Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
random forests
biblio
Cache side-channel attacks detection based on machine learning
Submitted by grigby1 on Thu, 05/13/2021 - 11:23am
Scalability
Cache side-channel attack
random forests
Attack vectors
detection
Probes
side-channel attacks
Hardware performance counters
privacy
computer architecture
Resiliency
resilience
Human behavior
pubcrawl
Support vector machines
machine learning
Cloud Computing
biblio
Machine Learning Methods for Anomaly Detection in Industrial Control Systems
Submitted by grigby1 on Tue, 03/30/2021 - 10:53am
industrial control system security
testing
Scalability
Resiliency
resilience
random forests
pubcrawl
Neural networks
machine learning
Integrated circuit modeling
Anomaly Detection
industrial control
ICS Anomaly Detection
ICs
deep learning
cyber-physical system security
CPS
boosting
Artificial Neural Networks
biblio
Anomaly Detection with Autoencoder and Random Forest
Submitted by grigby1 on Tue, 03/30/2021 - 10:51am
Anomaly Detection
autoencoder
Computational modeling
Credit cards
deep learning
feature extraction
ICS Anomaly Detection
pubcrawl
Radio frequency
Random Forest
random forests
resilience
Resiliency
Scalability
tuning
biblio
Practical and White-Box Anomaly Detection through Unsupervised and Active Learning
Submitted by grigby1 on Thu, 03/04/2021 - 1:35pm
pubcrawl
white-box anomaly detection
user experience
Unsupervised Learning
Unsupervised Anomaly Detection
Time series analysis
time series
supervised learning
security of data
RRCF algorithm
RRCF
robust random cut forest
Resiliency
resilience
random forests
White Box Security
Neural networks
Monitoring
Metrics
Labeling
KPI anomaly detection framework
key performance indicators
iRRCF
Forestry
composability
Anomaly Detection
active learning
security
white box
biblio
Safety and Damage Assessment Method of Transmission Line Tower in Goaf Based on Artificial Intelligence
Submitted by grigby1 on Tue, 02/16/2021 - 12:41pm
structural engineering computing
damage identification
finite element simulation model
foundations
geometric model
Goaf
mining industry
operation safety
random forest algorithm
damage assessment method
structural reliability model
surface subsidence
tower collapse
tower foundation interaction
transmission line tower
transmission line tower safety
Damage Assessment
Forestry
coal seam
coal mine goaf
coal
Transmission line measurements
mining
Poles and towers
power transmission lines
finite element analysis
Reliability
random forests
Safety
Resiliency
resilience
pubcrawl
Artificial Intelligence
biblio
DDoS Attacks Detection by Using Machine Learning Methods on Online Systems
Submitted by grigby1 on Tue, 02/16/2021 - 11:59am
DDOS attacks detection
Handheld computers
denial-of-service attack
distributed denial of service attacks
multilayer perceptrons
Cyber Attacks
hypermedia
DDoS attack detection
C-support vector machine
Global Positioning System
detection accuracy rates
Hafnium compounds
HTTP flood
hypertext transfer protocol
k-nearest neighbor
multi layer perceptron
online systems
TCP SYN flood
computer network security
machine learning
cyber security
Intrusion Detection
pubcrawl
Human behavior
Metrics
resilience
Resiliency
learning (artificial intelligence)
Topology
random forests
Support vector machines
Computer crime
composability
nearest neighbour methods
DDoS
Random Forest
biblio
Detection of DDoS Attack and Classification Using a Hybrid Approach
Submitted by grigby1 on Tue, 02/16/2021 - 11:58am
hybrid feature selection method
Classifiers.
cross-validation
DDoS category
DDoS detection
DDoS detection rate
decision table
discretize dataset
Feature Selection
Bayes Net classifiers
J48 classifier
KDD DDoS dataset
Naive Bayes Classifiers
naive Bayes methods
NSL DDoS dataset
NSL KDD dataset
selected DDoS packets
weka tool
computer network security
security of data
Cloud Computing
machine learning
pubcrawl
Human behavior
Metrics
resilience
Resiliency
learning (artificial intelligence)
random forests
composability
pattern classification
Random Forest
Cloud Security
machine learning classifiers
DDoS Attack
DDoS attack detection
biblio
Detection of XSS in web applications using Machine Learning Classifiers
Submitted by grigby1 on Wed, 02/10/2021 - 12:21pm
Web pages
Cross Site Scripting
random forests
cross-site scripting attack
classifiers
Classified Algorithms
cross-site scripting
Vegetation
Uniform resource locators
feature extraction
JavaScript
malware
Scalability
Resiliency
resilience
Human behavior
pubcrawl
machine learning
biblio
DeCrypto Pro: Deep Learning Based Cryptomining Malware Detection Using Performance Counters
Submitted by grigby1 on Fri, 01/22/2021 - 1:38pm
DeCrypto Pro
LSTM
defense mechanisms
advanced persistent threats
antivirus applications
APTs
behavior profiling
benign compression
classification model
collaborative attacks
computational resources
cryptographic operations
cryptojacking
cryptomining
Long short-term memory
DeCrypto Profiler framework
deep cryptomining profiler
mission-critical cybersystems
model selection
operating context profiling system
performance counters
Ransomware
system features
system functionalities
Trojan Laziok
utility function
Windows performance counters
cyberattacks
Predictive models
machine learning
Data mining
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Data models
Computational modeling
random forests
recurrent neural nets
Cryptography
deep learning
pattern classification
malware
invasive software
malware detection
nearest neighbour methods
k-nearest neighbors
Random Forest
advanced persistent threat
APT
deep neural networks
encoding
biblio
A Novel Jamming Attacks Detection Approach Based on Machine Learning for Wireless Communication
Submitted by aekwall on Mon, 12/14/2020 - 11:32am
channel surfing
5G
time series
Transmitters
Wireless communication
random forests
Jamming
wireless network
Forestry
random forest algorithm
wireless channels
detection probability
false alarm probability
jamming attacks
jamming attacks detection
jamming signal detection
millimeter wave bands
Random Fores
smart jammers
pubcrawl
telecommunication security
game theory
machine learning algorithms
Support vector machines
support vector machine
learning (artificial intelligence)
machine learning
Resiliency
Receivers
composability
Vegetation
neural network
Fuzzy logic
probability
telecommunication computing
signal detection
Predictive Metrics
« first
‹ previous
1
2
3
4
next ›
last »