Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Predictive models
biblio
Membership Inference Attacks Against Adversarially Robust Deep Learning Models
Submitted by grigby1 on Fri, 04/03/2020 - 12:56pm
provable security
resilience
Training data
target model
security and privacy
provable defense
privacy challenges
membership inference attack
evasion attacks
empirical membership inference attacks
adversarially robust deep learning models
adversarial training method
adversarial defenses
adversarial defense methods
adversarial defense
deep learning
Compositionality
Metrics
neural nets
security challenges
privacy
Data models
data privacy
Resiliency
pubcrawl
security
Predictive models
Training
security of data
learning (artificial intelligence)
biblio
DDoS Attack Mitigation through Root-DNS Server: A Case Study
Submitted by grigby1 on Fri, 04/03/2020 - 12:19pm
Predictive models
true positive rate metric
traffic routing algorithms
telecommunication traffic
Support vector machines
Servers
Routing protocols
root-DNS server
root dns
RIPE Atlas
resource allocation
Random Forest
quality of service
pubcrawl
Probes
predictive security metrics
anycast
Metrics
machine learning
logistic regression
Load management
load balancing
k-nearest neighbors
IP networks
IP anycast
high availability
domain name system
DDoS attack mitigation
DDoS
cyber security
computer network security
Computer crime
biblio
A Unified Measurable Software Trustworthy Model Based on Vulnerability Loss Speed Index
Submitted by grigby1 on Fri, 04/03/2020 - 12:19pm
Trusted Computing
software metrics
software reliability
software security
software trust measurement
software trustworthiness
software trustworthy security growth model
software vulnerability datasets
trust measurement
Software measurement
unified measurable software trustworthy model
vulnerability loss speed index
vulnerability occurrence time
vulnerability severity prediction model
Vulnerability severity/type
Vulnerability time
vulnerability time occurrence
complex composite concept
software domain
Software
security
risk analysis
pubcrawl
probability
privacy models and measurement
predictive security metrics
Predictive models
Metrics
loss metric value
Loss measurement
internet technology
Indexes
future loss speed index
biblio
Virtual Machine Failure Prediction Method Based on AdaBoost-Hidden Markov Model
Submitted by grigby1 on Mon, 03/09/2020 - 1:25pm
Predictive models
VM security state
VM failure state
Virtual machining
virtual machines
virtual machine security
virtual machine failure prediction method
virtual machine
Upper bound
software fault tolerance
security
pubcrawl
AdaBoost-hidden Markov model
predictive ability
Prediction algorithms
observation state
learning (artificial intelligence)
hidden state
Hidden Markov models
hidden Markov model
Failure Prediction
cloud platform environment
Cloud Computing
biblio
Evaluating Fault Resiliency of Compressed Deep Neural Networks
Submitted by grigby1 on Wed, 02/26/2020 - 4:48pm
Hardware
VGG16
storage faults
software mitigation techniques
Resiliency
resilience
Quantization (signal)
pubcrawl
Predictive models
neural nets
LeNet-5
learning (artificial intelligence)
inference mechanisms
hardware mitigation techniques
Analytical models
fault tolerant computing
fault tolerance
Fault resiliency
Fault Resilience
Fault Attacks
Efficient and secure inference engines
Deep neural network model compression
deep learning
Data models
data compression
Computational modeling
compressed DNN models
compressed deep neural networks
biblio
QoE-Driven Anomaly Detection in Self-Organizing Mobile Networks Using Machine Learning
Submitted by grigby1 on Mon, 02/17/2020 - 5:14pm
ns-3
user-centric approach
telecommunication computing
system model
SON
self-organizing mobile networks
self-healing networks
Resiliency
resilience
quality of experience
QoE-driven anomaly detection
qoe
pubcrawl
Predictive models
parametric QoE model
ns-3 network simulator
Anomaly Detection
network-centric approaches
network scenario
mobile radio
mobile computing
machine learning
learning (artificial intelligence)
green mobile communication networks
end-user experience
dysfunctional serving nodes
dysfunctional serving eNodeBs
Decision trees
Data models
Computational modeling
composability
biblio
Introspective Agents in Opinion Formation Modeling to Predict Social Market
Submitted by aekwall on Mon, 02/10/2020 - 12:08pm
Agent Based Modeling (ABM)
Social Agents
social networks
social market
personal intentions
peer groups
opinion formation modeling
opinion formation model
Opinion Formation
model agents
introspective agents
internal tendency
governmental policies
Scalability
Numerical models
estimation
Human Factors
Predictive models
network theory (graphs)
social network
Production
multi-agent systems
social networking (online)
Peer-to-peer computing
pubcrawl
History
biblio
Forecasting Cyberattacks as Time Series with Different Aggregation Granularity
Submitted by grigby1 on Tue, 11/12/2019 - 4:26pm
intrusion detection methods
Uniform resource locators
time series construction
Time series analysis
time series
target configuration
security
pubcrawl
predictive security metrics
Predictive models
potential external factors
Metrics
malware
Malicious Traffic
malicious activity
aggregation granularity
incident count forecasting
forecasting
cyber defense
cyber attack occurrences
Correlation
computer network security
Computer crime
binary occurrence metrics
belief networks
Bayesian networks
autoregressive moving average processes
auto-regressive integrated moving average models
ARIMA
biblio
Cross-Entropy: A New Metric for Software Defect Prediction
Submitted by grigby1 on Tue, 11/12/2019 - 4:26pm
pubcrawl
Task Analysis
source code (software)
source code
software repository
software quality assurance
software quality
software metrics
software defect prediction
software bugs
Software
Semantics
recurrent neural network language model
recurrent neural nets
code metric
program debugging
predictive security metrics
Predictive models
natural language processing
Metrics
Measurement
language model
Entropy
DefectLearner
deep learning
cross-entropy
Computer bugs
code naturalness
biblio
Challenging Machine Learning Algorithms in Predicting Vulnerable JavaScript Functions
Submitted by grigby1 on Tue, 11/12/2019 - 4:25pm
Snyk platform
pattern classification
performing algorithm
performing models
Prediction algorithms
prediction models
Predictive models
predictive security metrics
pubcrawl
public databases
re-sampling strategies
security
security vulnerabilities
node security project
software metrics
software security issues
static source code metrics
Support vector machines
SVM
viable practical approach
Vulnerability
vulnerability information
vulnerable components
vulnerable functions
vulnerable javascript functions
Java
code fixing patches
code metrics
Computer crime
cyber-crime activities
Databases
dataset
deep learnin
deep learning
extensive grid-search algorithm
F-measure
forest based classifiers
GitHub
challenging machine
JavaScript
JavaScript programs
learning (artificial intelligence)
machie learning
machine learning
machine learning algorithms
Measurement
Metrics
mitigation techniques
natural language processing
nearest neighbour methods
« first
‹ previous
…
18
19
20
21
22
23
24
25
26
…
next ›
last »