Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pattern classification
biblio
Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark
Submitted by grigby1 on Wed, 09/12/2018 - 11:15am
security of data
Naive Bayes
network traffic
pattern classification
privacy
pubcrawl
public dataset
Relays
security
machine learning
sole statistical features
specific anonymity tool
statistical analysis
telecommunication traffic
tools
Tor
Traffic classification
users privacy
dark web
anonymity services
Bandwidth
Bayes methods
Bayesian network
belief networks
classifiers
communication content
Cryptography
anonymity
data privacy
encryption
Human behavior
Human Factors
I2P
internet
JonDonym
learning (artificial intelligence)
biblio
Crawling and cluster hidden web using crawler framework and fuzzy-KNN
Submitted by grigby1 on Wed, 09/12/2018 - 11:15am
pattern classification
Web site level
Web crawling
search process
hidden Web clustering
hidden web
fuzzy-KNN method
fuzzy-KNN
database classification process
crawling framework
crawler framework
fuzzy set theory
Browsers
pubcrawl
database management systems
World Wide Web
Databases
search engines
Crawlers
Web sites
Weapons
internet
dark web
deep web
Human Factors
Human behavior
biblio
Adversarial Machine Learning in Malware Detection: Arms Race between Evasion Attack and Defense
Submitted by Katie Dey on Mon, 08/06/2018 - 1:23pm
feature manipulations
Windows application programming interface calls
Windows API calls
security regularization term
secure-learning paradigm
SecDefender
portable executable files
PE files
pattern classification
malware detection
malware
learning-based classifier
learning (artificial intelligence)
invasive software
Adversarial Machine Learning
feature extraction
Extraction
EvnAttack
evasion cost
evasion attack model
Evasion Attack and Defense
Data models
Data mining
computer security
Comodo cloud security center
classifier retraining technique
application program interfaces
Cognitive Security
Articles of Interest
Extraction
C3E 2019
biblio
Anomaly Detection System Based on Classifier Fusion in ICS Environment
Submitted by grigby1 on Wed, 07/18/2018 - 10:06am
classifier
Anomaly Detection
anomaly detection system
Classification algorithms
Support vector machines
Training
Decision trees
demanding tasks
ICS Anomaly Detection
pattern classification
production engineering computing
pubcrawl
ICS cyber defense
ICS environment
reliable ICS cyber defense
resilience
supervised anomaly detection
classifier fusion
classifiers algorithms
computer security
industrial control
industrial control system
Resiliency
Scalability
critical information infrastructure
cyber security
Industrial Control Systems
integrated circuits
security of data
sensor fusion
cyber-attacks
Intrusion Detection
biblio
Multi-level Anomaly Detection in Industrial Control Systems via Package Signatures and LSTM Networks
Submitted by grigby1 on Wed, 07/18/2018 - 10:05am
resilience
multilevel anomaly detection method
network package content analysis
package content level anomaly detection
package signatures
package traffic
pattern classification
production engineering computing
Protocols
pubcrawl
recurrent neural nets
LSTM networks
Resiliency
SCADA systems
Scalability
signature database
software packages
stacked long short term memory network-based softmax classifier
time series
time-series anomaly detection
time-series structure
field devices
baseline signature database
Bloom filter
Bloom filters
communication patterns
control engineering computing
data structures
database management systems
Databases
Detectors
digital signatures
Anomaly Detection
gas pipeline SCADA system
ICS Anomaly Detection
ICS networks
industrial control
Industrial Control Systems
integrated circuits
Intrusion Detection
learning (artificial intelligence)
long short term memory networks
biblio
Systematic Poisoning Attacks on and Defenses for Machine Learning in Healthcare
Submitted by grigby1 on Fri, 07/06/2018 - 2:06pm
Resiliency
malware
medical computing
Medical Informatics
models
Neoplasms
patient distress
pattern classification
poisoning attacks
pubcrawl
resilience
malicious data
Scalability
security
security breach
security of data
systematic poisoning attacks
targeted errors
Theoretical
Training
training datasets
health care
Algorithms
application domains
arbitrary errors
biomedicine
computer security
critical decisions
Databases
Factual
false diagnosis prompt users
false positive classification
AI Poisoning
health-related applications
Healthcare
Human behavior
Humans
learning (artificial intelligence)
life-threatening consequences
machine learning
machine learning algorithms
machine-learning algorithms
biblio
A game-theoretic defense against data poisoning attacks in distributed support vector machines
Submitted by grigby1 on Fri, 07/06/2018 - 2:05pm
Resiliency
machine learning
multi-sensor classification
Nash Equilibrium
networked systems
pattern classification
prediction tasks
pubcrawl
resilience
learning algorithms
resilient DSVM algorithm
Scalability
secure DSVM algorithm
sensor fusion
sensors
Support vector machines
Training
DSVMs
Algorithm design and analysis
Computer crime
control units
data poisoning attacks
defense strategies
distributed algorithms
distributed support vector machines
DSVM learner
AI Poisoning
dynamic distributed algorithms
game theory
game-theoretic defense
game-theoretic framework
Games
Human behavior
learning (artificial intelligence)
biblio
A Lightweight Malware Classification Method Based on Detection Results of Anti-Virus Software
Submitted by grigby1 on Wed, 06/20/2018 - 12:57pm
Malware Analysis
static analysis
Resiliency
resilience
pubcrawl
program diagnostics
privacy
Phased arrays
pattern classification
Metrics
Malware Clustering
malware classification
antivirus software detection
malware
lightweight malware classification
internet
Human behavior
Electronic mail
dynamic analysis
Databases
Data mining
cyber threats
computer viruses
arrays
biblio
Hierarchical learning for automated malware classification
Submitted by grigby1 on Wed, 06/20/2018 - 12:56pm
pubcrawl
machine learning solutions
malicious file detection
malicious files automated classification
malware
malware classification
malware label
Metrics
nonhierarchical classifier
pattern classification
privacy
machine learning algorithms
resilience
Resiliency
security domain
signature augmentation
Support vector machines
system monitoring
Training
Win32
Win64
Formal Specification
automated malware classification
binary error rate
classification models
commercial anti-virus products
Companies
computer security
computer viruses
corporate computers
family variant
feature extraction
anti-virus companies
hierarchical labels
hierarchical learning algorithms
Hierarchical Machine Learning
hierarchical structure
home computers
Human behavior
industrial-scale malware dataset
label hierarchy achieves
learning (artificial intelligence)
biblio
Binary malware image classification using machine learning with local binary pattern
Submitted by grigby1 on Wed, 06/20/2018 - 12:56pm
machine learning
visualization
Trojan horses
Support vector machines
Resiliency
resilience
pubcrawl
privacy
pattern classification
Metrics
malware images
malware classification methodology
malware classification
malware
binary image
local binary pattern
learning (artificial intelligence)
LBP feature
invasive software
image texture
image descriptors
Image color analysis
image classification
Human behavior
feature extraction
Cyber-security
classification
binary malware image classification
« first
‹ previous
…
14
15
16
17
18
19
20
21
22
…
next ›
last »