Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
detection accuracy
biblio
Network Intrusion Detection Method Based on GAN Model
Submitted by grigby1 on Tue, 02/23/2021 - 1:45pm
performance indicators
Metrics
multi-classification model
network intrusion detection
network intrusion detection method
neural nets
original classification model
parameter setting
pattern classification
loss function
pubcrawl
resilience
security of data
supervised learning
supervised learning multiclassification model
Training
training method
Transforms
Gallium nitride
Resiliency
Predictive Metrics
Scalability
adversarial idea
binary classification model
composability
Computational modeling
detection accuracy
Generative Adversarial Learning
gan
GAN model
generated adversarial network
generative adversarial networks
label sample set
label samples
learning (artificial intelligence)
biblio
Evolving Advanced Persistent Threat Detection using Provenance Graph and Metric Learning
Submitted by grigby1 on Fri, 01/22/2021 - 1:37pm
security
learning (artificial intelligence)
machine learning
Measurement
online adaptive metric learning
provenance graph
pubcrawl
resilience
Scalability
high profile information
security of data
tools
TPR
Trojan horses
true positive rate
Zero day attacks
Zero-day attacks
attack campaigns
Human behavior
Metrics
Resiliency
composability
advanced persistent threat
advanced persistent threat detection
APT
APT attacks
Provenance
benign tools
Conferences
deep learning method
defense
detection accuracy
feature extraction
graph theory
biblio
Deepfake Detection with Clustering-based Embedding Regularization
Submitted by grigby1 on Fri, 01/15/2021 - 11:01am
Human behavior
video signal processing
video quality
social networking (online)
security of data
Scalability
Resiliency
resilience
Regularization
pubcrawl
pattern clustering
object detection
Metrics
learning (artificial intelligence)
Human Factors
AI-synthesized face swapping videos
feature extraction
false video
face swapping
face recognition
embedded systems
detection accuracy
deepfake video detection
deepfake detection competitions
deepfake detection
deepfake datasets
DeepFake
clustering-based embedding regularization
clustering-based
biblio
Theil-Based Countermeasure against Interest Flooding Attacks for Named Data Networks
Submitted by grigby1 on Fri, 05/29/2020 - 2:54pm
internet
Scalability
safety hazard
Resiliency
resilience
rapidly volatile attacks
pubcrawl
network security
Named Data Network Security
named data network
malicious interest packets
IP-based networks
IP networks
Internet architecture
Bandwidth
information-centric networking
IFA countermeasures
IFA attackers
Human behavior
Fluctuations
Flooding Attacks
Entropy
DoS attacks
detection accuracy
computer network security
computer architecture
channel capacity
biblio
Crypto-Aided Bayesian Detection of False Data in Short Messages
Submitted by grigby1 on Mon, 12/30/2019 - 1:21pm
Human behavior
Wireless communication
signal processing
short messages
Resiliency
resilience
Relays
pubcrawl
probability
Physical layer
missed detection
maximum a posteriori probability rule
Map
low overhead
low latency
lightweight cryptographic detection
Bayes methods
False Data Injection
False Data Detection
false data
false alarm
Electrostatic discharges
detection outcomes
detection error
detection accuracy
cyber physical systems
Cryptography
cryptographic detection
crypto-aided Bayesian detection framework
Conferences
composability
Bayesian detection
biblio
Detection of transformed malwares using permission flow graphs
Submitted by grigby1 on Wed, 06/20/2018 - 11:49am
privacy
malware variants
Measurement
Metrics
mobile computing
nontransformed malware
permission flow graph
permission flow graphs
permission framework
Malware Analysis
pubcrawl
resilience
Resiliency
signature based detection
smart phones
state-of-the-art graph similarity algorithm
transformed malware
vertex level
graph based similarity metrics
Android malware
Androids
attack surface
code level changes
control flow
detection accuracy
feature extraction
flow graphs
Android app
graph theory
Human behavior
Humanoid robots
invasive software
learning (artificial intelligence)
lightweight static Permission Flow Graph based approach
malicious apps
malware
biblio
Lightweight approach for detection of denial of service attacks using numeric to binary preprocessing
Submitted by BrandonB on Thu, 04/30/2015 - 12:22pm
DoS attack
training dataset quality
Training
online services
numeric to binary preprocessing method
Numeric to Binary preprocessing
normalization preprocessing methods
KDD 99 dataset
Intrusion Detection Systems
intrusion detection system
Intrusion Detection
IDS
fuzzy set theory
fuzzification preprocessing methods
Accuracy
distributed denial of service attack detection
discretization preprocessing methods
detection accuracy
Denial of Service attacks
denial of service attack
Decision trees
DDoS Attack
Data preprocessing
Data mining
CPU utilization
computer network security
Computer crime
Bayes methods