Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hidden Markov models
biblio
A Novel and Secure Framework to Detect Unauthorized Access to an Optical Fog-Cloud Computing Network
Submitted by grigby1 on Fri, 07/21/2023 - 1:49pm
Fog computing
sustainable virtualization
Optical computing
and adaptable Honeypot
Resiliency
Passive Optical Network
Hidden Markov models
Markov model
Markov processes
Adaptation models
Image edge detection
intrusion detection system
Computational modeling
Scalability
resilience
pubcrawl
security
Cloud Computing
biblio
An Active Learning Approach to Dynamic Alert Prioritization for Real-time Situational Awareness
Submitted by aekwall on Fri, 01/20/2023 - 4:11pm
active learning
composability
Computational modeling
hidden Markov model
Hidden Markov models
Intrusion Detection
Manuals
Markov processes
network security
Predictive Metrics
pubcrawl
real-time systems
Resiliency
security situational awareness
situational awareness
uncertainty
biblio
Speech Emotion Recognition Using Bagged Support Vector Machines
Submitted by grigby1 on Thu, 01/05/2023 - 2:21pm
Support vector machines
pubcrawl
Metrics
resilience
Resiliency
Databases
composability
Speech recognition
Human-computer interaction
human computer interaction
emotion recognition
Linguistics
Hidden Markov models
computational para linguistics
supply vector machines
biblio
Analyzing Cryptographic API Usages for Android Applications Using HMM and N-Gram
Submitted by aekwall on Mon, 11/29/2021 - 2:27pm
Cryptography
Markov processes
Libraries
tools
Analytical models
pubcrawl
composability
Probabilistic logic
Compositionality
Hidden Markov models
android
API analysis
cryptographic API
hidden Markov model
N-gram
theoretical cryptography
biblio
Spectrum Occupancy Prediction Exploiting Time and Frequency Correlations Through 2D-LSTM
Submitted by aekwall on Mon, 11/08/2021 - 3:29pm
Logic gates
deep learning
Predictive models
Training
pubcrawl
Scalability
Resiliency
Hidden Markov models
Predictive Metrics
Time-frequency Analysis
Correlation
frequency correlation
real-world spectrum measurement
spectrum occupancy prediction
Time Frequency Analysis and Security
biblio
Malware Classification Framework Using Convolutional Neural Network
Submitted by grigby1 on Tue, 09/21/2021 - 3:56pm
Biological neural networks
convolutional neural network
Data models
deep learning
dense neural network
feature extraction
Hidden Markov models
Human behavior
malware
malware classication
Metrics
Neural networks
privacy
pubcrawl
resilience
Resiliency
biblio
Long Short-Term Memory-Based Intrusion Detection System for In-Vehicle Controller Area Network Bus
Submitted by aekwall on Tue, 09/07/2021 - 11:13am
deep learning
Intrusion Detection
Protocols
automobiles
pubcrawl
Resiliency
machine learning
Internet of Things
Hidden Markov models
intrusion detection system
CAN
connected car security
fuzzing
LSTM
controller area network security
cyber-physical systems
biblio
An Anomaly Detection System for the Protection of Relational Database Systems against Data Leakage by Application Programs
Submitted by grigby1 on Tue, 08/31/2021 - 11:04am
insider attacks
static analysis
Resiliency
resilience
relational database security
pubcrawl
Performance analysis
Monitoring
Metrics
Anomaly Detection
Human behavior
Hidden Markov models
Databases
database
data leakage
composability
application profile
biblio
A Modern Implementation of System Call Sequence Based Host-based Intrusion Detection Systems
Submitted by grigby1 on Tue, 08/17/2021 - 3:57pm
Kernel
system calls
standards
Resiliency
resilience
pubcrawl
Metrics
Linux Operating System Security
Linux operating system
Anomaly Detection
Intrusion Detection
host-based intrusion detection
Hidden Markov models
hidden Markov model
Computational modeling
composability
Band-pass filters
biblio
A Hypergame‐Based Defense Strategy Toward Cyber Deception in Internet of Battlefield Things (IoBT)
Submitted by aekwall on Wed, 08/11/2021 - 2:53pm
Human Factors
Internet of Things
Computer crime
Games
pubcrawl
Scalability
Resiliency
Hidden Markov models
IEEE Sections
IoBT Security
1
2
3
4
5
6
next ›
last »