Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
fraud
biblio
The Value of Collaboration in Convex Machine Learning with Differential Privacy
Submitted by aekwall on Mon, 01/11/2021 - 12:41pm
financial datasets
financial data processing
privacy budget
multiple data owners
convex machine learning
credit card fraud detection
differentially-private gradient queries
differentially-private gradients
distributed datasets
distributed private data
fraud
fitness cost
loan interest rates
nonoverlapping training datasets
privacy-aware data owners
privacy-aware learning algorithms
Regression
Stochastic gradient algorithm.
stochastic gradient descent
privacy
data privacy
Data models
Support vector machines
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
composability
Scalability
Computational modeling
Prediction algorithms
Training
machine learning
regression analysis
collaboration
differential privacy
gradient methods
biblio
Identity theft on e-government/e-governance digital forensics
Submitted by grigby1 on Fri, 10/16/2020 - 10:22am
Neural networks
fraudulent transactions
genetic algorithms
Government
government data processing
governments
identity theft
internet
Law
malicious online activity
fraud
policy-based governance
product reviews
pubcrawl
resilience
Resiliency
system intrusions
time 13.0 month
user anonymity
Cybercrime
collaboration
Computer crime
corporate users
credit card fraud
credit card transactions
Credit cards
credit transactions
cyber-threats
blockchain technology
Cybersecurity
cyberspace-low entry barriers
Digital Forensics
E-Governance
E-Government
electronic commerce
Electronic government
financial fraud
biblio
FraudFind: Financial fraud detection by analyzing human behavior
Submitted by aekwall on Mon, 10/12/2020 - 10:43am
auditing
Human Behavior and Cybersecurity
triangle of fraud
senior managers
semantic techniques
payroll employees
FraudFind
fraud triangle theory
financial fraud detection
financial audit model
Continuous Audit
bank fraud
Human Factors
human factor
security of data
Banking
financial data processing
behavioural sciences computing
fraud
Personnel
Data mining
Cybersecurity
tools
pubcrawl
Human behavior
Electronic mail
real-time systems
Organizations
biblio
Automated Repair of Cross-Site Scripting Vulnerabilities through Unit Testing
Submitted by aekwall on Mon, 09/28/2020 - 11:33am
software debugging
commit frauds
common programming error
Cross Site Scripting attacks
cross site scripting(XSS)
cross-site scripting vulnerabilities
detecting vulnerable web pages
dynamic program analysis
injection attacks
open source medical record application
application vulnerable
suggested encoder
Unit testing
untrusted data
untrusted dynamic content
vulnerability repair
vulnerable codes
XSS vulnerability
Cross Site Scripting
program analysis
Scalability
Resiliency
Human behavior
pubcrawl
internet
web applications
Web sites
program testing
security of data
software maintenance
program diagnostics
software reliability
online front-ends
Web pages
sensitive information
fraud
static program analysis
biblio
Fraud Detection using Machine Learning and Deep Learning
Submitted by aekwall on Mon, 08/24/2020 - 12:37pm
credit card
Europe
Forestry
Credit cards
area under the ROC curve
Australian dataset
autoencoder
benchmark multiple machine learning methods
Boltzmann machines
cost of failure
financial data processing
data mining techniques
Deep belief networks
EU
European dataset
German dataset
k nearest neighbor
Matthews correlation coefficient
restricted boltzmann machine
security checks
pattern classification
Support vector machines
support vector machine
learning (artificial intelligence)
machine learning
Random Forest
Resiliency
pubcrawl
composability
deep learning
Data models
convolutional neural nets
deep learning methods
Data mining
convolutional neural networks
Artificial Neural Networks
belief networks
fraud
fraud detection
biblio
Privacy-Preserving Deep Learning via Additively Homomorphic Encryption
Submitted by grigby1 on Fri, 08/07/2020 - 2:47pm
resilience
neural nets
privacy
privacy issues
privacy-preserving deep learning
privacy-preserving financial data analytics systems
privacy-preserving logistic regression
pubcrawl
regression analysis
JST CREST AI
Resiliency
Scalability
social challenges
social life
social sciences computing
Society 5.0
super-smart society
additively homomorphic encryption
IoT
information and communication technology
Human Factors
Human behavior
fraud
fourth industrial revolution
financial institutions
financial data processing
encryption
digital arithmetic
deep learning
data privacy
data analysis
Big Data
AI
biblio
Highly Available, Self-Defending, and Malicious Fault-Tolerant Systems for Automotive Cybersecurity
Submitted by aekwall on Mon, 07/27/2020 - 11:13am
malicious fault-tolerant systems
intrusion tolerance
automotive cybersecurity
brand degradation
cars
electronic features
highly available systems
integrity verification
malicious fault-tolerance
fraud
road-side equipment
self-defending techniques
self-defending technologies
self-healing systems
self-repair
single protection technique
system-level integrity
warranty fraud
composability
road safety
Safety
security of data
traffic engineering computing
Monitoring
Cloud Computing
Resiliency
pubcrawl
Automotive engineering
smart phones
computer security
fault tolerance
Smartphones
Fault tolerant systems
software fault tolerance
malicious attacks
automobiles
biblio
BlackWidow: Monitoring the Dark Web for Cyber Security Information
Submitted by grigby1 on Fri, 07/10/2020 - 10:54am
illegal services
web services
security analyst users
search engines
pubcrawl
open source intelligence
multiple dark Web
login information
learning (artificial intelligence)
knowledge graph
invasive software
interactive visual exploration
information gathering
information collection
BlackWidow
Human Factors
Human behavior
fraud
Docker-based microservice architecture
Dark Web services
Dark Web analysis
dark web
cybersecurity-related topics
cyber security intelligence purposes
cyber security information
cyber security domain
cyber intelligence
cyber criminals
biblio
Anomaly Detection with Graph Convolutional Networks for Insider Threat and Fraud Detection
Submitted by grigby1 on Fri, 06/26/2020 - 12:04pm
graph theory
security of data
security
Scalability
Resiliency
real-world insider threat data
pubcrawl
Organizations
Metrics
malicious threat groups
machine learning
learning (artificial intelligence)
Insider Threat Detection
Image edge detection
Anomaly Detection
graph convolutional networks
GCN
fraud detection
fraud
feature extraction
edge detection
Data models
convolutional neural nets
composability
associated threat groups
anomaly detection model
anomaly detection applications
biblio
Multifactor Authentication on Mobile Secure Attendance System
Submitted by aekwall on Mon, 06/01/2020 - 10:02am
mobile
smartphone
smart phones
security of data
Secure Attendance
secure android ID
Resiliency
resilience
pubcrawl
Personnel
performance evaluation
multifactor authentication
Monitoring
mobile secure attendance system
Mobile handsets
mobile computing
android
Metrics
Human Factors
Human behavior
GPS
Global Positioning System
fraud
Fingerprint recognition
fingerprint
employee attendance system
employee activities
BYOD
bring your own device
authentication
attendance recording
attendance device
« first
‹ previous
1
2
3
4
next ›
last »