Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hidden Markov models
biblio
Virtual Machine Failure Prediction Method Based on AdaBoost-Hidden Markov Model
Submitted by grigby1 on Mon, 03/09/2020 - 12:25pm
Predictive models
VM security state
VM failure state
Virtual machining
virtual machines
virtual machine security
virtual machine failure prediction method
virtual machine
Upper bound
software fault tolerance
security
pubcrawl
AdaBoost-hidden Markov model
predictive ability
Prediction algorithms
observation state
learning (artificial intelligence)
hidden state
Hidden Markov models
hidden Markov model
Failure Prediction
cloud platform environment
Cloud Computing
biblio
Graph Centrality Based Spam SMS Detection
Submitted by grigby1 on Mon, 02/10/2020 - 10:18am
Measurement
unsolicited e-mail
unlabeled SMS
unclassified SMS
Support vector machines
status updates
spam SMS detection
spam messages
spam detection
social networking (online)
short messages usage
short messages
security of data
Scalability
pubcrawl
Metrics
centrality scores
labeled SMS
Human Factors
Human behavior
Hidden Markov models
graphs centrality metrics
graph theory
graph centrality measures
Graph Centrality
feature extraction
electronic messaging
degree centrality
Data preprocessing
Data mining
classifier
biblio
Network Penetration Identification Method Based on Interactive Behavior Analysis
Submitted by grigby1 on Tue, 01/28/2020 - 1:36pm
penetration attacks
long-term memory shortage
LSTM
malicious attacks
Mathematical model
Metrics
national economy
Network penetration identification method
network penetration recognition technology
ordinary recurrent neural network
penetration attack
Long short-term memory
pubcrawl
recurrent neural nets
recurrent neural network
Recurrent neural networks
Sebek
Sebek technology
short-short time memory network
time series
time series modeling
Hidden Markov models
attack recognition method
attacker information collection
attacker keystroke record
Computer hacking
computer network security
Data models
feature extraction
gradient disappearance problem
gradient explosion
attack identification
honeynet
Human behavior
Human Factors
interaction behavior
interactive behavior analysis
internet
keystroke analysis
keystroke sequences
Logic gates
biblio
Deep Explanation Model for Facial Expression Recognition Through Facial Action Coding Unit
Submitted by aekwall on Mon, 12/30/2019 - 11:11am
emotion classes
facial recognition
nonverbal emotional communication method
machine learning tasks
Justification
Hidden Markov models
Gold
FER tasks
facial muscle movements
facial expression recognition
facial action coding units
facial action coding unit
Facial Action Coding System
face recognition
Explanation Model
emotion recognition
Task Analysis
deep learning models
deep explanation model
CNN model
CK+ Dataset
deep learning
convolutional neural network model
convolutional neural nets
Metrics
Computational modeling
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
feature extraction
biblio
Detection of Hurriedly Created Abnormal Profiles in Recommender Systems
Submitted by grigby1 on Tue, 10/15/2019 - 1:41pm
profile injection attacks
user-item rating matrix
user rating behavior
system ratings
synthetic coordinates
spurious profiles
specific ratings
specific items
security of data
Scalability
Resiliency
resilience
recommender systems
random ratings
Random Forest
pubcrawl
anomalous rating profiles
pattern clustering
Outliers
learning (artificial intelligence)
Labeling
k-means clustering
information filtering
hurriedly created abnormal profiles
Human Factors
Hidden Markov models
gaussian distribution
feature extraction
dimensionality reduction
clustering methods
attackers
biblio
Identifying Malicious Botnet Traffic Using Logistic Regression
Submitted by grigby1 on Fri, 04/05/2019 - 9:24am
regression analysis
Logistics
machine learning
malware
Metrics
network security
network traffic
Payloads
popular network monitoring framework
pubcrawl
logistic regression
resilience
Resiliency
security of data
significant economic harm
social harm
statistical learning method
telecommunication traffic
vulnerable devices
cyber-attacks
botnet
botnet activity
Botnet detection
botnet infestation
botnet malware
botnets
Compositionality
cyber security
aggregate statistics
feature extraction
Hidden Markov models
identifying malicious botnet traffic
internet
intrusion detection system
invasive software
learning (artificial intelligence)
lightweight logistic regression model
biblio
Security Analysis of Key Extraction from Physical Measurements with Multiple Adversaries
Submitted by grigby1 on Mon, 01/21/2019 - 11:38am
radio networks
hidden Markov model
HMM
key extraction security analysis
legitimate wireless devices
multiple adversaries algorithm
OME algorithm
physical measurements
private communication
Heuristic algorithms
secret key extraction scheme
security evaluation metric
SOME algorithm
suboptimal method-with-multiple adversaries
Viterbi algorithm
wireless channels
wiretap channel model
Adversary Models
telecommunication security
pubcrawl
Human behavior
Metrics
Resiliency
Scalability
Hidden Markov models
computational complexity
Wireless communication
security
Communication system security
Entropy
approximate conditional min- entropy
Channel models
computation complexity reduction
dynamic programming
dynamic programming approach
exponential computation complexity
biblio
Spoofing detection via simultaneous verification of audio-visual synchronicity and transcription
Submitted by grigby1 on Mon, 12/10/2018 - 10:37am
multimodal biometrics
visualization
Training
text-dependent spoofing detection
Streaming media
spoofing detection
spoofing attacks
Speech recognition
speaker recognition
security of data
Scalability
Resiliency
resilience
replayed synthesized utterances
pubcrawl
acoustic coupling
liveness detection
Human behavior
Hidden Markov models
feature extraction
data synchronicity
cyber-physical systems
coupled hidden Markov models
bimodal replay attack
audio-visual systems
audio-visual synchronicity
audio-visual speaker recognition
acoustic speaker recognition systems
Acoustic signal processing
biblio
Analyst Intuition Based Hidden Markov Model on High Speed, Temporal Cyber Security Big Data
Submitted by grigby1 on Wed, 11/14/2018 - 12:21pm
Resiliency
HMM state
Human behavior
IP addresses
malware
Multi-layer Perceptron (MLP)
network protocols
Principal Component Analysis (PCA)
probabilistic models
pubcrawl
resilience
High Velocity
Scalability
scoring system
security
security attacks
security of data
statistical data
temporal cyber security big data
time series
unsure attack
Virus
Data mining
attacker
Big Data
Clustering algorithms
computer security
cyber security
cyber security attack
cyber security data
cyber security expert
cyber security log
data analysis
Analyst Intuition
Data models
Expectation Regulated
expert systems
forecasting time series data
fuzzy k mean cluster
Fuzzy k-means (FKM)
fuzzy set theory
hidden Markov model
Hidden Markov Model (HMM)
Hidden Markov models
biblio
Profile hidden Markov model for malware classification \#x2014; usage of system call sequence for malware classification
Submitted by grigby1 on Wed, 06/20/2018 - 11:55am
obfuscation
Trojan horses
tools
system call sequence
system call
Resiliency
resilience
pubcrawl
proteins
protein sequences
profile hidden markov model
privacy
pattern classification
obfuscation technique
bioinformatics
microsoft windows
Metrics
malware technology
malware files
malware classification
malware
invasive software
Human behavior
Hidden Markov models
Grippers
DNA sequences
DNA
biological informatics
« first
‹ previous
1
2
3
4
5
6
next ›
last »