency
learning (artificial intelligence)
computer architecture
Kernel
IP networks
computer network security
biblio
Adversarial Defense via Learning to Generate Diverse Attacks
Submitted by grigby1 on Fri, 04/17/2020 - 10:58am
neural nets
White Box Security
Training
stochastic generator
security of data
Robustness
Resiliency
resilience
recursive generator
pubcrawl
Perturbation methods
pattern classification
optimization
one-shot perturbation
Neural networks
adversarial defense
Metrics
malicious attacks
machine learning
learning (artificial intelligence)
Generators
deterministic generator
deep neural networks
deep learning
Compositionality
composability
classification performance
black-box attacks
Adversarial training
biblio
Phishing URL Detection Via Capsule-Based Neural Network
Submitted by grigby1 on Fri, 04/10/2020 - 12:37pm
Neural networks
Web sites
URL Detection
unsolicited e-mail
Uniform resource locators
uniform resource locator
substantial manual feature engineering
social engineering
sensitive information
pubcrawl
phishing Website
phishing detection method
Phishing Detection
phishing criminals
phishing attacks
Phishing
capsule network
machine learning
Human Factors
Human behavior
Heuristic algorithms
feature representations
feature extraction
deep learning
cyber security
cyber attack
critical threat
convolutional neural nets
convolutional layer
convolution
Computer crime
capsule-based neural network
biblio
Novel Defense Method against Audio Adversarial Example for Speech-to-Text Transcription Neural Networks
Submitted by grigby1 on Fri, 03/27/2020 - 11:38am
computer security
speech-to-text transcription neural networks
speech-to-text
speech synthesis
Speech recognition
Sandbox Method
sandbox approach
Neural networks
defense method
Deep Speech
data representation
learning (artificial intelligence)
audio adversarial example
adversarial example
neural nets
sandboxing
composability
deep learning
policy-based governance
pubcrawl
collaboration
security of data
biblio
A Robust Malware Detection System Using Deep Learning on API Calls
Submitted by grigby1 on Fri, 03/27/2020 - 11:37am
cuckoo sandbox
robust malware detection system
redundant API
Object oriented modeling
neural nets
massive malware
massive datasets
malware detection
computer security
component
BLSTM
API sequences
API calls
API
Logic gates
application program interfaces
sandboxing
invasive software
malware
composability
policy-based governance
pubcrawl
Neural networks
feature extraction
collaboration
learning (artificial intelligence)
deep learning
biblio
Misbehavior Detection Using Machine Learning in Vehicular Communication Networks
Submitted by grigby1 on Mon, 03/02/2020 - 1:37pm
misbehavior detection system
vehicular networks
vehicular network system
vehicular ad hoc networks
Task Analysis
sybil attacks
Sybil attack
service attack
Resiliency
resilience
realistic vehicular network environment
pubcrawl
Neural networks
mobile computing
composability
Metrics
Media
machine learning
learning (artificial intelligence)
insider attacks
Generators
false alert generation attack
Databases
Data mining
Cryptography
cryptographic methods
Context modeling
biblio
Cognitive Routing for Improvement of IoT Security
Submitted by grigby1 on Wed, 02/26/2020 - 4:36pm
secure SDN paths
packet flows
pubcrawl
quality of service
Random Neural Networks
Routing
routing decisions
Scalability
SDN infrastructure
secure networks
Neural networks
security-aware routing
security-by-design concept
SerIoT
software defined networking
telecommunication network routing
telecommunication security
telecommunication traffic
trust relationships
Trust Routing
Europe
cognitive radio
Cognitive routing
Cognitive-Packet-Network
composability
Computer crime
computer network reliability
computer network security
dedicated networks
energy criteria
Cognitive Packet Networks mechanisms
information security
Internet of Things
Internet-of-Things
IoT
IoT security
network architecture
network nodes
Network-Security
neural nets
« first
‹ previous
…
31
32
33
34
35
36
37
38
39
…
next ›
last »