Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
feature extraction
biblio
Anomaly-based Intrusion Detection System Using Fuzzy Logic
Submitted by grigby1 on Fri, 09/16/2022 - 4:47pm
feature extraction
security
Intrusion Detection
pubcrawl
Metrics
resilience
Computer crime
information technology
Fuzzy logic
Open Source Software
denial-of-service attack
Feature Selection
Resiliency
distributed denial of service attack
intrusion detection system
biblio
Research on risk severity decision of cluster supply chain based on data flow fuzzy clustering
Submitted by grigby1 on Fri, 09/09/2022 - 3:55pm
risk management
feature extraction
pubcrawl
Metrics
Indexes
Big Data
analytic hierarchy process
Clustering algorithms
Linear programming
supply chains
Cluster Supply Chain
fuzzy clustering algorithm for data flow
high-dimensional risk assessment index
Risk severity decision
supply chain risk assessment
biblio
Intrinsic Plagiarism Detection System Using Stylometric Features and DBSCAN
Submitted by grigby1 on Fri, 09/09/2022 - 2:28pm
Plagiarism
writing style
Segments
Intrinsic
Author
DBSCAN
Writing
stylometry
detection
tools
Web pages
Detectors
Databases
Metrics
Human behavior
pubcrawl
feature extraction
biblio
Machine Learning Approaches for Authorship Attribution using Source Code Stylometry
Submitted by grigby1 on Fri, 09/09/2022 - 2:27pm
deep learning
feature extraction
machine learning
pubcrawl
Human behavior
Metrics
Conferences
Big Data
Syntactics
natural language processing
stylometry
codes
authorship attribution
source code
biblio
Specific Emitter Identification via Variational Mode Decomposition and Histogram of Oriented Gradient
Submitted by grigby1 on Fri, 09/09/2022 - 2:23pm
simulation
wireless communication network security
time-frequency domain features
histogram of oriented gradient
variational mode decomposition
Resiliency
Zigbee
specific emitter identification
Time Frequency Analysis
Time-frequency Analysis
feature extraction
resilience
Histograms
Wireless communication
Scalability
performance evaluation
Metrics
pubcrawl
security
biblio
A Study on Attack Pattern Generation and Hybrid MR-IDS for In-Vehicle Network
Submitted by aekwall on Fri, 08/26/2022 - 11:57am
Intrusion Detection
real-time systems
machine learning
feature extraction
machine learning algorithms
pubcrawl
Resiliency
Internet of Things
CAN
controller area network security
cyber-physical systems
Ethernet
Hybrid MR-IDS
Hybrid power systems
network intrusion
Ruleset
biblio
DDoS-as-a-Smokescreen: Leveraging Netflow Concurrency and Segmentation for Faster Detection
Submitted by grigby1 on Fri, 08/26/2022 - 11:23am
DDoS
smoke-screen
segmented flow
NetFlow
distributed denial-of-service
DDoS-as-a-smokescreen
DaaSS
concurrent flow
underlying attack
Personnel
denial-of-service attack
Concurrency
feature extraction
Metrics
composability
Intrusion Detection
internet
privacy
Conferences
Resiliency
resilience
pubcrawl
Anomaly Detection
security
biblio
Detection of False Data Injection Attacks Using Cross Wavelet Transform and Machine Learning
Submitted by grigby1 on Fri, 08/12/2022 - 4:35pm
feature extraction
wavelet transforms
wavelet transform
Time-frequency Analysis
Time measurement
state estimation
Smart Grids
Power measurement
machine learning
Computational modeling
false data injection attack
cyber-physical security
Metrics
Resiliency
composability
pubcrawl
command injection attacks
biblio
ASAF: Android Static Analysis Framework
Submitted by aekwall on Fri, 08/12/2022 - 4:10pm
static analysis
composabiity
datasets
ASParse
APK
parsing
pubcrawl
malicious
android
security
malware
Human behavior
Resiliency
feature extraction
Analytical models
operating systems
tools
biblio
An Android Application Vulnerability Mining Method Based On Static and Dynamic Analysis
Submitted by aekwall on Fri, 08/12/2022 - 4:08pm
security
tools
feature extraction
Resiliency
Human behavior
Data mining
static analysis
pubcrawl
dynamic analysis
Android app
Androids
Humanoid robots
vulnerability mining
composabiity
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
…
next ›
last »