Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pattern classification
biblio
Research on Intrusion Detection Based on Improved DBN-ELM
Submitted by aekwall on Mon, 08/24/2020 - 1:37pm
pattern classification
majority voting
Deep confidence network
DBN-ELM
classifier
Deep Belief Network
extreme learning machine
NSL-KDD dataset
belief networks
feedforward neural nets
Training
Intrusion Detection
Neurons
classification
composability
pubcrawl
Resiliency
feature extraction
machine learning algorithms
Classification algorithms
security of data
biblio
Fraud Detection using Machine Learning and Deep Learning
Submitted by aekwall on Mon, 08/24/2020 - 1:37pm
credit card
Europe
Forestry
Credit cards
area under the ROC curve
Australian dataset
autoencoder
benchmark multiple machine learning methods
Boltzmann machines
cost of failure
financial data processing
data mining techniques
Deep belief networks
EU
European dataset
German dataset
k nearest neighbor
Matthews correlation coefficient
restricted boltzmann machine
security checks
pattern classification
Support vector machines
support vector machine
learning (artificial intelligence)
machine learning
Random Forest
Resiliency
pubcrawl
composability
deep learning
Data models
convolutional neural nets
deep learning methods
Data mining
convolutional neural networks
Artificial Neural Networks
belief networks
fraud
fraud detection
biblio
Optimized Activation Function on Deep Belief Network for Attack Detection in IoT
Submitted by aekwall on Mon, 08/24/2020 - 1:37pm
optimisation
Proposed Feature Extraction
operational security
Lion Algorithm
higher-order statistical features
feature extraction process
feature classification process
DP management
attack detection system
activation function optimization
Deep Belief Network
belief networks
Attack detection
classification
statistical analysis
IoT
Training
pattern classification
Neurons
optimization
composability
pubcrawl
Resiliency
feature extraction
Classification algorithms
security
Internet of Things
Conferences
security of data
biblio
Exploring features of HTTP responses for the classification of devices on the Internet
Submitted by aekwall on Mon, 08/24/2020 - 12:41pm
security researchers
web interfaces
static rules
manually labelling training sets
HTTP responses
HTTP response features
HTTP
future classification
devices on the Internet
automated classification
computer network security
Automated Response Actions
neural network
internet
pattern classification
neural nets
composability
pubcrawl
Resiliency
learning (artificial intelligence)
biblio
Automated Event Prioritization for Security Operation Center using Deep Learning
Submitted by aekwall on Mon, 08/24/2020 - 12:40pm
automation
SOC workflow
SOC event classification
Security Operation Center
graphical analysis
event classification
deep neural network model
cybersecurity clearinghouse
critical security events
automated event prioritization
SIEM
Incident Response
security data
encoding
security event
Automated Response Actions
security of data
internet
pattern classification
neural nets
graph theory
deep learning
composability
pubcrawl
Resiliency
learning (artificial intelligence)
feature extraction
Data models
Task Analysis
security
IP networks
IDS
biblio
STDeepGraph: Spatial-Temporal Deep Learning on Communication Graphs for Long-Term Network Attack Detection
Submitted by aekwall on Mon, 08/17/2020 - 11:18am
hybrid deep neural network design
graph Laplacian matrix
attack graphs
dimensionality reduction
graph characterization vectors
graph kernel matrices
graph signal processing
graph similarity measures
graph structures
high-dimensional intrinsic representation
high-dimensional representations
hybrid deep learning models
Matrix converters
kernel-based similarity embedding vector
long-term information learning
long-term network attack detection
network communication data
real-world network attack datasets
spatial-temporal deep learning
spatiotemporal deep learning
structural similarity information
supervised classification task
temporal communication graph
traffic analysis methods
CNN
IP networks
telecommunication traffic
Kernel
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
composability
graph theory
matrix algebra
pattern classification
computer network security
convolutional neural nets
convolutional neural network
network traffic
deep learning
signal processing
LSTM
Predictive Metrics
Laplace equations
Long short-term memory
Graph Kernel
network flows
biblio
Cascading Machine Learning to Attack Bitcoin Anonymity
Submitted by grigby1 on Thu, 08/13/2020 - 5:35pm
decentralized cryptocurrency
Resiliency
resilience
pubcrawl
pattern classification
multiclass classification performance
Metrics
learning (artificial intelligence)
Human behavior
graph model
entities classification
electronic money
digital assets
anonymity
data privacy
Cryptography
composability
cascading machine
cascading classifiers
blockchain
Bitcoin network
bitcoin entity characterization
bitcoin blockchain data
bitcoin anonymity
Bitcoin analysis
biblio
One-Class Classification with Deep Autoencoder Neural Networks for Author Verification in Internet Relay Chat
Submitted by grigby1 on Thu, 08/13/2020 - 5:22pm
pubcrawl
Internet Relay Chat (IRC)
IRC messages
IRC users
learning (artificial intelligence)
Monitoring
neural nets
one-class classification
pattern classification
internet relay chat
real-time systems
recursive deep learning
resilience
Resiliency
Scalability
social networking (online)
social networks
anonymous messaging
internet
electronic messaging
effective author verification
deep learning
deep autoencoder neural networks
Cybersecurity
cyber-crime
Computer hacking
Computer crime
autonomic IRC monitoring system
autoencoder
author verification approach
Author verification
arbitrary topics
anonymous users
biblio
Test-Driven Anonymization for Artificial Intelligence
Submitted by grigby1 on Thu, 08/13/2020 - 5:07pm
anonymization efforts
artificial intelligence security
test-driven anonymization approach
Software Testing
regulatory requirements
Privacy Protections
nonfunctional quality
k-anonymity
internal requirements
Insurance
functional suitability
functional quality
classification AIs
artificial intelligence tools
anonymized data
anonymization techniques
tools
anonymization
AI context
artificial intelligence technique
testing
Data protection
pattern classification
Production
health care
data privacy
Data models
pubcrawl
Artificial Intelligence
Predictive models
security of data
biblio
Intrusion Detection Using Deep Learning and Statistical Data Analysis
Submitted by aekwall on Mon, 08/10/2020 - 10:37am
Mathematical model
statistical data analysis
KDD cup 99 datasets
binary classification model
deep learning algorithm
artificial neural network
deep learning
data classification
cyber physical systems
Artificial Neural Networks
computer networks
statistical analysis
Data mining
data analysis
Intrusion Detection
pattern classification
neural nets
machine learning
policy-based governance
pubcrawl
Resiliency
learning (artificial intelligence)
feature extraction
network security
Data models
Classification algorithms
computer network security
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »