Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Kernel
biblio
Optimal Machine Learning Algorithms for Cyber Threat Detection
Submitted by grigby1 on Mon, 06/10/2019 - 1:56pm
Regression
Logistics
machine learning
machine learning algorithms
minimisation
ML-based analytics
Numerical Clustering
optimal machine learning algorithm
prediction
privacy
pubcrawl
learning (artificial intelligence)
resilience
Resiliency
security
security data
security log analytics
security logs
security machine data
security of data
SoC
Decision trees
Anomaly Detection
automated cyber threat detection
classification
Classification algorithms
Clustering algorithms
composability
cyber security
cyber threat detection model
Data mining
data science
advanced targeted cyber threats
deep learning
Dimensionality
efficient machine
Ensemble Learning
exponential hike
false detection rates
false-positive detections
global Security Operations Center environments
Kernel
biblio
Deep Learning Based Attribute Classification Insider Threat Detection for Data Security
Submitted by aekwall on Wed, 05/08/2019 - 9:49am
long short term memory recurrent neural networks
threat detection recall
security of data
resilience
Recurrent neural networks
recurrent neural nets
pubcrawl
Principal Component Analysis based threat detection methods
principal component analysis
pattern classification
network threat
Metrics
malicious insiders
machine learning
Anomaly Detection
Logic gates
learning (artificial intelligence)
Kernel
insider threat
Human behavior
high detection rate
feature extraction
end-to-end detection framework
deep learning
Data Security
CERT insider threat dataset
attribute classifiers
attribute classification insider threat detection method
biblio
Low-Cost Breaking of a Unique Chinese Language CAPTCHA Using Curriculum Learning and Clustering
Submitted by aekwall on Mon, 04/01/2019 - 10:08am
security
learning (artificial intelligence)
low-cost breaking
machine learning methods
microsoft windows
natural language processing
OCR software
optical character recognition
pattern clustering
potential training methods
pubcrawl
Kernel
Task Analysis
text analysis
text distortion
text-based CAPTCHAs focus
Training
transcription tasks
unique Chinese language CAPTCHA
web services
Web sites
curriculum clustering
CAPTCHA
captchas
Chinese language question-and-answer Website
CNN
composability
convolution
convolutional neural network
convolutional neural networks
correct response
automated access
curriculum learning
feature map
feedforward neural nets
Human behavior
human user
image distortion
inverted character
inverted characters
inverted symbols
biblio
An Improved Spam Detection Method with Weighted Support Vector Machine
Submitted by aekwall on Mon, 02/25/2019 - 11:40am
KFCM
WSVM
weighted SVM
weighted support vector machine
weight variables
Unsolicited electronic mail
Training
SVM
spam filtering
spam detection method
spam detection
Prediction algorithms
KPCM
KFCM algorithm
Scalability
email users
unsolicited e-mail
internet
pattern classification
Metrics
pubcrawl
Human behavior
learning (artificial intelligence)
feature extraction
Support vector machines
machine learning algorithms
Kernel
biblio
MSRR: Measurement Framework For Remote Attestation
Submitted by aekwall on Wed, 02/13/2019 - 11:59am
Measurement
composability
pubcrawl
Human behavior
Resiliency
system monitoring
Software measurement
run-time measurement
remote untrusted host
remote system
remote attestation system
query languages
MSRR robust querying language
security of data
Linux
general-purpose measurement framework
dynamic RA system
dynamic program state
core measurement functionality
application-specific measurement policies
Time measurement
Kernel
Current measurement
Trusted Computing
attestation
Monitoring
biblio
POWERALERT: Integrity Checking Using Power Measurement and a Game-Theoretic Strategy
Submitted by aekwall on Wed, 02/13/2019 - 11:58am
integrity checking program generation
composability
pubcrawl
Human behavior
Resiliency
timing information
Raspberry Pi
POWERALERT
Power measurement
power aware computing
power attestation
network round-trip time
Nash equilibrium strategy
Kernel
attestation
integrity checking
game-theoretic strategy
game theory
Frequency measurement
Current measurement
code segment
checking code
attestation systems
Adaptation models
Protocols
security
data integrity
biblio
H-Securebox: A Hardened Memory Data Protection Framework on ARM Devices
Submitted by grigby1 on Mon, 01/21/2019 - 12:17pm
security
memory data protection strategies
Metrics
microprocessor chips
operating system kernels
privacy
private data
pubcrawl
Resiliency
low power consumption
smart phones
types H-Securebox
Virtual machine monitors
virtual machines
virtualisation
Virtualization
virtualization privacy
ARM hardware virtualization technique
kernel-level memory data
kernel privilege
kernel level attack
Kernel
IoT devices
Internet of Things
hypervisor privilege
Human behavior
Hardware
hardened memory data protection framework
H-Securebox system
embedded systems
data privacy
composability
ARM Hypervisor
biblio
Mathematical Models of Acoustic Wave Scattering by a Finite Flat Impedance Strip Grating
Submitted by grigby1 on Wed, 01/16/2019 - 2:28pm
boundary-value problems
two-dimensional boundary-value problem
Strips
Scattering
narrow impedance strips
mathematical models
integral equations
integral equation
Gratings
finite flat impedance strip grating
explicit asymptotic solution
electromagnetic wave scattering
diffraction gratings
coupled integral equations
pubcrawl
asymptotic solution
acoustic waves
acoustic wave scattering
acoustic wave
acoustic plane wave scattering
Impedance
Kernel
acoustic coupling
Mathematical model
Scalability
Resiliency
Human behavior
biblio
Windows Virtualization Architecture For Cyber Threats Detection
Submitted by aekwall on Wed, 01/16/2019 - 2:08pm
Virtual machine monitors
prediction tool
prediction tools development
pubcrawl
Real-time monitoring
Resiliency
Rootkits
static methods
system monitoring
target Windows machines
virtual machine introspection
Microsoft Windows (operating systems)
virtual machines
virtual memory introspection
Virtualization
VMI
Windows operating system
Windows Operating System Security
Windows OS
Windows threat detection
Windows virtualization architecture
Xen hypervisor
machine learning
composability
cyber breaches
cyber threats detection
Cybersecurity
data structures
hidden security issues
invasive software
Kernel
kernel data structures
learning (artificial intelligence)
alert system administrators
machine learning techniques
malicious process behavior
malware
malware detection
malware threats
memory data structure identification
memory forensic analysis
Metrics
microsoft windows
biblio
Polyharmonic test signals application for identification of nonlinear dynamical systems based on volterra model
Submitted by grigby1 on Fri, 09/28/2018 - 3:18pm
Nonlinear dynamical systems
volterra model
Volterra kernels
Volterra kernel
Volterra equations
Transfer functions
Resiliency
resilience
pubcrawl
polyharmonic test signals application
polyharmonic signals
partial component
Nonlinear system
composability
multidimensional transfer functions
Metrics
Kernel
interpolations
Harmonic analysis
frequency-domain analysis
frequency limitations
frequency characteristics
Fourier-images
Fourier transforms
Dynamical Systems
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
next ›
last »