Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Decision trees
biblio
Locating SQL Injection Vulnerabilities in Java Byte Code Using Natural Language Techniques
Submitted by grigby1 on Thu, 09/26/2019 - 9:25am
resilience
tools
Text Mining
standards
SQL injection vulnerabilities
SQL injection
SQL
source code (software)
software vulnerabilities
Software
singular decision trees
security of data
security
Secure Coding
Safe Coding
Resiliency
code analysis
Python
pubcrawl
program diagnostics
policy-based governance
natural language techniques
natural language processing
Metrics
Java program
Java byte code
Java
Human Factors
Human behavior
Decision trees
collaboration
code analysis tools
biblio
Context-Aware File Discovery System for Distributed Mobile-Cloud Apps
Submitted by aekwall on Wed, 09/04/2019 - 10:16am
Linux
Servers
Scalability
Resiliency
pubcrawl
peer-to-peer solutions
Peer-to-peer computing
Monte Carlo methods
Mobile handsets
mobile computing
mobile cloud computing
middleware
Metadata Discovery Problem
metadata
meta data
android
image file
File discovery service
distributed mobile-cloud apps
Distributed databases
Decision trees
Decision Tree
context-aware file discovery system
context-aware file discovery service
Computation offloading
composability
cloud-based metadata server
Cloud Computing
CAFDS
Android (operating system)
biblio
Is Predicting Software Security Bugs Using Deep Learning Better Than the Traditional Machine Learning Algorithms?
Submitted by aekwall on Mon, 07/01/2019 - 9:14am
Predictive models
Support vector machines
software security bugs
software quality metrics
software quality
software metrics
software insecurity
Software
security-related bugs
security of data
Security Metrics
security breaches
security
Random Forest
pubcrawl
program debugging
predictive security metrics
Naive Bayes
multilayer deep feedforward network
Metrics
machine learning
learning (artificial intelligence)
feedforward neural nets
Feedforward Artificial Network
deep learning technique
deep learning
Decision trees
Decision Tree
Computer bugs
Bug Propensity Correlational Analysis
Bayes methods
biblio
At Your Own Risk: Shaping Privacy Heuristics for Online Self-Disclosure
Submitted by grigby1 on Mon, 07/01/2019 - 9:06am
privacy awareness
user-centred privacy preferences
Task Analysis
social networking (online)
social network sites
sensitive information
Security Heuristics
Scalability
risk analysis
Resiliency
resilience
recurrent regrettable scenarios
pubcrawl
private information
privacy heuristics
acceptance trees
privacy
potential privacy risks
online self-disclosure
Human-computer interaction
Heuristics
Facebook
Employment
Decision trees
data structures
data structure representative
data privacy
aware- ness
audience component
adaptive privacy
biblio
Intelligent Malware Detection Using Oblique Random Forest Paradigm
Submitted by grigby1 on Mon, 06/10/2019 - 1:02pm
resilience
malware classification datasets
Metrics
Oblique Random Forest
oblique random forest ensemble learning technique
oblique random forest paradigm
pattern classification
privacy
pubcrawl
malware classification
Resiliency
security community
signature-based detection techniques
stealthy malware
Support vector machines
Trojan horses
unknown malware
behavior-based detection techniques
malware behavior
machine learning solutions
machine learning
learning (artificial intelligence)
invasive software
intelligent malware detection
Human behavior
Forestry
feature extraction
false positive rate
Decision trees
decision tree learning models
computerized online applications
comprehensive malware detection
classification accuracy
biblio
Malware Classification Using Machine Learning Algorithms
Submitted by grigby1 on Mon, 06/10/2019 - 1:02pm
malicious software
Support vector machines
stealing deleting sensitive data
scripts
Resiliency
resilience
pubcrawl
privacy
pattern classification
Metrics
Malware crisis
malware classification
malware
computer architecture
malicious programs
machine learning algorithms
learning (artificial intelligence)
invasive software
internet
Human behavior
huge virtual world
encrypting deleting sensitive data
Decision trees
Correlation
core computing functions
Conferences
biblio
Research of Classical Machine Learning Methods and Deep Learning Models Effectiveness in Detecting Anomalies of Industrial Control System
Submitted by grigby1 on Mon, 06/10/2019 - 12:56pm
resilience
machine learning algorithms
machine learning methods
modern industrial control systems
neural nets
Neural networks
privacy
production engineering computing
pubcrawl
machine learning
Resiliency
security
security of data
signal correlations
Support vector machines
Tennessee Eastman process simulation data
Training
Anomaly Detection
linear algorithms
learning (artificial intelligence)
industrial process anomaly detection task
industrial control
ICS security
ICs
Feeds
deep learning models
deep learning
Decision trees
Data processing
Cyber Attacks
control engineering computing
composability
anomaly detection evaluation dataset
biblio
Optimal Machine Learning Algorithms for Cyber Threat Detection
Submitted by grigby1 on Mon, 06/10/2019 - 12:56pm
Regression
Logistics
machine learning
machine learning algorithms
minimisation
ML-based analytics
Numerical Clustering
optimal machine learning algorithm
prediction
privacy
pubcrawl
learning (artificial intelligence)
resilience
Resiliency
security
security data
security log analytics
security logs
security machine data
security of data
SoC
Decision trees
Anomaly Detection
automated cyber threat detection
classification
Classification algorithms
Clustering algorithms
composability
cyber security
cyber threat detection model
Data mining
data science
advanced targeted cyber threats
deep learning
Dimensionality
efficient machine
Ensemble Learning
exponential hike
false detection rates
false-positive detections
global Security Operations Center environments
Kernel
biblio
Machine Learning-Based Recommendation Trust Model for Machine-to-Machine Communication
Submitted by grigby1 on Mon, 06/10/2019 - 12:56pm
resilience
Naive Bayes
pattern classification
Peer-to-peer computing
privacy
pubcrawl
radial support vector machine
Random Forest
receiver operating characteristics
Reliability
Mathematical model
Resiliency
security
security issues
security threats
Supervisory Control and Data Supervisory Acquisition(SCADA)
Support vector machines
telecommunication computing
trust computation measures
Trusted Computing
k nearest neighbor
composability
Computational modeling
computer network security
Decision Tree
Decision trees
internet
Internet of Things(IoTs)
Internet of Vehicles(IoVs)
Internet Protocol
Bayes methods
learning (artificial intelligence)
machine learning
machine learning trust evaluation
Machine learning-based recommendation trust model
Machine Type Communication Devices
Machine-to-Machine communication nodes
machine-to-machine communications
Machine-to-Machine(M2M)
malicious data
biblio
Implementation of a Massively Parallel Dynamic Security Assessment Platform for Large-Scale Grids
Submitted by aekwall on Wed, 05/01/2019 - 11:27am
parallel implementation architecture
Stability analysis
security
Resiliency
pubcrawl
power systems
power system stability
power system security
Power system dynamics
power grids
power engineering computing
plug-in architecture
parallel processing
composability
pan-European operational stability analysis
Metrics
large-scale grids
iTesla project
High performance computing
French grid
electricity grids
Dynamical Systems
Dynamic security assessment
Decision trees
computer architecture
computational platform
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »