Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
feature extraction
biblio
IoT DDoS Traffic Detection Using Adaptive Heuristics Assisted With Machine Learning
Submitted by grigby1 on Fri, 01/13/2023 - 1:28pm
Adaptation models
feature extraction
machine learning
machine learning algorithms
IoT
pubcrawl
resilience
Resiliency
Scalability
Protocols
network security
DDoS
Decision Tree
denial-of-service attack
Security Heuristics
Heuristics
biblio
Deep Learning Technique Based Intrusion Detection in Cyber-Security Networks
Submitted by aekwall on Thu, 01/05/2023 - 5:11pm
Ad hoc networks
wormhole attack
selective forwarding attack
Black hole assault
and Denial-of-Service attack
sybil attacks
Sybil attack
spread spectrum communication
deep learning
Routing protocols
Data models
composability
Resiliency
Metrics
pubcrawl
feature extraction
Artificial Intelligence
Training
Routing
biblio
Malicious attack detection based on traffic-flow information fusion
Submitted by aekwall on Thu, 01/05/2023 - 5:10pm
Attack detection
composability
Detectors
feature extraction
information fusion
machine learning algorithms
Metrics
Observers
performance evaluation
pubcrawl
Resiliency
Roads
smart transportation
sybil attacks
Traffic flow characterization
vehicular networks
biblio
Swarm Intelligence Approach for Feature Selection Problem
Submitted by aekwall on Thu, 01/05/2023 - 5:08pm
Agriculture
metaheuristics
hybridization
bat algorithm
artificial bee colony algorithm
Artificial Bee Colony
Swarm Intelligence
Digital Forensics
Feature Selection
Benchmark testing
classification
Classification algorithms
Compositionality
optimization
composability
pubcrawl
feature extraction
biblio
Feature Selection by Improved Sand Cat Swarm Optimizer for Intrusion Detection
Submitted by aekwall on Thu, 01/05/2023 - 5:06pm
Classification algorithms
composability
Compositionality
feature extraction
Feature Selection
Internet of Things
Intrusion Detection
machine learning
pubcrawl
real-time systems
Sand cat swarm optimizer algorithm
security
Sensitivity
Swarm Intelligence
Transfer functions
biblio
Feature-based Intrusion Detection System with Support Vector Machine
Submitted by grigby1 on Thu, 01/05/2023 - 2:22pm
Training
feature extraction
Support vector machines
Intrusion Detection
pubcrawl
Metrics
resilience
Resiliency
Heuristic algorithms
intrusion detection system
composability
Feature Selection
support vector machine
Systems architecture
support vector machine classification
supply vector machines
biblio
Comparative Analysis Of Crime Hotspot Detection And Prediction Using Convolutional Neural Network Over Support Vector Machine with Engineered Spatial Features Towards Increase in Classifier Accuracy
Submitted by grigby1 on Thu, 01/05/2023 - 2:21pm
Prediction algorithms
supply vector machines
Novel HDBSCAN Algorithm
Engineered Spatial Features
Crime hotspot
Spatial databases
support vector machine classification
convolutional neural network
support vector machine
Clustering algorithms
feature extraction
Classification algorithms
composability
Resiliency
resilience
Metrics
pubcrawl
machine learning
Support vector machines
biblio
Detecting and Classifying Self-Deleting Windows Malware Using Prefetch Files
Submitted by grigby1 on Fri, 12/23/2022 - 11:55am
feature extraction
machine learning
pubcrawl
Metrics
Resiliency
Conferences
composability
malware
Semantics
Prefetching
Forensics
Windows Operating System Security
malware classification
Malware Analysis
prefetch
biblio
The Application of 1D-CNN in Microsoft Malware Detection
Submitted by grigby1 on Fri, 12/23/2022 - 11:55am
deep learning
feature extraction
Neural networks
pubcrawl
Metrics
Resiliency
Databases
composability
malware
network security
malware detection
Semantics
Windows Operating System Security
1D-CNN
feature engineering
LightGBM
biblio
Automatic Selection Attacks Framework for Hard Label Black-Box Models
Submitted by aekwall on Tue, 12/20/2022 - 5:21pm
Computational modeling
White Box Security
transferability
substitute model
machine learning
feature extraction
face recognition
estimation
deep learning
Conferences
Black Box Attacks
black-box attack
adversarial example
adversarial attack
Adaptation models
pubcrawl
Metrics
composability
Resiliency
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »