Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pattern classification
biblio
Classifying Malware Using Convolutional Gated Neural Network
Submitted by grigby1 on Mon, 06/10/2019 - 2:01pm
malware classification
Task Analysis
Resiliency
resilience
Recurrent neural networks
recurrent neural nets
pubcrawl
privacy
pattern classification
neural network
microsoft malware classification challenge
Metrics
malware detection
CNN
malware
malicious software
machine learning
Logic gates
invasive software
information technology society
Human behavior
Gated Recurrent Unit
feedforward neural nets
Deep Neural Network
convolutional neural networks
convolutional gated recurrent neural network model
biblio
Behavioral Malware Classification Using Convolutional Recurrent Neural Networks
Submitted by grigby1 on Mon, 06/10/2019 - 2:01pm
Metrics
Training
static signature
Resiliency
resilience
Recurrent neural networks
recurrent neural nets
Radio frequency
pubcrawl
privacy
Prefetching
pattern classification
Microsoft Windows Prefetch files
microsoft windows
anti-virus systems
malware classification
malware
invasive software
Human behavior
feature extraction
convolutional recurrent neural networks
convolutional neural nets
computer viruses
behavioral malware detection
behavioral malware classifiers
behavioral malware classification
anti-virus vendor naming schemes
biblio
Andro-Simnet: Android Malware Family Classification Using Social Network Analysis
Submitted by grigby1 on Mon, 06/10/2019 - 2:01pm
pubcrawl
malware similarity
malwares attack behavior pattern
metamorphic malware
Metrics
mobile computing
mobile devices
pattern classification
polymorphic malware
privacy
malware family network aggregation
resilience
Resiliency
signature-based malware detection method
social network analysis
Social network services
social networking (online)
static analysis
tactical characteristics
graph visualization
Android (operating system)
Android malware family classification
behavior-based detection
Classification algorithms
detection algorithms
efficient malware classification
feature extraction
Generators
Andro-Simnet
high classification accuracy
Human behavior
invasive software
k-fold cross-validation
machine learning
malware
malware classification
malware dataset
biblio
AppDNA: App Behavior Profiling via Graph-Based Deep Learning
Submitted by grigby1 on Mon, 06/10/2019 - 1:59pm
malicious apps
Task Analysis
Resiliency
pubcrawl
privacy
Plagiarism
pattern classification
Neural networks
mobile computing
mobile applications behaviors
Metrics
malware detection
malware classification
Malware Analysis
malware
app behavior profiling
machine learning
learning (artificial intelligence)
invasive software
Human behavior
graph-encoding method
graph-based deep learning
graph theory
function-call-graph-based app profiling
feature extraction
encoding
benign apps
AppDNA
app recommendation
biblio
DLGraph: Malware Detection Using Deep Learning and Graph Embedding
Submitted by grigby1 on Mon, 06/10/2019 - 1:59pm
Metrics
Windows application programming interface calls
Windows API calls
Trojan horses
static analysis
stacked denoising autoencoders
softmax regression
SDA
Resiliency
representation learning
pubcrawl
privacy
pattern classification
noise reduction
neural nets
microsoft windows
application program interfaces
malware detection
Malware Analysis
learning (artificial intelligence)
invasive software
Human behavior
graph theory
graph embedding
function-call graphs
function-call graph
feature extraction
embedded vector
embedded systems
DLGraph
deep learning
combined feature vector classification
biblio
Machine Learning-Based Recommendation Trust Model for Machine-to-Machine Communication
Submitted by grigby1 on Mon, 06/10/2019 - 1:56pm
resilience
Naive Bayes
pattern classification
Peer-to-peer computing
privacy
pubcrawl
radial support vector machine
Random Forest
receiver operating characteristics
Reliability
Mathematical model
Resiliency
security
security issues
security threats
Supervisory Control and Data Supervisory Acquisition(SCADA)
Support vector machines
telecommunication computing
trust computation measures
Trusted Computing
k nearest neighbor
composability
Computational modeling
computer network security
Decision Tree
Decision trees
internet
Internet of Things(IoTs)
Internet of Vehicles(IoVs)
Internet Protocol
Bayes methods
learning (artificial intelligence)
machine learning
machine learning trust evaluation
Machine learning-based recommendation trust model
Machine Type Communication Devices
Machine-to-Machine communication nodes
machine-to-machine communications
Machine-to-Machine(M2M)
malicious data
biblio
IDS Based Network Security Architecture with TCP/IP Parameters Using Machine Learning
Submitted by grigby1 on Mon, 06/10/2019 - 1:55pm
security actions
networks
normal threats data sets
pattern classification
privacy
Protocols
pubcrawl
regular traffic pattern
Reinforcement algorithm
Reliability
resilience
Resiliency
securities threats
security
Network Security Architecture
security devices
security of data
security problems
server based access
TCP-IP packets
TCP-IP parameters
TCP/IP Protocols
TCPIP
telecommunication traffic
transport protocols
vulnerable sites
WEKA and Snoor tools
data confidentiality
authentication
authorisation
Classification algorithms
Communication networks
composability
computer access
computer architecture
computer network security
computer security
Confidentiality and Vulnerabilities
crypto algorithms
Cryptography
authentic data
data reliability
data set
internet
Intrusion Detection
IoT (Internet of Things)
IP networks
IPsec
KNN classification
kNN classification algorithm
learning (artificial intelligence)
machine learning
network access
biblio
Deep Learning Based Attribute Classification Insider Threat Detection for Data Security
Submitted by aekwall on Wed, 05/08/2019 - 9:49am
long short term memory recurrent neural networks
threat detection recall
security of data
resilience
Recurrent neural networks
recurrent neural nets
pubcrawl
Principal Component Analysis based threat detection methods
principal component analysis
pattern classification
network threat
Metrics
malicious insiders
machine learning
Anomaly Detection
Logic gates
learning (artificial intelligence)
Kernel
insider threat
Human behavior
high detection rate
feature extraction
end-to-end detection framework
deep learning
Data Security
CERT insider threat dataset
attribute classifiers
attribute classification insider threat detection method
biblio
A Co-Training Based Hardware Trojan Detection Technique by Exploiting Unlabeled ICs and Inaccurate Simulation Models
Submitted by grigby1 on Fri, 03/15/2019 - 11:59am
Integrated circuit modeling
unlabeled ICs
unlabeled IC
unlabeled fabricated IC
Trojan horses
trojan horse detection
Training
simulated IC
Silicon
reliable detection capability
pubcrawl
pattern classification
learning (artificial intelligence)
invasive software
accurate classification model
inaccurate simulation models
IC labeling
hardware Trojan detection
Hardware Security
Hardware
golden chip
fabrication
fabricated golden chips
co-training based hardware Trojan detection technique
co-training
classification-based golden chips-free hardware Trojan detection technique
Classification algorithms
actual silicon fabrication
biblio
Using Convolutional Neural Networks to Network Intrusion Detection for Cyber Threats
Submitted by grigby1 on Fri, 03/15/2019 - 11:53am
Metrics
Training
threat vectors
threat detection classification
Support vector machines
security of data
Resiliency
pubcrawl
privacy
pattern classification
network threat classification
network intrusion detection
network behavioural features
Behavior features
LeNet-5
learning (artificial intelligence)
Intrusion Detection
feedforward neural nets
feature extraction
deep learning
cyber threats
convolutional neural networks
convolution
Conferences
composability
« first
‹ previous
…
11
12
13
14
15
16
17
18
19
…
next ›
last »