Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Predictive models
biblio
Network Security Situation Prediction in Software Defined Networking Data Plane
Submitted by aekwall on Thu, 05/13/2021 - 11:30am
cyber physical systems
time series classification
Switches
software-defined network
security
pubcrawl
Predictive models
Prediction algorithms
Neural networks
network security
Neural Network Security
computer science
Communication networks
bidirectional long short-term memory network
Artificial Neural Networks
Metrics
policy-based governance
Resiliency
cyber-physical systems
biblio
Interpreting a Black-Box Model used for SCADA Attack detection in Gas Pipelines Control System
Submitted by grigby1 on Wed, 05/05/2021 - 12:32pm
Prediction algorithms
SCADA Systems Security
LRP
LIME
Interpretable Machine Learning
autoencoder
SCADA System Security
explainable AI
Pipelines
SCADA
Compositionality
Predictive models
SCADA systems
Industries
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
machine learning algorithms
machine learning
biblio
A Policy-based Interaction Protocol between Software Defined Security Controller and Virtual Security Functions
Submitted by grigby1 on Thu, 04/29/2021 - 2:15pm
Protocols
virtual security function
software defined security service
Software
security protocol
security policies
security
SDN
pubcrawl
Network Security Architecture
Predictive models
policy-based governance
NFV
Monitoring
control systems
Cloud Security
Cloud Computing
biblio
A Security Situation Prediction Method Based on Improved Deep Belief Network
Submitted by aekwall on Tue, 04/27/2021 - 1:09pm
security
cyber-physical systems
Resiliency
pubcrawl
Sociology
Statistics
Prediction algorithms
Clustering algorithms
Communication networks
Predictive models
Deep Belief Network
belief networks
Active Defense
electricity information network
security situation prediction
biblio
Industrial Control System Intrusion Detection Model based on LSTM Attack Tree
Submitted by aekwall on Thu, 04/08/2021 - 4:35pm
internet
trees (mathematics)
traditional network security
traditional intrusion detection systems
Resiliency
pubcrawl
Predictive models
LSTM & attack tree
LSTM
Logic gates
Intrusion Detection
attack tree
Information Reuse and Security
Industrial control system intrusion detection model
industrial control
IDS
ICs
Hidden Markov models
constructed attack tree model
computer network security
Computer hacking
Compositionality
biblio
Image Classification using Convolution Neural Network Based Hash Encoding and Particle Swarm Optimization
Submitted by aekwall on Mon, 03/29/2021 - 12:08pm
visualization
TRV
transfer values
marketing
inception model
Image analysis
high-performance image classifier models
hashing techniques
hash encoding
Intelligent vehicles
TV
hash algorithms
file organisation
sequential model
Compositionality
image retrieval
Classification algorithms
Predictive models
pubcrawl
convolution neural network
image classification
genetic algorithms
convolutional neural network
convolutional neural nets
Training
particle swarm optimization
particle swarm optimisation
deep learning
Resiliency
feature extraction
Data models
biblio
A Measurement Study of IoT-Based Attacks Using IoT Kill Chain
Submitted by grigby1 on Wed, 03/17/2021 - 12:41pm
IoT Kill Chain
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
Probabilistic logic
privacy
Predictive models
Object recognition
attack surface
Internet of Things
Cyber Kill Chain
Chained Attacks
botnets
botnet
Attacks on IoT Devices
Attack Structure
Metrics
biblio
ComPy-Learn: A toolbox for exploring machine learning representations for compilers
Submitted by aekwall on Mon, 03/15/2021 - 12:07pm
compilers
program compilers
Clang
LLVM
compiler security
empirical evaluation
Clang compiler
Code Representations
compiler heuristics
Compositionality
ComPy-Learn
developer productivity
graph representations
LLVM compiler backend
program code
software engineering tools
software performance
syntax-level language information
tools
Task Analysis
Program processors
learning (artificial intelligence)
Resiliency
pubcrawl
machine learning
Metrics
optimization
Scalability
Training
software engineering
public domain software
Vulnerability prediction
program diagnostics
Predictive models
Pipelines
biblio
Substitute Model Generation for Black-Box Adversarial Attack Based on Knowledge Distillation
Submitted by aekwall on Tue, 03/09/2021 - 12:04pm
deep convolutional neural network
black-box models
adversarial attack perturbation
attacking success rate
black-box adversarial attack
black-box adversarial samples
black-box CNN models
classification mechanism
compact student model
adversarial samples
DenseNet121
knowledge distillation
multiple CNN teacher models
ResNet18
substitute model
substitute model generation
white-box attacking methods
convolutional neural networks
learning (artificial intelligence)
Resiliency
pubcrawl
composability
Computational modeling
Metrics
Training
convolutional neural nets
Task Analysis
black box encryption
image classification
Predictive models
computer vision
Perturbation methods
Approximation algorithms
computer vision tasks
biblio
XAI-Driven Explainable Multi-view Game Cheating Detection
Submitted by aekwall on Mon, 03/01/2021 - 5:02pm
multiple game productions
cheating detection
debugging
EMGCD
evidence generation
game health
game industries
illegal automated plugins
model compression
model debugging
cheating classifiers
NetEase Games
online game
Online Games
online gaming
online persistent virtual world
player enjoyment
reason generation
trustworthy performance
XAI-driven explainable multiview game cheating detection
explainable AI
Task Analysis
Data models
Resiliency
pubcrawl
internet
Games
Predictive models
visualization
Artificial Intelligence
Scalability
virtual reality
artificial intelligence techniques
computer games
xai
industrial application
AI models
detection framework
explainable artificial intelligence
audience profiles
« first
‹ previous
…
13
14
15
16
17
18
19
20
21
…
next ›
last »