Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pattern classification
biblio
A Temporal Work Transference Event Log Trace Classification Algorithm and Its Experimental Analysis
Submitted by aekwall on Mon, 11/25/2019 - 2:00pm
pattern classification
Workflow Event Log
workflow enactment event log
Trace Classification
Temporal Work Transference Pattern
temporal work transference event log trace classification algorithm
system memory
pubcrawl
process mining
Planning
Analogies and Transference
Organizations
Information systems
information system
Human Factors
Human behavior
hospitals
History
Data mining
Classification algorithms
biblio
Challenging Machine Learning Algorithms in Predicting Vulnerable JavaScript Functions
Submitted by grigby1 on Tue, 11/12/2019 - 4:25pm
Snyk platform
pattern classification
performing algorithm
performing models
Prediction algorithms
prediction models
Predictive models
predictive security metrics
pubcrawl
public databases
re-sampling strategies
security
security vulnerabilities
node security project
software metrics
software security issues
static source code metrics
Support vector machines
SVM
viable practical approach
Vulnerability
vulnerability information
vulnerable components
vulnerable functions
vulnerable javascript functions
Java
code fixing patches
code metrics
Computer crime
cyber-crime activities
Databases
dataset
deep learnin
deep learning
extensive grid-search algorithm
F-measure
forest based classifiers
GitHub
challenging machine
JavaScript
JavaScript programs
learning (artificial intelligence)
machie learning
machine learning
machine learning algorithms
Measurement
Metrics
mitigation techniques
natural language processing
nearest neighbour methods
biblio
Common Metrics to Benchmark Human-Machine Teams (HMT): A Review
Submitted by Katie Dey on Fri, 09/13/2019 - 11:35am
Task Analysis
robotics
Metrics
human-machine teaming (HMT)
Human Factors
Benchmarking
autonomous system
robots
computer architecture
collaboration
Benchmark testing
human computer interaction
Measurement
benchmark HMT
Performance Metrics
metric classification
metric identification
human-machine teaming
benchmark human-machine teams
team working
pattern classification
Man-machine systems
Human Machine Teaming
C3E 2019
biblio
Detecting Malicious Authentication Events Trustfully
Submitted by grigby1 on Mon, 08/05/2019 - 11:36am
resilience
malicious authentication event detection
malicious class
pattern classification
policy-based governance
Predictive models
pubcrawl
random forest model
regression analysis
Los Alamos dataset
Resiliency
Scalability
security logs
supervised learning technique
Trusted Computing
trustful predictions
ultimately majority voting model
false trust
authentication
authentication event
Bipartite graph
collaboration
Computational modeling
false attacks
false negative rate
false positive rate
Anomaly Detection
feature extraction
Forestry
learning (artificial intelligence)
legitimate user behavior
logistic regression model
Logistics
LogitBoost model
biblio
A Multi-Classifier Framework for Open Source Malware Forensics
Submitted by grigby1 on Mon, 07/01/2019 - 10:06am
pattern classification
machine learning models
malware
malware analysis reports
malware attacks
malware forensics
manual analysis
multiclassifier framework
open source malware forensics
open source malware sandbox
machine learning algorithms
pubcrawl
resilience
Resiliency
Scalability
Security Heuristics
security of data
traditional anti-virus technologies
Training
ever-evolving threats
Bayes methods
computer network security
computer viruses
cyber attack pattern
Cyber Attacks
data cleaning
Data mining
Data models
automated manner
extensive pre-modeling techniques
feature extraction
future cyber threats
Gaussian Naive Bayes classifier
heuristics updates
invasive software
learning (artificial intelligence)
machine learning
biblio
Attack and Defense of Dynamic Analysis-Based, Adversarial Neural Malware Detection Models
Submitted by aekwall on Mon, 06/24/2019 - 2:43pm
Human behavior
Training
static analysis-based malware classifiers
Resiliency
pubcrawl
program diagnostics
pattern classification
Neural networks
Metrics
malware detection
malware classification accuracy
Malware Analysis
malware
learning (artificial intelligence)
Jacobian matrices
invasive software
adversarial attacks
Engines
Dynamic Malware Classification
dynamic analysis-based
deep learning-based systems
deep learning classification systems
deep learning
crafting adversarial samples
computer security
classification algorithm
anti-malware engine
anti-malware companies
adversarial neural malware detection models
adversarial learning-based attacks
adversarial learning
biblio
One-Shot Learning Approach for Unknown Malware Classification
Submitted by grigby1 on Mon, 06/10/2019 - 2:02pm
neural nets
Word2Vec
unknown malware classification
Training
Task Analysis
static analysis
Resiliency
resilience
pubcrawl
privacy
pattern classification
one-shot learning network
one-shot learning approach
One-shot learning
Neural Turing Machine
Neural networks
Adaptation models
network systems
natural language processing
Metrics
memory augmented neural network
malware classification
malware behavior
malware API calls sequence
malware
Least Recently Used Access
learning (artificial intelligence)
invasive software
intelligent protection systems
Human behavior
fewshot learning
API Sequence
biblio
Intelligent Malware Detection Using Oblique Random Forest Paradigm
Submitted by grigby1 on Mon, 06/10/2019 - 2:02pm
resilience
malware classification datasets
Metrics
Oblique Random Forest
oblique random forest ensemble learning technique
oblique random forest paradigm
pattern classification
privacy
pubcrawl
malware classification
Resiliency
security community
signature-based detection techniques
stealthy malware
Support vector machines
Trojan horses
unknown malware
behavior-based detection techniques
malware behavior
machine learning solutions
machine learning
learning (artificial intelligence)
invasive software
intelligent malware detection
Human behavior
Forestry
feature extraction
false positive rate
Decision trees
decision tree learning models
computerized online applications
comprehensive malware detection
classification accuracy
biblio
Malware Classification Using Machine Learning Algorithms
Submitted by grigby1 on Mon, 06/10/2019 - 2:02pm
malicious software
Support vector machines
stealing deleting sensitive data
scripts
Resiliency
resilience
pubcrawl
privacy
pattern classification
Metrics
Malware crisis
malware classification
malware
computer architecture
malicious programs
machine learning algorithms
learning (artificial intelligence)
invasive software
internet
Human behavior
huge virtual world
encrypting deleting sensitive data
Decision trees
Correlation
core computing functions
Conferences
biblio
Comprehensive Behavior Profiling Model for Malware Classification
Submitted by grigby1 on Mon, 06/10/2019 - 2:02pm
Metrics
telecommunication traffic
specific traffic selection
security
Resiliency
resilience
pubcrawl
Protocols
privacy
Payloads
pattern classification
partial network behavior
network security
Network behavior profiling
network behavior based classification methods
appropriate countermeasures
malware variants
malware network activities
malware classification method
malware classification
malware
invasive software
Human behavior
feature extraction
Computers
computer network security
Computational modeling
comprehensive behavior profiling model
complex activities
behavior profiling models
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
…
next ›
last »