Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pattern classification
biblio
Keystroke Analysis for User Identification Using Deep Neural Networks
Submitted by grigby1 on Tue, 01/28/2020 - 2:36pm
malicious users
user identification
typing style
typing dynamics
supervised learning
pubcrawl
pattern classification
neural network
neural net architecture
multilayer perceptrons
MLP deep neural network
Metrics
message authentication
Artificial Intelligence
learning (artificial intelligence)
keystroke analysis
keystroke
Human Factors
Human behavior
feature model
deep neural network architecture
deep learning-based classifiers
deep learning
decision-trees machine learning algorithm
Decision trees
authentication systems
biblio
Network Intrusion Detection using Supervised Machine Learning Technique with Feature Selection
Submitted by aekwall on Mon, 01/27/2020 - 10:20am
pattern classification
wrapper feature selection
supervised machine learning technique
supervised learning algorithm
intrusion detection success rate
artificial neural network based machine
intrusion
Predictive Metrics
Signal processing algorithms
Artificial Neural Networks
network traffic
neural network
machine learning techniques
network intrusion detection
security of data
neural nets
deep learning
composability
pubcrawl
Resiliency
machine learning
learning (artificial intelligence)
Feature Selection
feature extraction
support vector machine
Support vector machines
machine learning algorithms
Classification algorithms
biblio
Phishing URL Detection via CNN and Attention-Based Hierarchical RNN
Submitted by aekwall on Mon, 01/20/2020 - 12:13pm
Phishing Detection
Uniform resource locators
Fuses
attention-based hierarchical recurrent neural network module
attention-based hierarchical RNN
blacklisting
character-level spatial feature representations
convolutional neural network module
deep learning-based approach
feature engineering
Human Factors
phishing uniform resource locators
phishing URL classifier
phishing URL detection
phishing Websites
three-layer CNN
word-level temporal feature representations
zero-day phishing attacks
zero trust
pattern classification
cyber security
Electronic mail
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
policy-based governance
machine learning
Scalability
Computer crime
internet
Web sites
unsolicited e-mail
convolutional neural nets
recurrent neural nets
Phishing
deep learning
biblio
Machine Learning Based Intrusion Detection System
Submitted by aekwall on Mon, 01/20/2020 - 11:55am
malicious activity
well-organized classification methodology
Training
Support vector machines
Support Vector Machine Naive Bayes
support vector machine
statistical methodologies
security of data
Resiliency
pubcrawl
Predictive Metrics
pattern classification
NSL- KDD knowledge discovery dataset
network traffic data
Naive Bayes
Market research
Bayes methods
machine learning based intrusion detection system
machine learning
learning (artificial intelligence)
Intrusion Detection Systems
Intrusion Detection
Informatics
false alarms
distrustful activity
detection rate
Data mining
Conferences
computer network security
composability
Comparative Analysis
biblio
Dendritic Cell Algorithm Enhancement Using Fuzzy Inference System for Network Intrusion Detection
Submitted by aekwall on Mon, 01/20/2020 - 11:55am
genetic algorithms
TSK+ fuzzy inference system
TSK+
Statistics
Sociology
Resiliency
pubcrawl
pattern classification
pathogenic associated molecular pattern
network intrusion detection
Mutual information
Intrusion Detection Systems
immune-inspired classification algorithm
Immune system
Anomaly Detection
Fuzzy sets
fuzzy reasoning
Fuzzy logic
Fuzzy inference systems
feature extraction
dendritic cell algorithm enhancement
Dendritic cell algorithm
danger theory
computer networks
computer network security
composability
artificial immune systems
artificial immune system
biblio
Comparing the Performance of Adaptive Boosted Classifiers in Anomaly based Intrusion Detection System for Networks
Submitted by aekwall on Mon, 01/20/2020 - 11:55am
intrusion detection Kaggle dataset
Training
tools
Resiliency
Random Tree
pubcrawl
pattern classification
network intrusion detection
network based intrusion detection
naïve Bayes classifier
Metrics
lengthy detection process
learning (artificial intelligence)
Intrusion Detection Systems
intrusion detection system
adaptive boosted classifiers
Intrusion Detection
hybrid anomaly based intrusion detection system
discretization
detection rate
Decision trees
Data mining
Correlation based feature weighted Naïve Bayes
Correlation
computer network security
composability
boosting techniques
boosting process
boosting
biblio
Deep in the Dark - Deep Learning-Based Malware Traffic Detection Without Expert Knowledge
Submitted by grigby1 on Thu, 01/02/2020 - 2:41pm
machine learning-based systems
Training
telecommunication traffic
Scalability
robust network security systems
raw-traffic feature representations
Raw Measurements
pubcrawl
privacy
pattern classification
networking attacks
network traffic
network security applications
malware network traffic
malware detection
malware
Expert Systems and Privacy
learning (artificial intelligence)
invasive software
Human Factors
feature extraction
expert systems
expert handcrafted features
deep learning-based malware traffic detection
deep learning models
deep learning
Data models
computer network security
computer architecture
classification
Analytical models
Human behavior
biblio
Uncertainty-Aware Authentication Model for Fog Computing in IoT
Submitted by aekwall on Mon, 12/30/2019 - 12:16pm
Naive Bayes
uncertainty-aware authentication model
uncertainty handling
uncertainty
Support vector machines
support vector machine
supervised learning
supervised classification algorithms
security issues
Scalability
Resiliency
regression analysis
pubcrawl
privacy issues
prediction model
pattern classification
Fog computing
Mobile Edge Computing
logistic regression
IoT
Internet of Things
Fog Computing and Security
Decision trees
Decision Tree
Cloud Computing
Cisco Systems
Bayes methods
authorisation
authentication
attribute based access control model
ABAC model
security
biblio
Intrusion Detection Model of SCADA Using Graphical Features
Submitted by aekwall on Mon, 12/02/2019 - 12:04pm
information scanning
time series
command injection attacks
classification model
command injection
denial of service
graphic area features
graphical features
iec 60870-5-104
message transmission
intrusion detection experiment environment
intrusion detection model
Intrusion Detection System (IDS)
Law
response injection
supervisory control and data acquisition (SCADA)
supervisory control and data acquisition system
time series features
Metrics
Protocols
Industrial Control Systems
SCADA
SCADA systems
feature extraction
Resiliency
pubcrawl
composability
security of data
pattern classification
production engineering computing
Mathematical model
Intrusion Detection
data set
power systems
data visualisation
industrial control
biblio
Fuzzy Rough Set Feature Selection to Enhance Phishing Attack Detection
Submitted by grigby1 on Tue, 11/26/2019 - 3:47pm
random forests
pattern classification
personal information
Phishing
phishing attack detection
Phishing Detection
phishing Web sites
pubcrawl
random forest classification
machine learning-based strategies
rough set theory
Rough sets
Training
Uniform resource locators
universal feature set
Web pages
Web sites
Fuzzy Rough Set
Computer crime
confidential information
cybercrime activities
definitive features
Electronic mail
feature extraction
Feature Selection
FRS feature selection
classifiers
fuzzy rough set feature selection
fuzzy rough set theory
fuzzy set theory
generalizable phishing detection
Human behavior
human factor
legitimate Web site
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
…
next ›
last »