Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pattern classification
biblio
Classification of Malware programs using autoencoders based deep learning architecture and its application to the microsoft malware Classification challenge (BIG 2015) dataset
Submitted by grigby1 on Wed, 06/20/2018 - 12:56pm
privacy
microcontrollers
Microsoft Malware Classification Challenge BIG2015
microsoft malware Classification challenge dataset
neural network
pattern classification
Pattern recognition
pattern recognition algorithms
principle component analysis
Metrics
pubcrawl
resilience
Resiliency
security
sensors
superior architecture
Time factors
gray scale images
autoencoder
classification process
classifier
Cybersecurity
deep learning
deep learning architecture
Devices
Global Positioning System
Acoustics
Human behavior
invasive software
Latches
learning (artificial intelligence)
malicious programs
malware classification
malware programs
biblio
Malware classification using static analysis based features
Submitted by grigby1 on Wed, 06/20/2018 - 12:56pm
malware classification
Vegetation
Training
static analysis
Resiliency
resilience
pubcrawl
program diagnostics
privacy
pattern classification
ordinary opcode n-gram based features
Metrics
anti-virus vendors
malware binaries
malware
machine learning features
machine learning algorithms
learning (artificial intelligence)
Human behavior
feature extraction
Decision trees
control statement shingling
computer viruses
biblio
Profile hidden Markov model for malware classification \#x2014; usage of system call sequence for malware classification
Submitted by grigby1 on Wed, 06/20/2018 - 12:55pm
obfuscation
Trojan horses
tools
system call sequence
system call
Resiliency
resilience
pubcrawl
proteins
protein sequences
profile hidden markov model
privacy
pattern classification
obfuscation technique
bioinformatics
microsoft windows
Metrics
malware technology
malware files
malware classification
malware
invasive software
Human behavior
Hidden Markov models
Grippers
DNA sequences
DNA
biological informatics
biblio
Proving Flow Security of Sequential Logic via Automatically-Synthesized Relational Invariants
Submitted by grigby1 on Mon, 06/11/2018 - 3:37pm
SD-card storage manager
Named Data Network Security
open-source designs
pattern classification
program debugging
program verification
pubcrawl
Registers
resilience
Resiliency
robotics controller
Scalability
Local area networks
security
security of data
sequential logic
SIMAREL
specification languages
storage management
STREAMS policies
unbounded input streams
user interfaces
Wires
Ethernet controller
automatically-synthesized relational invariants
circuit executions
core design C
debugging interface
declassification
digital signal processing chips
digital-signal processing module
Domain-Specific Language
DSP module
dynamic conditions
Algorithm design and analysis
field programmable gate arrays
flash memories
flash memory controller
flow security
Hardware
Hardware design languages
Human behavior
human computer interaction
information leaks
information-flow policies
biblio
An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack
Submitted by grigby1 on Thu, 06/07/2018 - 3:13pm
SQL injection attack
pubcrawl
receiver operating characteristic curve
Resiliency
ROC curve
secure backend storage
security
security of data
smart devices
SQL
SQL injection
privacy
SQLIA
SQLIA big data
SQLIA Data analytics
SQLIA hashing
SQLIA Pattern-driven data set
Structured Query Language
structured query language injection attack
supervised learning
supervised learning model
Support vector machines
IoT
back-end database
Big Data
Cloud Computing
cloud-hosted Web applications
collaboration
confidential data
Data mining
Data models
Human behavior
Internet of Things
Artificial Intelligence
learning (artificial intelligence)
learning automata
Microsoft Azure Machine Learning
ML algorithms
pattern classification
pattern-driven corpus
Policy
policy-based governance
Policy-Governed Secure Collaboration
Predictive Analytics
biblio
Result evaluation of field authentication based SQL injection and XSS attack exposure
Submitted by grigby1 on Thu, 06/07/2018 - 3:13pm
Servers
policy-based governance
Policy-Governed Secure Collaboration
privacy
profited businesses
pubcrawl
Resiliency
security imperatives
security issues
Policy
SQL
SQL infusion
SQL injection
Structured Query Language
web based business
web communications
Web sites
XSS attack exposure
document processing
centralized mechanism
collaboration
Computer crime
Cross Site Scripting (XSS)
cross webpage scripting
cross-site scripting
data trades
Databases
authentication
electronic framework association
electronic frameworks
field authentication
framework
Human behavior
information classification
message authentication
pattern classification
biblio
A heuristic attack detection approach using the \#x201C;least weighted \#x201D; attributes for cyber security data
Submitted by K_Hooper on Wed, 05/09/2018 - 11:02am
learning (artificial intelligence)
telecommunication traffic
Support vector machines
Security Heuristics
Scalability
Resiliency
pubcrawl
pattern classification
network traffic data
network systems
network intrusion detection
machine-learning techniques
machine learning
least weighted attributes
Cloud Computing
Intrusion Detection
heuristic attack detection approach
Feature Selection
feature extraction
Entropy
dimensionality problem
dimensional reduction
Data mining
cyber security data
cyber security
computer network security
Computational modeling
cloud-based computer networks
biblio
A Security Audit of the OpenPGP Format
Submitted by K_Hooper on Wed, 05/09/2018 - 10:56am
public domain software
OpenPGP
OpenPGP format
OpenPGP format specification
OpenPGP implementations
pattern classification
PGP
Production
Protocols
pubcrawl
open source Unix systems
Public key
Resiliency
Scalability
security audit
Security Audits
security vulnerabilities
Symantec PGP
Unix
email confidentiality
authorisation
computer security
context-free grammars
context-free languages
deterministic context free grammar
deterministic context free language
Electronic mail
email authenticity
authenticated package distributions
Formal Specification
GNU Privacy Guard
GnuPG
Grammar
Human behavior
language theoretical analysis
Language-theoretic security
malicious input data
biblio
k-Nearest Neighbours classification based Sybil attack detection in Vehicular networks
Submitted by K_Hooper on Wed, 05/02/2018 - 10:42am
Symmetric matrices
pubcrawl
Resiliency
road vehicles
runtime complexity optimization
Sybil attack
Sybil attack detection
Sybil attack vulnerability
sybil attacks
pseudonymous based privacy protection mechanism
traffic engineering computing
Transmitters
vehicle classification
Vehicle Driving Pattern
vehicle location privacy
vehicular network
vehicular networking
wireless sensor networks
Intrusion Detection
composability
computational complexity
data privacy
driving pattern similarity
Eigenvalues and eigenfunctions
ETSI
IEEE
Intelligent Transportation Systems
Ad hoc networks
k-nearest neighbours classification
kNN classification algorithm
machine learning
Metrics
pattern classification
Peer-to-peer computing
privacy
biblio
A Sequential Multi-Objective Robust Optimization Approach under Interval Uncertainty Based on Support Vector Machines
Submitted by grigby1 on Tue, 05/01/2018 - 11:38am
pattern classification
uncertainty
SVM
Support vector machines
sequential optimization approach
sequential multiobjective robust optimization
sequential MORO
Robustness
Resiliency
resilience
pubcrawl
composability
optimization
optimisation
multi-objective robust optimization
Metrics
mathematics computing
interval uncertainty
genetic algorithms
design alternative classification model
convergence
Computational modeling
« first
‹ previous
…
15
16
17
18
19
20
21
22
23
…
next ›
last »