Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Predictive models
biblio
Further refinements to the foundations of cyber zone defense
Submitted by grigby1 on Thu, 12/28/2017 - 1:28pm
Adaptation models
Biological system modeling
composability
computer security
Hardware
intrusion tolerance
Mathematical model
modeling
Predictive models
pubcrawl
Resiliency
security
simulation
biblio
An ensemble model with hierarchical decomposition and aggregation for highly scalable and robust classification
Submitted by grigby1 on Thu, 12/28/2017 - 1:17pm
highly scalable classification
Xgboost
Training
sub-model training
sub-model integration
regression analysis
pubcrawl
Predictive models
pattern classification
model decomposition
Metrics
machine learning
Logistics
logistic regression
learning (artificial intelligence)
binary classification problem
Hearthstone
game state information
flexible robust scheme
feature extraction
extreme gradient boosted decision trees
ensemble model
deep learning
decomposition
Decision trees
Data models
computer games
computer game
Computational modeling
Compositionality
biblio
Neural decomposition of time-series data
Submitted by grigby1 on Thu, 12/28/2017 - 1:16pm
Biological neural networks
Compositionality
Data models
decomposition
Discrete Fourier transforms
Metrics
Predictive models
pubcrawl
Training
biblio
An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks
Submitted by grigby1 on Wed, 12/20/2017 - 1:08pm
Phishing
zero-day semantic social engineering attack detection
Zero day attacks
user deception threat
threat detection
technical security countermeasures
Spear-phishing
social engineering
Semantics
semantic social engineering attacks
semantic attacks
security measures
security
Reliability
pubcrawl
Predictive models
application spoofing
multimedia masquerading
machine learning
learning (artificial intelligence)
information security scenarios
Human-as-a-Sensor
human-as-a-security-sensor paradigm
Human Factors
Human behavior
feature extraction
Electronic mail
defense
cyber security
Computer crime
Browsers
biblio
Phishing detection: A recent intelligent machine learning comparison based on models content and features
Submitted by grigby1 on Wed, 12/20/2017 - 1:07pm
pubcrawl
Phishing
phishing attacks
phishing datasets
Phishing Detection
phishing detection rate
Predictive Metrics
Predictive models
predictive security metrics
online community
security
tools
Training
Trusted Computing
trusted Websites
Web sites
Web Threat
World Wide Web
Human behavior
Artificial Neural Networks
Classification algorithms
Computer crime
computer security
data analysis
Decision trees
fake Websites
financial assets
anti-phishing tools
Human Factors
intelligent machine learning comparison
internet
learning (artificial intelligence)
machine learning
ML predictive models
online attack
biblio
Sciunits: Reusable Research Objects
Submitted by grigby1 on Tue, 12/12/2017 - 1:27pm
Predictive models
tools
Software
Servers
sciunit
Resiliency
reproducibility
pubcrawl
Provenance
composability
Monitoring
Metrics
metadata
Human Factors
Human behavior
Containers
Compositionality
biblio
Modeling insider threat types in cyber organizations
Submitted by grigby1 on Tue, 12/12/2017 - 1:23pm
Insider Threats
trust
susceptibility
social modeling
security of data
Resiliency
Random variables
pubcrawl
Predictive models
predictability
policy-based governance
Organizations
Metrics
manipulation
knowledge based systems
insider traits
Awareness
insider threat types
insider threat
Human Factors
Human behavior
cyber security
cyber organizations
cultural differences
Computational modeling
computational model
collaboration
business data processing
Behavioral Modeling
Bayesian knowledge bases (BKBs)
Bayes methods
biblio
Early Identification of Vulnerable Software Components via Ensemble Learning
Submitted by grigby1 on Mon, 11/27/2017 - 12:30pm
Resiliency
vulnerability detection scheme
vulnerability detection
Vulnerability
Training data
Training
supports vector machine algorithm
Support vector machines
support vector machine
software testing process
Software systems
software reliability
smart phones
security of data
robust software system
Compositionality
pubcrawl
program testing
Predictive models
Prediction algorithms
object-oriented programming
mislabeled data
Metrics
learning (artificial intelligence)
Java Android applications
Java
Human Factors
Human behavior
Ensemble Learning
early vulnerable software component identification
biblio
Tamper resistance evaluation of PUF in environmental variations
Submitted by grigby1 on Mon, 11/20/2017 - 12:27pm
machine-learning attacks
Tamper resistance
Support vector machines
semiconductor devices
Resistance
Resiliency
resilience
pubcrawl
Predictive models
Physical Unclonable Function
Mathematical model
arbiter PUF
machine learning attacks
Immune system
environmental variation
delays
Data models
counterfeit semiconductor components
counterfeit goods
copy protection
composability
biblio
A Scalable Meta-Model for Big Data Security Analyses
Submitted by grigby1 on Fri, 11/03/2017 - 11:31am
network anomaly detection
Training data
sufficient statistics
statistical data models
security of data
security analyses
security
Scalable Security
scalable meta-model
Scalability
regression analysis
pubcrawl
Predictive models
Big Data
meta-model sufficient statistics
meta-model matrix
Meta-Model
matrix algebra
machine learning algorithms
linear regressions
linear regression models
linear regression
learning (artificial intelligence)
Data models
Conferences
Big Data security analysis
« first
‹ previous
…
20
21
22
23
24
25
26
27
28
next ›
last »