Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pattern classification
biblio
Classification of XSS Attacks by Machine Learning with Frequency of Appearance and Co-occurrence
Submitted by aekwall on Mon, 09/28/2020 - 12:35pm
pattern classification
XSS attack scripts
Word2Vec
vectorization
Uniform resource locators
Training
SVM
Support vector machines
SCW
Scalability
Resiliency
Random Forest
Radio frequency
pubcrawl
preprocessing method
Phishing
attack detection filter
machine learning algorithms
machine learning
learning (artificial intelligence)
Kernel
internet
information collection
hypermedia markup languages
Human behavior
HTTP cookies
fake HTML input form
dummy sites
Cross Site Scripting
cross site
Computer crime
biblio
A radio-fingerprinting-based vehicle classification system for intelligent traffic control in smart cities
Submitted by aekwall on Mon, 09/28/2020 - 12:10pm
precise vehicle classification
comprehensive measurements
cost-efficiency
dynamic control methods
dynamic type-specific lane assignments
global system parameters
highly sophisticated traffic control methods
highly-dynamic Cyber Physical System
individual vehicles
intelligent traffic control systems
key element
machine learning based approach
key performance indicators
radio-fingerprint
radio-fingerprinting
real-time
road traffic control
specific data
street network
Traffic flow
up-to-date traffic
vehicle classification system
vehicle type information
CPS Privacy
vehicular ad hoc networks
traffic engineering computing
data privacy
Receivers
Measurement
Support vector machines
feature extraction
learning (artificial intelligence)
Human behavior
pubcrawl
privacy preservation
Roads
road vehicles
pattern classification
machine learning
privacy
cyber physical systems
Human Factors
smart cities
system state
CPS
System performance
radio transmitters
biblio
SWAN\_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods
Submitted by aekwall on Mon, 09/28/2020 - 11:33am
novel automated machine-learning approach SWAN
software metrics
graphical user interfaces
machine-learning
active machine learning
authentication methods
bug detection
code-specific methods
IntelliJ plugin
program debugging
program analysis
security-relevant methods
semiautomated detection
SRM
static analysis tools
SWAN\_ASSIST aids developers
SWAN\_ASSIST tool
time exactly those methods whose classification best impact
machine learning
learning (artificial intelligence)
Resiliency
pubcrawl
composability
pattern classification
vulnerability detection
Training
Libraries
security
authentication
public domain software
software maintenance
Automated Secure Software Engineering
Java
program diagnostics
software quality
biblio
Synonym-based Attack to Confuse Machine Learning Classifiers Using Black-box Setting
Submitted by grigby1 on Fri, 09/04/2020 - 4:11pm
machine learning algorithms
ML models
black-box setting
black-box attack
Blogs
bot tweets
bots
convolutional neural network
deep learning classifiers
testing
machine learning classifiers
ML-based bot detection algorithms
ML-based models
popular content sharing platform
supervised learning
synonym-based attack
vulnerability constraints
Black Box Security
Resiliency
computer network security
invasive software
feature extraction
social networking (online)
Artificial Intelligence
pubcrawl
composability
Metrics
Cryptography
resilience
pattern classification
Training
learning (artificial intelligence)
machine learning
deep learning
Predictive models
biblio
AutoAttacker: A reinforcement learning approach for black-box adversarial attacks
Submitted by grigby1 on Fri, 09/04/2020 - 4:10pm
adversarial-machine-learning
Black Box Security
white-box access
reinforcement-learning
Reinforcement learning
perturbed inputs
classifier attack
black-box-attack
black-box model
black-box adversarial attacks
AutoAttacker
Cryptography
adversarial example discovery
machine learning model
learning (artificial intelligence)
Data mining
pattern classification
resilience
Resiliency
Metrics
composability
pubcrawl
biblio
Black-box Adversarial Machine Learning Attack on Network Traffic Classification
Submitted by grigby1 on Fri, 09/04/2020 - 4:10pm
machine learning
Training
telecommunication traffic
telecommunication computing
Support vector machines
security threat
security
Resiliency
resilience
pubcrawl
Perturbation methods
pattern classification
Neural networks
Network traffic classification
Metrics
Adversarial Machine Learning
learning (artificial intelligence)
deep machine learning-based classifiers
deep machine learning techniques
deep machine learning models
Data models
computer network security
composability
black-box adversarial machine
black-box adversarial attack
Black Box Security
autonomous networks
adversarial threats
adversarial perturbations
biblio
Targeted Addresses Identification for Bitcoin with Network Representation Learning
Submitted by grigby1 on Fri, 09/04/2020 - 3:58pm
Human behavior
transaction addresses
transaction address
security risk
security of data
Scalability
pubcrawl
pattern classification
network representation learning
learning (artificial intelligence)
imbalanced multi-classification
illegal transactions
addresses identification algorithms
feature extraction
fault tolerance
drugs
Decision trees
de-anonymity approach
Data mining
cryptocurrencies
bitcoin security
bitcoin
annotated data
biblio
A Comparison of Performance Metrics with Severely Imbalanced Network Security Big Data
Submitted by grigby1 on Fri, 08/28/2020 - 3:53pm
sampling
pattern classification
Performance Metrics
Precision-Recall Curve
Predictive models
pubcrawl
Radio frequency
resilience
Resiliency
minority classes
sampling distribution ratio
sampling methods
Scalability
severe class imbalance
severely imbalanced network security big data
Sparks
testing dataset roles
Training
Data mining
Apache Spark framework
area under the receiver operating characteristic curve
Big Data
Big Data Analytics
big data security metrics
Cluster Computing
computer network security
data analysis
apache spark
Geometric Mean
imbalanced data
learning (artificial intelligence)
machine learning
majority class
Measurement
metrics testing
Metrics
biblio
Suspicious Network Event Recognition Using Modified Stacking Ensemble Machine Learning
Submitted by grigby1 on Fri, 08/28/2020 - 3:34pm
extremely randomised trees
artificial intelligence-oriented automatic services
big-data analytics
cyber-threats
Data preprocessing
data science
Ensemble Learning
ensemble learning.
exploratory data analysis
AdaBoost
feature creation
modified stacking ensemble machine learning
Network Event Log Analytics
network intrusions
network traffic alerts
suspicious network event recognition dataset
suspicious network events
big data security in the cloud
neural nets
machine learning
data analysis
pubcrawl
Resiliency
Conferences
random forests
Big Data
pattern classification
security of data
Neural networks
Metrics
Random Forest
resilience
Scalability
Feature Selection
2019 IEEE BigData Cup Challenge
biblio
Classifying Fake News Articles Using Natural Language Processing to Identify In-Article Attribution as a Supervised Learning Estimator
Submitted by grigby1 on Fri, 08/28/2020 - 12:23pm
news article
information accuracy
key linguistic characteristics
learning (artificial intelligence)
Linguistics
machine learning
mainstream media platforms
Media
Metrics
natural language processing
Influence Mining
pattern classification
pubcrawl
radio news
resultant process precision
social media conduits
social media platforms
social networking (online)
supervised learning estimator
tools
fake news articles
Attribution Classification
Bayes methods
Bayesian machine learning system
classifier performance
component
composability
deceptive content
Decision Making
fake news
attribution
fake news classifier
fake news detector
fake news identification study
fake news stories
feature extraction
Grammar
Human behavior
in-article attribution
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »