Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Neural networks
biblio
Application of partical swarm intelligence technique to predict software reliability
Submitted by K_Hooper on Wed, 05/02/2018 - 10:38am
particle swarm optimisation
Swarm Intelligence technique
Swarm Intelligence
software reliability
software program reliability prediction
software development
software cost estimation
Software
pubcrawl
particle swarm optimization
Ant\_Colony Optimization Technique
Particle Swarm Intelligence Technique
partical swarm intelligence technique
Neural networks
genetic programming
control systems
composability
Bio\_inspired Computing
Artificial Neural Networks
biblio
New Steganography Scheme to Conceal a Large Amount of Secret Messages Using an Improved-AMBTC Algorithm Based on Hybrid Adaptive Neural Networks
Submitted by grigby1 on Tue, 05/01/2018 - 11:34am
image steganography scheme
steganography detection
Steganography
standards
smoothing methods
secret message concealing
PVD systems
pubcrawl
privacy
Neural networks
neural nets
Metrics
media file
improved-AMBTC algorithm
improved absolute moment block truncation coding algorithm
adaptive systems
Image Steganography
Image edge detection
image concealing
image compression methods
Image coding
I-AMBTC
hybrid adaptive neural networks
HVS
edge detection operators
data compression
composability
ART
ANNS
biblio
DDoS attack detection using machine learning techniques in cloud computing environments
Submitted by K_Hooper on Wed, 04/04/2018 - 9:59am
Protocols
IT technology
learning (artificial intelligence)
legacy protocols
machine learning
machine learning algorithms
machine learning techniques
management organizations
Metrics
Neural networks
on-demand resources
Intrusion Detection
pubcrawl
reduced infrastructure cost
Resiliency
security
signature detection techniques
signatures attacks
victim cloud infrastructures
Vulnerability
vulnerability detection
DDoS detection system
attacker
Cloud Computing
cloud computing environments
cloud performance
Compositionality
Computer crime
computer network security
Computers
DDoS Attack
DDoS attack detection
Algorithm design and analysis
DDoS flooding attacks
DDoS threat
Decision Tree
Decision trees
distributed denial of service
end users
Human behavior
innocent compromised computers
internet
biblio
Vulnerability detection with deep learning
Submitted by K_Hooper on Wed, 04/04/2018 - 9:58am
Compositionality
convolution
convolution neural network
deep learning
Human behavior
long short term memory
machine learning
Metrics
Neural networks
pubcrawl
Resiliency
Software
Task Analysis
tools
Training
vulnerability detection
biblio
Experimental Evaluation of a Multi-Layer Feed-Forward Artificial Neural Network Classifier for Network Intrusion Detection System
Submitted by grigby1 on Mon, 04/02/2018 - 12:40pm
network intrusion detection system
water
UNSW-NB15 dataset
UNSW-NB15
unseen data
Training
testing
security of data
Resiliency
resilience
pubcrawl
policy-based governance
pattern classification
Neural networks
network security
Artificial Neural Networks
multilayer feed-forward artificial neural Network
Metrics
Measurement
learning (artificial intelligence)
intrusion detection system
Intrusion Detection
H2O
feedforward neural nets
deep learning binomial classifier
deep learning
conventional machine-learning algorithms
complex features
Big Data
biblio
Network Intrusion Detection for Cyber Security on Neuromorphic Computing System
Submitted by grigby1 on Mon, 04/02/2018 - 12:40pm
policy-based governance
network security
neural chips
Neural networks
neuromorphic cognitive computing
neuromorphic computing
neuromorphic computing system
Neuromorphics
Neurons
NSCS
physical neuromorphic chip
network intrusion detection
power efficient neuromorphic processors
pubcrawl
resilience
Resiliency
security of data
synaptic weights
Training
TrueNorth System
unsupervised deep learning
DVF
auto encoder
Biological neural networks
Cognitive Computing
computer security
crossbar weight
cyber security
Deep Neural Network
discrete values
discrete vector factorization
Artificial Neural Networks
hybrid encoding
IBM neurosynaptic core simulator
IBM TrueNorth neurosynaptic chip
IDS
Intrusion Detection
learning (artificial intelligence)
machine learning
Matrix decomposition
Metrics
biblio
An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor Analytics
Submitted by grigby1 on Wed, 02/21/2018 - 1:38pm
secure autonomous aerial surveillance
Multicore Computing
multicore computing security
near-sensor data analytics pipeline
Neural networks
parallel architectures
pubcrawl
regular computing task
remote recognition
resilience
Resiliency
Scalability
Metrics
security of data
seizure detection
sensitive data protection
sensors
size 65 nm
SoC
software programmability
system-on-chip
tightly-coupled multicore cluster
voltage 0.8 V
energy 3.16 pJ
CNN
compute-intensive data processing
computer architecture
computerised instrumentation
Cryptography
data analysis
Data Security
deep convolutional neural network
electroencephalogram
encrypted data collection
encryption
approximate computing
energy conservation
Engines
equivalent reduced instruction set computer operation
Face detection
feature extraction
Fulmine tight power envelope
Internet of Things
Internet-of-Things endpoint
IoT endpoint system-on-chip
low-power electronics
biblio
Empowering convolutional networks for malware classification and analysis
Submitted by grigby1 on Tue, 01/23/2018 - 3:53pm
pattern classification
malware
Malware Analysis
malware analytics
malware classification
malware families
metadata
Metrics
Neural networks
malicious executable detection
PE files
portable executable files
privacy
pubcrawl
Resiliency
statistical analysis
statistical machine learning
Feedforward neural networks
convolutional networks
convolutional neural constructs
Data mining
disassembled malicious binary execution sequences
feature extraction
feature plain vectorization
feedforward neural constructs
feedforward neural nets
Convolutional codes
hierarchical feature extraction
Human behavior
information feature extraction
instruction n-grams convolution
invasive software
learning (artificial intelligence)
malicious executable classification
biblio
Towards a neural language model for signature extraction from forensic logs
Submitted by K_Hooper on Wed, 01/10/2018 - 11:14am
natural language text
use cases
text analysis
Software
signature extraction frameworks
Scalability
rule-based systems
rule-based approaches
Resiliency
pubcrawl
Predictive models
pattern clustering
nonmutable part identification
Neural networks
neural nets
neural language model
Clustering algorithms
natural language processing
log message
log line clustering
learning (artificial intelligence)
knowledge based systems
Human behavior
Heuristics
handcrafted algorithms
Forensics
forensic log analysis
error-prone
Digital Forensics
data analysis
complex relationship learning
biblio
Phishing websites classifier using polynomial neural networks in genetic algorithm
Submitted by grigby1 on Wed, 12/20/2017 - 1:07pm
genetic algorithms
Web sites
Statistics
Sociology
pubcrawl
phishing Websites classifier
Phishing
neural networks techniques
Neural networks
Neural network (NN)
neural nets
improved polynomial neural networks
Human Factors
Human behavior
AI techniques
Genetic Algorithm (GA)
genetic algorithm
Error analysis
data structures
data structure
Data mining
data classification
Computer crime
classification techniques
chromosome recombination operators
brain
Artificial Intelligence
« first
‹ previous
…
36
37
38
39
40
41
42
43
44
next ›
last »