Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pattern classification
biblio
Training Neural Network Over Encrypted Data
Submitted by aekwall on Mon, 01/18/2021 - 11:27am
convolutional neural networks
Fuzzy Cryptography
private company policy
plain data
image permutation
image data encryption
convolutional neural network classifier
convolutional classifier
image classification
neural network
Image color analysis
Scalability
convolutional neural nets
Training
pattern classification
Metrics
pubcrawl
Resiliency
learning (artificial intelligence)
encryption
encrypted data
Cryptography
biblio
Classification of Websites Based on the Content and Features of Sites in Onion Space
Submitted by grigby1 on Fri, 01/15/2021 - 12:23pm
feedback
website classification
Tor
text analysis methods
site features
site content
parsing sites
onion-sites
onion space
onion site classification
features of onion sites
Dark Net
categories of onion sites
analysis of onion sites
Human Factors
dark web
learning (artificial intelligence)
neural network training
Python
Uniform resource locators
Electronic mail
documentation
Web sites
feature extraction
neural nets
pattern classification
internet
Human behavior
pubcrawl
Neural networks
machine learning
Training
biblio
DeepfakeStack: A Deep Ensemble-based Learning Technique for Deepfake Detection
Submitted by grigby1 on Fri, 01/15/2021 - 12:00pm
innovative applications
deepfake detection
Deepfake multimedia
DeepfakeStack
generative adversarial network models
Greedy Layer-wise Pretraining
human perception
hyper-realistic images
improved composite classifier
deep ensemble-based
legitimate applications
manipulated audio
manipulated videos
numerous nefarious ways
Political Campaigns
Realtime Deepfake detector
state-of-art classification models
unlawful ways
resilience
pubcrawl
Human behavior
Human Factors
Metrics
Resiliency
Scalability
pattern classification
Computer crime
learning (artificial intelligence)
deep learning models
gan
GANs
DeepFake
video clips
counterfeit contents
Deep Ensemble Learning
deep ensemble learning technique
biblio
Intelligent SDN Traffic Classification Using Deep Learning: Deep-SDN
Submitted by aekwall on Mon, 01/11/2021 - 1:36pm
deep packet inspection approaches
network architecture
Internet traffic
data plane
control plane
exponential growth
high computational cost
deep learning model
deep packet inspection
accurate traffic classification
centralised network controller
Software-Defined Networks
deep-SDN
fine-grained network management
intelligent SDN traffic classification
network activities
port-based approaches
resource utilisation
Traffic analysis
traffic applications
Traffic classification
pubcrawl
Scalability
telecommunication traffic
Protocols
computer architecture
computer network management
software defined networking
feature extraction
learning (artificial intelligence)
machine learning
Resiliency
Inspection
deep learning
pattern classification
Big Data
internet
Training
software-defined networking
network traffic
SDN
network management
biblio
Efficient Keyword Matching for Deep Packet Inspection based Network Traffic Classification
Submitted by aekwall on Mon, 01/11/2021 - 1:34pm
telecommunication network management
traffic classification techniques
subsequent signature matching
string matching
State Transition Machine
potential application signature
Network traffic classification
good classification accuracy
flow payloads
efficient keyword matching
dpi
deep packet inspection based network traffic classification
deep packet inspection
application signatures
network flows
Inspection
network management
Payloads
security monitoring
Complexity theory
quality of service
digital signatures
pattern matching
testing
pattern classification
pubcrawl
Resiliency
Protocols
telecommunication traffic
Scalability
biblio
A Malware Detection Method Based on Improved Fireworks Algorithm and Support Vector Machine
Submitted by aekwall on Mon, 12/14/2020 - 12:31pm
Levy Flights
SVM
Support vector machines
support vector machine
signature-based anti-virus systems
Resiliency
pubcrawl
Predictive Metrics
penalty factor
pattern classification
particle swarm optimization
particle swarm optimisation
optimal parameter combination
Malware detection method
malware detection
machine learning methods
threat vectors
learning (artificial intelligence)
kernel function parameter
invasive software
improved fireworks algorithm
genetic algorithms
Fireworks algorithm
Evolutionary algorithms
differential evolution
Decision trees
computer systems
composability
classification performance
privacy
Measurement
biblio
Detecting Malicious Web Requests Using an Enhanced TextCNN
Submitted by aekwall on Mon, 12/14/2020 - 12:31pm
Convolutional Neural Network for Text Classification (TextCNN)
Web servers
deep learning
Semantics
Uniform resource locators
Predictive Metrics
web security
deep learning models
convolutional neural network for text classification
file servers
HTTP Dataset CSIC 2010
malicious Web request detection
Malicious Web requests detection
support vector machine (SVM)
TextCNN
Transferable statistical features
Web attack detection
composability
Data models
Support vector machines
support vector machine
feature extraction
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
security of data
pattern classification
internet
text analysis
convolutional neural nets
convolutional neural networks
text classification
statistical analysis
biblio
Machine-Learning Based DDOS Attack Classifier in Software Defined Network
Submitted by aekwall on Mon, 12/14/2020 - 12:31pm
linear SVM
Switches
Software Defined Network
Predictive Metrics
SDN architecture
service attacks
DDoS Attacks
centralized control
centralized controller
DDoS
SDN
machine-learning based DDOS attack classifier
network administrators
normal attack traffic
polynomial SVM
programmable capability
RYU
RYU SDN controller
scapy
software defined networking
Computer crime
computer network security
IP networks
telecommunication traffic
telecommunication security
computer network management
machine learning algorithms
SDN network
security of data
Support vector machines
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
composability
pattern classification
SVM
biblio
Sparse Support Vector Machine for Network Behavior Anomaly Detection
Submitted by aekwall on Mon, 12/14/2020 - 12:30pm
Training
support vector machine approach
sparse SVM
sparse support vector machine
related weights matching
network behavior anomaly detection
NBAD features
general machine learning approach
adopted training weights
Training data
Predictive Metrics
Anomaly Detection
computer network security
SVM
pattern classification
optimization
composability
pubcrawl
Resiliency
learning (artificial intelligence)
Feature Selection
feature extraction
Support vector machines
Data models
biblio
Identification of Computer Displays Through Their Electromagnetic Emissions Using Support Vector Machines
Submitted by aekwall on Mon, 12/14/2020 - 12:28pm
information security
Training
TEMPEST information security problem
tempest
Support vector machines
signal processing
security of data
Resiliency
pubcrawl
Predictive Metrics
pattern classification
Monitoring
matrix algebra
Kernel
computer displays
Image reconstruction
image classification
F1-score
Electromagnetics
electromagnetic emissions
display image capture
confusion matrix
Computer graphics
Antenna measurements
Artificial Intelligence
classification
composability
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »