Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pattern classification
biblio
Spam Detection Framework for Online Reviews Using Hadoop’ s Computational Capability
Submitted by aekwall on Mon, 02/25/2019 - 11:39am
retail data processing
MapReduce
MapReduce feature
metadata
NetSpam
online review
online reviews
online shopping
parallel programming
Reliability
machine learning techniques
review dataset classification
spam detection framework
spam detection methods
spam detection procedure
spam features
spam review
spam reviews
unsolicited e-mail
spam detection
Business
Big Data
feature extraction
learning (artificial intelligence)
Human behavior
pubcrawl
Metrics
pattern classification
internet
big data processing
Scalability
business decisions
Decision Making
Distribution functions
false reviews
feature type extraction
Hadoop
Hadoop computational capability
Labeling
biblio
Exploiting Linguistic Style as a Cognitive Biometric for Continuous Verification
Submitted by grigby1 on Fri, 02/22/2019 - 4:02pm
lexical levels
Training
text analysis
Syntactics
stylometry
semantic levels
pubcrawl
pattern classification
one-class classification problem
one class
natural language processing
Metrics
Linguistics
linguistic style
authorial style
learning (artificial intelligence)
Isolation Forests
Human behavior
formal verification
Forestry
feature extraction
continuous verification
cognitive biometric
cognition
biometrics (access control)
biometrics
authorship
biblio
Autoencoder Classification Algorithm Based on Swam Intelligence Optimization
Submitted by aekwall on Thu, 02/21/2019 - 1:02pm
Neural networks
Swarm Intelligence
Swam Intelligence Optimization
softmax
Quantum Particle Swarm Optimization(QPSO)
Quantum Particle Swarm Optimization
QPSO
pubcrawl
pattern classification
particle swarm optimization
particle swarm optimisation
Neurons
autoencoder classification algorithm
neural nets
Iris
Glass
Decoding
composability
Classification algorithms
classification
BP algorithm
Backpropagation
Autoencoder Neural Network
biblio
Adversarial mRMR against Evasion Attacks
Submitted by grigby1 on Mon, 01/21/2019 - 12:39pm
security
novel adversary-aware feature selection algorithm
pattern classification
Perfect Knowledge attack scenarios
popular filter algorithms
pubcrawl
Resiliency
robust feature selection algorithms
Scalability
mRMR
security of data
security sensitive applications
Time complexity
Traditional Wrapped Feature Selection algorithm
Training
TWFS
WAFS
wrapped adversarial feature selection algorithm
Feature Selection
adversarial mRMR
adversary attacks
Adversary Models
Classification algorithms
computational complexity
evasion attacks
FAFS
feature extraction
adversarial feature selection
feature selection process
filter model
filtering algorithms
Human behavior
learning (artificial intelligence)
machine learning
machine learning algorithms
Metrics
biblio
Automated Threat Report Classification over Multi-Source Data
Submitted by grigby1 on Mon, 01/21/2019 - 12:37pm
multisource data
Training
threat report documents
Threat report
Standards organizations
security of data
security
Scalability
Resiliency
pubcrawl
pattern classification
Organizations
NLP
natural language processing techniques
natural language processing
advanced persistent threats
Metrics
machine learning model
learning (artificial intelligence)
Human behavior
feature extraction
enterprise system defenders
document handling
defense systems
Data mining
command and control systems
collaboration
business data processing
bias correction
automated threat report classification
biblio
LipPass: Lip Reading-based User Authentication on Smartphones Leveraging Acoustic Signals
Submitted by grigby1 on Mon, 01/21/2019 - 12:28pm
privacy protection
learning (artificial intelligence)
lip movement patterns
lip reading-based user authentication system
LipPass
Lips
message authentication
mobile computing
pattern classification
Human behavior
pubcrawl
replay attacks
Resiliency
smart phones
Smartphones
spoofer detectors
support vector machine
Support vector machines
biometric-based authentication
Acoustic signal processing
acoustic signals
Acoustics
audio signal processing
authentication
authorisation
binary classifiers
binary tree-based authentication
Acoustic Fingerprints
build-in audio devices
composability
Data protection
deep learning-based method
Doppler effect
Doppler profiles
feature extraction
biblio
Black-Box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers
Submitted by aekwall on Wed, 01/16/2019 - 2:10pm
sentiment analysis
Perturbation methods
Prediction algorithms
program debugging
pubcrawl
real-world text datasets
Recurrent neural networks
resilience
scoring strategies
pattern classification
Task Analysis
text analysis
text classification
text input
text perturbations
White Box Security
word embedding
adversarial samples
misclassification
Metrics
machine learning
learning (artificial intelligence)
IMDB movie reviews
Enron spam emails
DeepWordBug
deep learning classifiers
deep learning
composability
character-level transformations
black-box generation
black-box attack
black box attack
adversarial text sequences
biblio
A Machine Learning Approach to Malicious JavaScript Detection using Fixed Length Vector Representation
Submitted by grigby1 on Mon, 12/10/2018 - 11:38am
pubcrawl
malicious JavaScript detection
malicious JS code detection
malicious JS codes
Metrics
neural nets
neural network model
Neural networks
pattern classification
plugin software
Predictive models
machine learning
resilience
Resiliency
Support vector machines
Vectors
web applications
Web site
Web sites
Zero day attacks
Zero-day attacks
drive-by-download attacks
Browsers
classifier model
composability
Context modeling
cyberattacks
Cybersecurity
D3M Dataset
defense
Doc2Vec
Doc2Vec features
authoring languages
Drive-by-Download Data
feature extraction
feature learning
features extraction
fixed length vector representation
invasive software
Java
JavaScript
learning (artificial intelligence)
biblio
Analyst Intuition Inspired High Velocity Big Data Analysis Using PCA Ranked Fuzzy K-Means Clustering with Multi-Layer Perceptron (MLP) to Obviate Cyber Security Risk
Submitted by grigby1 on Wed, 11/14/2018 - 1:21pm
pattern classification
learning (artificial intelligence)
log history annotation
malware
malware attacks
manually labelled data
MLP
Monitoring
Multi-layer Perceptron (MLP)
multilayer perceptrons
network datasets
network protocols
network user
neural network classifier multilayer perceptron base
IP networks
pattern clustering
PCA ranked fuzzy k-means clustering
principal component analysis
Principal Component Analysis (PCA)
pubcrawl
resilience
Resiliency
Scalability
scoring system
security
special semisupervise method
statistical data generation
Virus
cyber threats
analyst intuition inspired high velocity big data analysis
Artificial Intelligence
attacker IP addresses characteristics
Big Data
Clustering algorithms
computer networks
computer network security
computer security
cyber-attacks
cyber security
cyber security expert
cyber security log classification
cyber security risk
Analyst Intuition
data analysis
Data mining
efficient security monitoring system
Expectation Regulated
expert system
expert systems
Fuzzy k-means (FKM)
fuzzy set theory
High Velocity
Human behavior
integrated datasets
invasive software
biblio
Selecting System Specific Cybersecurity Attack Patterns Using Topic Modeling
Submitted by grigby1 on Wed, 11/14/2018 - 1:19pm
Mathematical model
topic modeling
system specific cybersecurity attack patterns
system
statistical distributions
security of data
security
Scalability
ranking method
pubcrawl
privacy
posterior distribution
pattern classification
natural language processing
attack topic distribution
KL divergence
Human Factors
expert systems
Databases
Data models
cybersecurity expert
cyber-physical systems
computer security
common attack pattern enumeration and classification database
common attack pattern enumeration
CAPEC database
capec
« first
‹ previous
…
13
14
15
16
17
18
19
20
21
…
next ›
last »