Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
belief networks
biblio
Efficient Network Intrusion Detection Using PCA-Based Dimensionality Reduction of Features
Submitted by grigby1 on Tue, 12/01/2020 - 1:47pm
network traffic
learning (artificial intelligence)
low-dimensional features
machine learning
Measurement
minority class instances
multiclass classification show
multiclass combined performance metric
network intrusion detection system
IP networks
PCA
PCA-based dimensionality reduction
principal component analysis
pubcrawl
resilience
Resiliency
security of data
Support vector machines
feature dimensionality reduction approach
Bayesian network
belief networks
binary classification
CICIDS2017 network intrusion dataset
class distribution parameters
composability
detection rate
dimensionality reduction
Bayes methods
feature extraction
high-dimensional features
IDS
imbalanced class distributions
imbalanced data
imbalanced distribution
intrusion detection system
biblio
Dynamic Generation of Empirical Cyberattack Models with Engineered Alert Features
Submitted by aekwall on Mon, 10/12/2020 - 11:46am
collective attack behavior
Human Behavior and Cybersecurity
unique attack models
intrusion alerts
ground truth data
empirical cyberattack models
empirical attack models
dynamic generation
dynamic Bayesian approach
Dynamic attack models
critical cyber incidents
critical activities
corporate network
competition data
cyberattack
2017 National Collegiate Penetration
automated system
Aggregates
belief networks
Indexes
Analytical models
Cybersecurity
pubcrawl
Human behavior
feature extraction
Bayes methods
IP networks
security of data
biblio
Research on Intrusion Detection Based on Improved DBN-ELM
Submitted by aekwall on Mon, 08/24/2020 - 1:37pm
pattern classification
majority voting
Deep confidence network
DBN-ELM
classifier
Deep Belief Network
extreme learning machine
NSL-KDD dataset
belief networks
feedforward neural nets
Training
Intrusion Detection
Neurons
classification
composability
pubcrawl
Resiliency
feature extraction
machine learning algorithms
Classification algorithms
security of data
biblio
Fraud Detection using Machine Learning and Deep Learning
Submitted by aekwall on Mon, 08/24/2020 - 1:37pm
credit card
Europe
Forestry
Credit cards
area under the ROC curve
Australian dataset
autoencoder
benchmark multiple machine learning methods
Boltzmann machines
cost of failure
financial data processing
data mining techniques
Deep belief networks
EU
European dataset
German dataset
k nearest neighbor
Matthews correlation coefficient
restricted boltzmann machine
security checks
pattern classification
Support vector machines
support vector machine
learning (artificial intelligence)
machine learning
Random Forest
Resiliency
pubcrawl
composability
deep learning
Data models
convolutional neural nets
deep learning methods
Data mining
convolutional neural networks
Artificial Neural Networks
belief networks
fraud
fraud detection
biblio
Optimized Activation Function on Deep Belief Network for Attack Detection in IoT
Submitted by aekwall on Mon, 08/24/2020 - 1:37pm
optimisation
Proposed Feature Extraction
operational security
Lion Algorithm
higher-order statistical features
feature extraction process
feature classification process
DP management
attack detection system
activation function optimization
Deep Belief Network
belief networks
Attack detection
classification
statistical analysis
IoT
Training
pattern classification
Neurons
optimization
composability
pubcrawl
Resiliency
feature extraction
Classification algorithms
security
Internet of Things
Conferences
security of data
biblio
Non-intrusive Runtime Monitoring for Power System Intelligent Terminal Based on Improved Deep Belief Networks (I-DBN)
Submitted by aekwall on Mon, 08/24/2020 - 1:37pm
Cyber Attack Detection
power system management
power system intelligent terminal equipment
power system faults
Power management
power companies
nonintrusive runtime monitoring
nonintrusive data collection
nonintrusive business-level monitoring platform
improved deep belief networks
business-level security monitoring
business-level monitoring platform
Deep Belief Network
runtime monitoring
Power industry
Resiliency
fault diagnosis
Power Grid
power distribution
power meters
belief networks
power system measurement
data acquisition
fault detection
power system security
smart power grids
power system analysis computing
composability
pubcrawl
biblio
Hybrid Model for Web Application Vulnerability Assessment Using Decision Tree and Bayesian Belief Network
Submitted by aekwall on Mon, 08/24/2020 - 1:37pm
feature extraction
Web application vulnerability assessment
vulnerability assessment
security of data
Resiliency
pubcrawl
machine learning algorithms
machine learning
logical Web pages
learning (artificial intelligence)
internet
hybrid model
Bayes methods
Entropy
Decision trees
Decision Tree
consumer relationship
composability
Classification algorithms
business process
business data processing
belief networks
Bayesian Belief Network (BBN)
Bayesian belief network
biblio
A Secured OpenFlow-Based Software Defined Networking Using Dynamic Bayesian Network
Submitted by aekwall on Mon, 08/24/2020 - 1:36pm
Ryu controller
Transport Layer Security
stateful firewall
state information
secured OpenFlow-based software defined networking
programmable network protocol
main standard protocol
emulated network
dynamic bayesian network
distributed denial-of-service attack
denial-of-service attack
belief networks
Hidden Markov models
computer network security
Firewalls (computing)
Heuristic algorithms
OpenFlow
composability
pubcrawl
Resiliency
transport protocols
software defined networking
Bayes methods
Protocols
firewalls
biblio
Detecting Cyber Supply Chain Attacks on Cyber Physical Systems Using Bayesian Belief Network
Submitted by aekwall on Mon, 08/24/2020 - 1:36pm
power engineering computing
cyberattack
cyberattack vectors
Cybercrime
cybercrime phenomenon
DAG method
inference mechanisms
invasive software
Knowledge representation
cyber-physical systems
probabilistic inference
pubcrawl
Resiliency
smart power grids
supply chains
threat probability
uncertainty
CPS domain
Scalability
Artificial Intelligence
Bayes methods
Bayesian belief network
Bayesian belief networks
belief networks
composability
Computer crime
Chained Attacks
CSC domain
Cyber Attacks
Cyber Physical System
cyber physical systems
cyber security domain
cyber supply chain attacks detection
Cyber Supply Chain Threats
biblio
Identifying Data Exposure Across Distributed High-Dimensional Health Data Silos through Bayesian Networks Optimised by Multigrid and Manifold
Submitted by grigby1 on Fri, 07/10/2020 - 11:40am
private data exposure
learning (artificial intelligence)
manifold
Manifolds
medical information systems
medical research
multigrid
multigrid solver method
privacy
privacy exposure risk
privacy legislation
information loss
Probabilistic logic
probability
pubcrawl
quasiidentifiers
Scalability
security of data
strong guarantees
thwarts de-anonymisation
treatment data
data anonymity
attribute combination
attribute pairs
attribute separation
Bayes methods
Bayesian networks
Bayesian networks optimised
belief networks
case agnostic method
Data Anonymisation
anonymisation algorithms
data deletion
Data models
data privacy
data transformation
Distributed databases
distributed high-dimensional data repositories
distributed high-dimensional health data silos
high conditional probability
identifying data exposure
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »