Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
feature extraction
biblio
Classification of Mobile Phone Price Dataset Using Machine Learning Algorithms
Submitted by grigby1 on Wed, 09/20/2023 - 2:06pm
feature extraction
machine learning
machine learning algorithms
Support vector machines
pubcrawl
resilience
Resiliency
batteries
privacy
composability
Mobile handsets
classification
Random access memory
computer science
price prediction
biblio
DynaMalDroid: Dynamic Analysis-Based Detection Framework for Android Malware Using Machine Learning Techniques
Submitted by grigby1 on Wed, 09/20/2023 - 10:51am
operating systems
vulnerabilities
Technological innovation
system calls
Support vector machines
Resiliency
resilience
pubcrawl
privacy
Android malware
Metrics
Malware Analysis
malware
Knowledge engineering
Human behavior
feature extraction
dynamic analysis
deep learning
biblio
Android Malware Risk Evaluation Using Fuzzy Logic
Submitted by grigby1 on Wed, 09/20/2023 - 10:50am
malware
threat assessment
static malware analysis
Resiliency
resilience
pubcrawl
privacy
Metrics
Malware Analysis
Android malware
Industries
Human behavior
grid computing
Fuzzy logic
feature extraction
data analysis
Complexity theory
biblio
Investigation Malware Analysis Depend on Reverse Engineering Using IDAPro
Submitted by grigby1 on Wed, 09/20/2023 - 10:50am
pubcrawl
unsolicited e-mail
Trojan malware analysis
static analysis
source coding
social networking (online)
reverse engineering
Resiliency
resilience
disassembler
privacy
Metrics
Malware Analysis
malware
IDAPro
Human behavior
feature extraction
biblio
Detecting Malware Using Graph Embedding and DNN
Submitted by grigby1 on Mon, 09/18/2023 - 4:33pm
data structures
Resiliency Coordinator
feature vector
Malware Analysis
graph embedding
graph theory
Markov processes
Deep Neural Network
malware detection
malware
deep learning
privacy
Data models
Resiliency
resilience
Metrics
Human behavior
pubcrawl
feature extraction
information security
biblio
Recaptured Image Forensics Based on Generalized Central Difference Convolution Network
Submitted by grigby1 on Fri, 09/01/2023 - 3:19pm
deep learning
recaptured image detection
central difference convolution
Human Factors
Image databases
information forensics
Image forensics
Liquid crystal displays
Fuses
feature extraction
Scalability
Conferences
Resiliency
resilience
Metrics
Human behavior
pubcrawl
convolution
biblio
Progressive Standard Operating Procedures for Darkweb Forensics Investigation
Submitted by grigby1 on Fri, 09/01/2023 - 3:18pm
Digital Forensics
Space technology
artifacts
Human Factors
Tor
drugs
cryptocurrency
darkweb
Weapons
information forensics
feature extraction
Forensics
information and communication technology
internet
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
An Insider Threat Detection Method Based on Heterogeneous Graph Embedding
Submitted by grigby1 on Fri, 08/25/2023 - 3:42pm
resilience
ITDD Model
Heterogeneous Graph of employees' logs
Behavioral sciences
Resiliency
graph embedding
Policy Based Governance
Big Data
Computational modeling
Data models
Conferences
insider threat
policy-based governance
Metrics
Human Factors
Human behavior
pubcrawl
Insider Threats
Insider Threat Detection
machine learning
feature extraction
biblio
Semi-supervised Trojan Nets Classification Using Anomaly Detection Based on SCOAP Features
Submitted by grigby1 on Fri, 08/18/2023 - 4:11pm
integrated circuits
Testability
gate-level
Resiliency
ICS Anomaly Detection
supervised learning
hardware trojan
Hardware Security
Trojan horses
Logic gates
Scalability
Hardware
resilience
pubcrawl
Anomaly Detection
machine learning
feature extraction
Training
biblio
Sequential event-based detection of network attacks on CSE CIC IDS 2018 data set – Application of GSP and IPAM Algorithm
Submitted by grigby1 on Wed, 08/16/2023 - 3:39pm
IDS
Sequential event patterns
security events
probabilistic attack prediction
knowledge based anomaly detection
IPAM
Intrusion detection by Event Analysis
Generalized Sequential Patterns (GSP)
CSE-CIC-IDS 2018 data set
Behavioral sciences
Intelligent systems
feature extraction
Prediction algorithms
network security
DDoS Attacks
Benchmark testing
composability
Data models
Resiliency
resilience
pubcrawl
security
1
2
3
4
5
6
7
8
9
…
next ›
last »