Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hidden Markov models
biblio
Markov Encrypted Data Prefetching Model Based On Attribute Classification
Submitted by grigby1 on Wed, 05/26/2021 - 10:37am
Hidden Markov models
Scalability
pubcrawl
Prefetching
Policy Based Governance
Partitioning algorithms
Modularity
Markov processes
Markov
attribute
encrypted
data prefetch
Data models
Cryptography
CP-ABE
collaboration
Classification algorithms
biblio
Real-Time Encrypted Traffic Classification via Lightweight Neural Networks
Submitted by aekwall on Thu, 04/08/2021 - 3:36pm
Task Analysis
real-time systems
feature extraction
Resiliency
pubcrawl
Cryptography
Training
deep learning
Compositionality
Hidden Markov models
Information Reuse and Security
1D Convolutional Network
Encrypted traffic classification
Multi-head Attention Mechanism
biblio
RNN-VED for Reducing False Positive Alerts in Host-based Anomaly Detection Systems
Submitted by aekwall on Thu, 04/08/2021 - 3:35pm
natural language processing
variational encoder-decoder architecture
sequence to sequence
RNN-VED
normal behavior learning
model input-data representation
host-based anomaly detection systems
false positive alerts
ADFALD.
ADFA-LD dataset
Information Reuse and Security
system-call traces
HIDS
anomaly prediction
one-class classification
security of data
host-based intrusion detection systems
Hidden Markov models
Compositionality
Semantics
Recurrent neural networks
recurrent neural nets
Anomaly Detection
data structures
Decoding
pubcrawl
Resiliency
learning (artificial intelligence)
Classification algorithms
biblio
Industrial Control System Intrusion Detection Model based on LSTM Attack Tree
Submitted by aekwall on Thu, 04/08/2021 - 3:35pm
internet
trees (mathematics)
traditional network security
traditional intrusion detection systems
Resiliency
pubcrawl
Predictive models
LSTM & attack tree
LSTM
Logic gates
Intrusion Detection
attack tree
Information Reuse and Security
Industrial control system intrusion detection model
industrial control
IDS
ICs
Hidden Markov models
constructed attack tree model
computer network security
Computer hacking
Compositionality
biblio
Network Parameter Analysis; ad hoc WSN for Security Protocol with Fuzzy Logic
Submitted by grigby1 on Mon, 03/29/2021 - 1:02pm
pubcrawl
wireless sensor networks
Wireless communication
unsecured network
telecommunication security
soft computing prediction tool
security protocol
security
Rogue Access Point detection
Rogue Access Point (RAP)
Resiliency
resilience
real-time systems
RAP detection
Ad hoc networks
Protocols
network parameter analysis
Monitoring
mobile devices
Metrics
Hidden Markov models
Fuzzy logic
fuzzy controller
Cyber Physical System
Conferences
Communication system security
ad hoc WSN
biblio
ZeroWall: Detecting Zero-Day Web Attacks through Encoder-Decoder Recurrent Neural Networks
Submitted by grigby1 on Thu, 03/04/2021 - 1:55pm
real-time detection
ZeroWall
zero-day Web attacks
Zero-day attacks
zero-day attack request
Zero day attacks
widely-deployed signature-based Web Application Firewalls
web security
Syntactics
Semantics
security of data
Resiliency
resilience
Recurrent neural networks
Anomaly Detection
pubcrawl
Metrics
internet
historical Web requests
Hidden Markov models
Firewalls (computing)
existing WAF
existing signature-based WAF
encoder-decoder recurrent neural network
digital signatures
defense
computer network security
composability
biblio
Towards implementing fast and scalable Network Intrusion Detection System using Entropy based Discretization Technique
Submitted by grigby1 on Tue, 02/23/2021 - 1:57pm
network intrusion detection system
Training data
Training
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
principal component analysis
networking technologies
Network reconnaissance
network packets
anomaly based IDS
network attack
machine learning
intrusion detection system
Intrusion Detection
IDS systems
Hidden Markov models
feature extraction
entropy based discretization technique
Entropy
discretization
computer network security
biblio
Would you Take Advice from a Robot? Developing a Framework for Inferring Human-Robot Trust in Time-Sensitive Scenarios
Submitted by grigby1 on Wed, 02/03/2021 - 12:43pm
interactive scenarios
trust states
time-sensitive scenarios
successful human-robot interaction
Robot Trust
Resiliency
resilience
regression analysis
pubcrawl
model trust
Decision Making
human-robot trust
human-robot interaction
human subject studies
Human Factors
human decision-making process
Human behavior
Hidden Markov models
generalized model
experimental scenarios
biblio
Anomaly Detection Models for Smart Home Security
Submitted by aekwall on Mon, 11/23/2020 - 10:28am
HMM model
smart home environment
Compositionality
privacy violations
Hidden Markov models
hidden Markov model
anomalous activities
anomaly detection models
cyber threat surface
fire accidents
Smart Home
multiple sensors
network level sensor data
smart home security
smart homes devices
smart security cameras
smoke sensors
unauthorized movements
Intelligent Data Security
Intelligent Data and Security
Resiliency
Monitoring
Scalability
Big Data
data privacy
security
smart devices
DDoS Attacks
learning (artificial intelligence)
machine learning
computer network security
pubcrawl
Anomaly Detection
Energy Efficiency
Data collection
sensor fusion
Intelligent sensors
Smart homes
home automation
biblio
Variational Encoder-Decoder Recurrent Neural Network (VED-RNN) for Anomaly Prediction in a Host Environment
Submitted by aekwall on Mon, 11/09/2020 - 12:20pm
Hidden Markov models
Information Reuse and Security
VED-RNN
variational encoder-decoder recurrent neural network
System-calls
system-call traces
sequence to sequence model
sequence to sequence
security tools
prediction model input data representation
HIDS
anomaly prediction
one-class classification
NIDS
security of data
Compositionality
Intrusion Detection Systems
Recurrent neural networks
recurrent neural nets
Predictive models
Anomaly Detection
Prediction algorithms
pattern classification
Decoding
pubcrawl
Resiliency
Classification algorithms
« first
‹ previous
1
2
3
4
5
6
next ›
last »