Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pattern classification
biblio
Anomaly Detection using Graph Neural Networks
Submitted by grigby1 on Fri, 05/08/2020 - 2:43pm
security of data
Neural networks
pattern classification
pattern clustering
Peer-to-peer computing
policy-based governance
pubcrawl
Resiliency
security
Neural Network Security
social connection graphs
social network
social network statistical measures
social networking (online)
statistical analysis
Twitter
Twitter dataset
Twitter network
email network
Artificial Neural Networks
classification
clustering
Clustering algorithms
collaboration
cyber physical systems
deep learning
deep neural networks
Anomaly Detection
Enron dataset
Graph Neural Network
graph neural networks
graph structure
graph theory
learning (artificial intelligence)
Metrics
neural nets
biblio
Predicting Cascading Failures in Power Grids using Machine Learning Algorithms
Submitted by grigby1 on Fri, 04/24/2020 - 4:38pm
MAT-POWER
cascading failure data set
cascading failure prediction
cascading failure simulator framework
Cascading Failures
data-driven technique
edge betweenness centrality
linear regression
load shedding
massive blackouts
cascading failure data
Monte-Carlo simulation
power grid operating parameters
power-grid engineers
real-world power grids
regression analysis
topological parameters
transmission line failures
Vulnerability prediction
Power Grid Vulnerability Assessment
power grids
machine learning
machine learning algorithms
pubcrawl
resilience
Resiliency
power engineering computing
composability
Load modeling
pattern classification
learning (artificial intelligence)
Metrics
failure analysis
power system reliability
power system faults
Power system protection
power transmission lines
average shortest distance
cascade data generation
biblio
Adversarial Defense via Learning to Generate Diverse Attacks
Submitted by grigby1 on Fri, 04/17/2020 - 10:58am
neural nets
White Box Security
Training
stochastic generator
security of data
Robustness
Resiliency
resilience
recursive generator
pubcrawl
Perturbation methods
pattern classification
optimization
one-shot perturbation
Neural networks
adversarial defense
Metrics
malicious attacks
machine learning
learning (artificial intelligence)
Generators
deterministic generator
deep neural networks
deep learning
Compositionality
composability
classification performance
black-box attacks
Adversarial training
biblio
Feature Denoising for Improving Adversarial Robustness
Submitted by grigby1 on Fri, 04/17/2020 - 10:58am
image classification systems
White Box Security
security of data
retrieval
Resiliency
resilience
Recognition: Detection
pubcrawl
pattern classification
nonlocal means
network architectures
Metrics
learning (artificial intelligence)
Iterative methods
image denoising
10-iteration PGD white-box attacks
image classification
feature extraction
feature denoising
deep learning
convolutional networks
Compositionality
composability
categorization
black-box attack settings
Adversarial training
Adversarial robustness
adversarial perturbations
adversarial attacks
2000-iteration PGD white-box attacks
biblio
Detection of Phishing websites using Generative Adversarial Network
Submitted by grigby1 on Fri, 04/10/2020 - 12:37pm
internal structure
Web sites
Uniform resource locators
Training
synthetic phishing features
security analytics
pubcrawl
phishing Websites
Phishing Detection
phishing datasets
Phishing
pattern classification
normal Websites
neural nets
meta data
low-risk rightreward nature
attack vector
Human Factors
Human behavior
hacking endeavour
Generators
generator network
generative adversarial networks
generative adversarial network
Gallium nitride
feature extraction
external metadata
discriminator network
Computer crime
Cloud Security
Big Data Analytics
biblio
Classifying Phishing Email Using Machine Learning and Deep Learning
Submitted by grigby1 on Fri, 04/10/2020 - 12:36pm
one-hot encoding
Web sites
unsolicited e-mail
text analysis
Support vector machines
Semantics
pubcrawl
phishing emails
phishing email
Phishing
pattern classification
Computer crime
machine learning
learning (artificial intelligence)
Human Factors
Human behavior
encoding
email text
Electronic mail
deep semantic analysis
deep learning
biblio
A Machine Learning Approach for URL Based Web Phishing Using Fuzzy Logic as Classifier
Submitted by grigby1 on Fri, 04/10/2020 - 12:35pm
learning (artificial intelligence)
Web sites
Web Mining
URL based Web phishing
Uniform resource locators
security of data
pubcrawl
phishing URL
phishing site
Phishing Detection
phishing attacks
Phishing
pattern classification
machine learning
classifier
internet
Human Factors
Human behavior
fuzzy logic classifier
Fuzzy logic
financial information
feature extraction
Databases
Data mining
credential information
Conferences
Computer crime
biblio
A Hybrid Technique To Detect Botnets, Based on P2P Traffic Similarity
Submitted by aekwall on Mon, 04/06/2020 - 10:14am
malicious services
Scalability
Human Factors
hypermedia
Botnet detection
conversation features
data flow features
DNS query
flow counting
flow similarity
hybrid technique
network traffic
multiple malicious codes
non-P2P traffic filtering mechanism
P2P botnet traffic detection
P2P traffic identification
P2P traffic similarity
peer-to-peer botnets
phishing links
two-stage detection method
two-stage traffic classification method
peer to peer security
feature extraction
Computer crime
computer network security
IP networks
telecommunication traffic
Protocols
invasive software
Classification algorithms
machine learning algorithms
transport protocols
network security
botnet
learning (artificial intelligence)
Resiliency
pubcrawl
Peer-to-peer computing
Metrics
pattern classification
machine learning techniques
machine learning classifiers
Anomaly Detection
biblio
Research on Network Malicious Code Detection and Provenance Tracking in Future Network
Submitted by aekwall on Mon, 04/06/2020 - 9:56am
malicious code detection
classification algorithm
Predictive Metrics
cyber physical systems
network coding
Behavior features
detection method
feature selection methods
host node
software defined networking
malware detection system
matching classification method
Mobile communication
network controller
network malicious code detection
optimal feature subset
propagation model
switch node
Feature Selection
malware
security
invasive software
Classification algorithms
machine learning algorithms
SDN network
network security
feature extraction
computer network security
Resiliency
pubcrawl
composability
Computational modeling
pattern classification
Analytical models
mobile network
biblio
Threshold Based Optimization of Performance Metrics with Severely Imbalanced Big Security Data
Submitted by grigby1 on Fri, 04/03/2020 - 12:18pm
learning (artificial intelligence)
threshold based optimization
Slow HTTP POST
severely imbalanced slow HTTP DoS attack data
severely imbalanced big security data
security of data
pubcrawl
predictive security metrics
Performance Metrics
pattern classification
optimisation
Metrics
machine learning techniques
big data security metrics
imbalanced big dataset
Decision trees
cyber security domain
classifier predictive models
classifier performance
classification threshold
class imbalance
C4.5N decision tree
Big Data
AUC
area under the receiver operating characteristic curve
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »