Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wavelet analysis
biblio
Fault phase selection method of distribution network based on wavelet singular entropy and DBN
Submitted by grigby1 on Fri, 03/31/2023 - 8:27am
belief networks
Training
pubcrawl
Metrics
Analytical models
Entropy
Artificial Neural Networks
wavelet analysis
software packages
DBN
distribution networks
distribution network
Fault Phase Selection
Wavelet Singular Entropy
biblio
Analysing keystroke dynamics using wavelet transforms
Submitted by grigby1 on Fri, 03/03/2023 - 5:18pm
feature extraction
pubcrawl
Human behavior
Metrics
security
authentication
surveillance
wavelet transforms
wavelet analysis
keystroke analysis
passwords
keystroke dynamics
feature-extraction
keystroke-dynamics
wavelets
biblio
Comparison on Multiple Signal Analysis Method in Transformer Core Looseness Fault
Submitted by aekwall on Tue, 03/08/2022 - 2:36pm
multiple fault diagnosis
wavelet transforms
wavelet analysis
vibration signal
vibration analysis
core looseness
Empirical mode decomposition
Vibrations
Time-frequency Analysis
fault diagnosis
Transformer cores
cyber-physical systems
Resiliency
Metrics
pubcrawl
Human Factors
biblio
A THz Image Edge Detection Method Based on Wavelet and Neural Network
Submitted by grigby1 on Mon, 02/08/2021 - 2:00pm
neural network method
wavelet transforms
wavelet transform method
wavelet decomposition
wavelet analysis
wavelet
THz image edge detection method
terahertz waves
terahertz wave imaging
security
Scalability
Resiliency
resilience
pubcrawl
Pattern recognition
Neural networks
Canny operator method
neural network
neural nets
Metrics
low-frequency subimage detection
information security
image recognition
Image Processing
image fusion
Image edge detection
Image analysis
frequency
Electromagnetic radiation
edge image fusion
edge detection
composability
biblio
Tools for Investigating the Phishing Attacks Dynamics
Submitted by grigby1 on Tue, 11/26/2019 - 3:48pm
phishing attacks detection
wavelet transforms
wavelet coherence.
wavelet coherence
wavelet analysis
tools
the chaos theory
Stability analysis
pubcrawl
phishing attacks occurrence
phishing attacks dynamics
a phase portrait
Phishing
human factor
Human behavior
estimation
computer network security
Computer crime
Coherence
chaos theory
chaos
biblio
Identification of Potential Risks to System Security Using Wavelet Analysis, the Time-and-Frequency Distribution Indicator of the Time Series and the Correlation Analysis of Wavelet-Spectra
Submitted by grigby1 on Fri, 03/15/2019 - 11:55am
Resiliency
wavelet transforms
wavelet spectra correlation analysis
wavelet analysis
time-and-frequency localization
time-and-frequency distribution
Time series analysis
time series
Time Frequency Analysis
system security
security
Scalability
Accidents
resilience
pubcrawl
potential system security threat prediction identification
potential risks
potential risk
Metrics
Injuries
correlation methods
Correlation analysis
Correlation
biblio
Distributed Osmotic Computing Approach to Implementation of Explainable Predictive Deep Learning at Industrial IoT Network Edges with Real-Time Adaptive Wavelet Graphs
Submitted by grigby1 on Mon, 12/10/2018 - 11:41am
osmotic microservice
graph-based approach
IIoT network fog layer
IIoT systems
Industrial IoT
industrial IoT network edges
IoT development costs
large scale industrial Internet of Things
Logic gates
low-level machine language
LSTM networks
network cloud layer
graph theory
real-time
real-time adaptive wavelet graphs
real-time DSP
real-time graph-based Coiflet wavelets
real-time systems
system complexities
wavelet analysis
Wavelet Graph
wavelet transforms
XAI deep learning pre-processing applications
deep learning
Internet of Things
resilience
pubcrawl
Resiliency
Scalability
Hardware
xai
learning (artificial intelligence)
artificial intelligence deep learning problem
communication network noise
data quality
Cloud Computing
delay time
delays
digital signal processing chips
digital signal processor
distributed computing
distributed edge computing
distributed osmotic computing approach
distributed processing
edge layer
explainable artificial intelligence
biblio
L-GEM based robust learning against poisoning attack
Submitted by grigby1 on Fri, 07/06/2018 - 2:05pm
Robustness
poisoning attack
pubcrawl
radial basis function networks
RBFNN
resampling
resilience
Resiliency
robust learning
perturbation techniques
sampling methods
Scalability
Sensitivity
sensitivity analysis
Support vector machines
Training
wavelet analysis
Accuracy
perturbation
Pattern recognition
nearest-first flips attack
Localized Generalization Error Model (L-GEM)
localized generalization error model
localized generalization error bound
learning process
learning (artificial intelligence)
label flip poisoning attacks
L-GEM based robust learning
Human behavior
farthest-first flips attack
classifier output
AI Poisoning
adversarial learning
biblio
P-Leader Multifractal Analysis for Text Type Identification
Submitted by grigby1 on Mon, 03/19/2018 - 1:38pm
p-leader multifractal formalism
wavelet transforms
wavelet analysis
tools
Time series analysis
text type identification
text analysis
stylometry
pubcrawl
p-leaders
corpus analysis
P-leader multifractal analysis
novels
Multifractal analysis
Metrics
literature
Human behavior
Fractals
estimation
biblio
Wavelet transform and unsupervised machine learning to detect insider threat on cloud file-sharing
Submitted by grigby1 on Tue, 12/12/2017 - 1:23pm
pubcrawl
Learning systems
local-outlier factor
LOF
machine learning algorithms
Metrics
OddBall
pagerank
Peer-to-peer computing
policy-based governance
Insider Threats
relationship graphs
Resiliency
security of data
Time series analysis
two-stage machine learning system
Unsupervised Learning
wavelet analysis
wavelet coefficients
graph theory
cloud file-sharing
cloud file-sharing services
collaboration
Company Data
company IP
discrete wavelet transform
discrete wavelet transforms
DWT
Cloud Computing
graph-based unsupervised learning
graph-based unsupervised machine learning methods
Haar transforms
Haar wavelet
Haar wavelet function
Human behavior
Human Factors
Insider Threat Detection
1
2
next ›
last »