Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Decision trees
biblio
Anomaly Detection in Cyber Security Attacks on Networks Using MLP Deep Learning
Submitted by grigby1 on Fri, 03/22/2019 - 1:01pm
J48
WEKA
Scalability
Resiliency
resilience
pubcrawl
multilayer perceptrons
Multilayer Perceptron (MLP)
Multilayer Perceptron
MLP deep learning
Metrics
malware data
malware attacks
malware
machine learning
learning (artificial intelligence)
Advanced Security Network Metrics \\& NonPayload-Based Obfuscations
invasive software
information security
ID3
feature extraction
deep learning
Decision trees
cyber security threats
cyber security attacks
cyber security
Correlation
computer network security
C4.5
big data security
Big Data
Anomaly Detection
biblio
Smart Grid Security Evaluation with a Big Data Use Case
Submitted by grigby1 on Fri, 03/22/2019 - 12:59pm
pubcrawl
smart power grids
Smart Grids
smart grid systems
smart grid security evaluation
Smart Grid
security of data
security
Scalability
Resiliency
resilience
Attack detection
power system
Power measurement
power engineering computing
Metrics
Energy Sector
Decision trees
Big Data techniques
big data security
Big Data
biblio
Malicious HTML File Prediction: A Detection and Classification Perspective with Noisy Data
Submitted by grigby1 on Wed, 03/06/2019 - 4:25pm
learning (artificial intelligence)
synthetic minority oversampling technique
SMOTE
Resiliency
resilience
pure detection model
pubcrawl
protection systems
pattern classification
noisy data
networked systems
malicious HTML file prediction
malicious HTML file classification
machine learning
Autonomic Security
Intrusion Detection
Hypertext systems
hypermedia markup languages
feature selection technique
feature extraction
Decision trees
data quality
cybersecurity challenges
computer security
computer network security
composability
class imbalance
Browsers
biblio
A Command-by-Intent Architecture for Battlefield Information Acquisition Systems
Submitted by grigby1 on Mon, 12/10/2018 - 11:34am
pubcrawl
military operations
mission information
mission information needs
mission success rate
mission-critical decision making
NATO-based mission scenario
network resources
operational mission goals
Prefetching
military computing
real-time information collection
resilience
Resiliency
Scalability
sensor fusion
Sensor Systems
subordinate units
target tracking
target tracking application
Decision Making
Bandwidth
battlefield information acquisition systems
cache storage
Command-by-intent
command-by-intent architecture
commander intent
data fusion system
Data integration
decision authority
Anglova
Decision trees
Decision-centric
forwarding caching relevant data
Human Factors
information needs
Information systems
Internet of battlefield things
iobt
biblio
Random forest algorithm under differential privacy
Submitted by grigby1 on Fri, 09/28/2018 - 11:57am
gini index
Scalability
Resiliency
random forest algorithm
Random Forest
pubcrawl
privacy
original algorithm
Indexes
Human behavior
Classification algorithms
Forestry
DPRF-gini
differential privacy
Decision trees
Decision Tree
data privacy disclosure
data privacy
composability
classification process
biblio
Anomaly Detection System Based on Classifier Fusion in ICS Environment
Submitted by grigby1 on Wed, 07/18/2018 - 10:06am
classifier
Anomaly Detection
anomaly detection system
Classification algorithms
Support vector machines
Training
Decision trees
demanding tasks
ICS Anomaly Detection
pattern classification
production engineering computing
pubcrawl
ICS cyber defense
ICS environment
reliable ICS cyber defense
resilience
supervised anomaly detection
classifier fusion
classifiers algorithms
computer security
industrial control
industrial control system
Resiliency
Scalability
critical information infrastructure
cyber security
Industrial Control Systems
integrated circuits
security of data
sensor fusion
cyber-attacks
Intrusion Detection
biblio
Malware classification using static analysis based features
Submitted by grigby1 on Wed, 06/20/2018 - 12:56pm
malware classification
Vegetation
Training
static analysis
Resiliency
resilience
pubcrawl
program diagnostics
privacy
pattern classification
ordinary opcode n-gram based features
Metrics
anti-virus vendors
malware binaries
malware
machine learning features
machine learning algorithms
learning (artificial intelligence)
Human behavior
feature extraction
Decision trees
control statement shingling
computer viruses
biblio
Automatically Repairing Web Application Firewalls Based on Successful SQL Injection Attacks
Submitted by grigby1 on Thu, 06/07/2018 - 3:13pm
SQL injection
privacy
program testing
pubcrawl
Regular Expression Inference
Resiliency
search problems
software maintenance
SQL
Policy-Governed Secure Collaboration
SQL Injection attacks
testing
vulnerabilities detection
vulnerable WAFs
WAF rule set
web application firewalls
Web application firewalls repair
web security
Human behavior
collaboration
combinatorial mathematics
combinatorial optimisation problem
Decision trees
filter rules
firewalls
Firewalls (computing)
genetic algorithms
Automated Testing
internet
learning (artificial intelligence)
legitimate requests
machine learning
multiobjective genetic algorithms
Policy
policy-based governance
biblio
A Data Aggregation Scheme with Fine-Grained Access Control for the Smart Grid
Submitted by grigby1 on Wed, 05/30/2018 - 4:08pm
energy consumers
smart power grids
smart meters
Smart Grids
smart grid consumer privacy
Smart Grid
real-time usage data
pubcrawl
privacy
power engineering computing
Human Factors
fine-grained access control
fine- grained data access control
Access Control
encryption
Decision trees
data utility
data privacy preservation
data privacy
data integrity
data aggregation scheme
data aggregation
control center
authorisation
attribute decision tree
biblio
DDoS attack detection using machine learning techniques in cloud computing environments
Submitted by K_Hooper on Wed, 04/04/2018 - 9:59am
Protocols
IT technology
learning (artificial intelligence)
legacy protocols
machine learning
machine learning algorithms
machine learning techniques
management organizations
Metrics
Neural networks
on-demand resources
Intrusion Detection
pubcrawl
reduced infrastructure cost
Resiliency
security
signature detection techniques
signatures attacks
victim cloud infrastructures
Vulnerability
vulnerability detection
DDoS detection system
attacker
Cloud Computing
cloud computing environments
cloud performance
Compositionality
Computer crime
computer network security
Computers
DDoS Attack
DDoS attack detection
Algorithm design and analysis
DDoS flooding attacks
DDoS threat
Decision Tree
Decision trees
distributed denial of service
end users
Human behavior
innocent compromised computers
internet
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »