Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Decision trees
biblio
Cyber Threat Detection Using Machine Learning Techniques: A Performance Evaluation Perspective
Submitted by aekwall on Mon, 11/08/2021 - 3:22pm
cyber threat
Measurement
threat vectors
unsolicited e-mail
spam classification
performance evaluation
Machine Learning Application
Cyberspace
Cybercrime
Support vector machines
intrusion detection system
Decision trees
malware detection
malware
machine learning
privacy
pubcrawl
Computer crime
biblio
Accelerated Verification of Parametric Protocols with Decision Trees
Submitted by aekwall on Tue, 10/12/2021 - 3:07pm
policy-based governance
protocol verification
parameterized verification
formal methods
Design methodology
Coherence
cache coherence protocols
knowledge based systems
Decision trees
Acceleration
Compositionality
composability
pubcrawl
Conferences
machine learning
Protocols
privacy
biblio
Analysis of Malware Prediction Based on Infection Rate Using Machine Learning Techniques
Submitted by aekwall on Tue, 09/21/2021 - 11:09am
Malware Analysis
Predictive Metrics
neural network
Microsoft malware dataset
malware prediction
machine learning algorithm
lgbm
k-fold
Decision trees
Decision Tree
Neural networks
malware
Prediction algorithms
privacy
Human behavior
Resiliency
pubcrawl
machine learning algorithms
Training
Predictive models
biblio
PASAPTO: Policy-aware Security and Performance Trade-off Analysis–Computation on Encrypted Data with Restricted Leakage
Submitted by grigby1 on Thu, 04/29/2021 - 2:17pm
Cryptography
Decision trees
Heuristic algorithms
Java
optimization
policy-based governance
pubcrawl
security policies
Time measurement
biblio
IoT Botnet Malware Classification Using Weka Tool and Scikit-learn Machine Learning
Submitted by grigby1 on Tue, 03/09/2021 - 2:25pm
Resiliency
machine learning
machine learning algorithms
malware
malware attack
Metrics
network traffic
packet traffic
pubcrawl
resilience
learning (artificial intelligence)
scikit-learn
Scikit-learn analysis tools machine learning
Scikit-learn machine learning
telecommunication traffic
Time measurement
tools
WEKA
weka tool
false positive rate
botmaster
botnet
botnet IoT
botnet malware attacks
botnets
classification
composability
computer network security
Decision trees
accurate classification methods
inconspicuousness characteristics
inexpensive power
internet network security
Internet of Things
Internet of Things network infrastructure
invasive software
IoT botnet malware classification
IoT devices
biblio
Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach
Submitted by grigby1 on Tue, 03/09/2021 - 2:24pm
Metrics
Surges
Robustness
Resiliency
resilience
pubcrawl
performance evaluation
optimization
Microelectronics
Bayesian optimization
machine learning
IoT
Decision trees
composability
botnets
Botnet detection
botnet
biblio
Improving Black Box Classification Model Veracity for Electronics Anomaly Detection
Submitted by aekwall on Tue, 03/09/2021 - 12:05pm
electronics anomaly detection
fault detection
KNN
BB-stepwise algorithm
black box
black box classification model veracity
black box model
classification model transparency
data driven classification models
decision tree models
fault diagnosis
electronics devices
electronics industry
higher transparency
Industrial electronics
KNN models
KNN-stepwise
manufactured electronics
Stepwise
Metrics
performance evaluation
Classification algorithms
Data models
nearest neighbour methods
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
composability
Conferences
pattern classification
manufacturing systems
production engineering computing
black box encryption
Decision trees
classification
Veracity
Feature Selection
biblio
Encrypted-Input Program Obfuscation: Simultaneous Security Against White-Box and Black-Box Attacks
Submitted by grigby1 on Thu, 03/04/2021 - 2:33pm
pubcrawl
Logic gates
machine learning
machine learning as a service
machine learning programs
Metrics
program confidentiality
program obfuscation
provable program obfuscation solution
learning (artificial intelligence)
range membership programs
resilience
security
traditional cryptographic program obfuscation model
white box
white box cryptography
White Box Security
white-box attacks
cloud services
Resiliency
Predictive Metrics
Compositionality
Black Box Attacks
black box encryption
black-box attacks
Cloud Computing
cloud programs
provable security
composability
Computational modeling
Cryptography
data privacy
Decision trees
encrypted-input program obfuscation
encryption
equivalent unobfuscated program
biblio
Behavior-Based Detection of Cryptojacking Malware
Submitted by grigby1 on Wed, 02/10/2021 - 1:10pm
behavioral analysis
virtual machine environment
malicious mining
illegitimate profit
executable-type cryptojacking
detection program
decision tree algorithm
cybercriminals
cryptojacking malware
Cryptojacking detection
cryptojacking
CPU load
complex detection technique
browser-based cryptojacking
Data mining
behavior-based detection
Ransomware
Cybercrime
Decision trees
invasive software
Computer crime
internet
Resiliency
resilience
Metrics
Human behavior
pubcrawl
cryptocurrencies
biblio
Classifier with Deep Deviation Detection in PoE-IoT Devices
Submitted by aekwall on Mon, 01/11/2021 - 1:37pm
Decision trees
vulnerable IoT devices
PoE-IoT devices
PoE-IoT classification
poe
network traffic characteristics
ML
edge intelligence
deep deviation detection
behavior analysis
dpi
deep packet inspection
IoT
Switches
Cameras
computer network security
firmware
Image edge detection
Decision Tree
pubcrawl
Resiliency
machine learning
learning (artificial intelligence)
feature extraction
security
Internet of Things
telecommunication traffic
Scalability
Monitoring
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »