Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
k-nearest neighbors
biblio
A Hybrid Machine Learning and Data Mining Based Approach to Network Intrusion Detection
Submitted by aekwall on Wed, 03/23/2022 - 8:22am
network intrusion detection
k-nearest neighbors
Inference Detection
support vector machine
intrusion
Naive Bayes
Network interfaces
Predictive Metrics
Decision trees
Support vector machines
Decision Tree
testing
composability
Resiliency
pubcrawl
machine learning
Training
biblio
Gait Phase Segmentation Using Weighted Dynamic Time Warping and K-Nearest Neighbors Graph Embedding
Submitted by aekwall on Mon, 02/22/2021 - 12:46pm
Dynamic Time Warping
weighted dynamic time warping algorithm
self-collected IMU gait signals
neural network-based graph embedding scheme
k-nearest neighbors graph embedding
k-nearest neighbors algorithm
k-nearest neighbors
inertial measurement units
gait phase segmentation method
gait phase estimates
gait information
gait cycle
nearest neighbour methods
nearest neighbor search
diseases
gait analysis
graph embedding
Predictive Metrics
image segmentation
Measurement
neural nets
graph theory
pubcrawl
biblio
DeCrypto Pro: Deep Learning Based Cryptomining Malware Detection Using Performance Counters
Submitted by grigby1 on Fri, 01/22/2021 - 1:38pm
DeCrypto Pro
LSTM
defense mechanisms
advanced persistent threats
antivirus applications
APTs
behavior profiling
benign compression
classification model
collaborative attacks
computational resources
cryptographic operations
cryptojacking
cryptomining
Long short-term memory
DeCrypto Profiler framework
deep cryptomining profiler
mission-critical cybersystems
model selection
operating context profiling system
performance counters
Ransomware
system features
system functionalities
Trojan Laziok
utility function
Windows performance counters
cyberattacks
Predictive models
machine learning
Data mining
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Data models
Computational modeling
random forests
recurrent neural nets
Cryptography
deep learning
pattern classification
malware
invasive software
malware detection
nearest neighbour methods
k-nearest neighbors
Random Forest
advanced persistent threat
APT
deep neural networks
encoding
biblio
Convolutional Neural Networks as Classification Tools and Feature Extractors for Distinguishing Malware Programs
Submitted by grigby1 on Thu, 10/29/2020 - 10:11am
malware detection
visualization
Training
testing
SVM
Support vector machines
support vector machine
Resiliency
resilience
pubcrawl
privacy
pattern classification
nearest neighbour methods
microsoft malware classification challenge
Metrics
malware programs
anti-malware industry
malware classification
malware
learning (artificial intelligence)
KNN
k-nearest neighbors
invasive software
Human behavior
feature extractors
feature extraction
convolutional neural networks
convolutional neural nets
computer architecture
computationally efficient CNN-based architecture
CNN based algorithms
classification tools
biblio
A Protocol Independent Approach in Network Covert Channel Detection
Submitted by grigby1 on Thu, 07/16/2020 - 11:18am
supervised learning
network traffic dataset
protocol independent approach
protocol-independent approach
Protocols
pubcrawl
resilience
Resiliency
Scalability
stealth tunnels
network storage covert channel detection
supervised machine learning technique
support vector machine (SVM)
Support vector machines
TCP
TCP protocols
telecommunication computing
telecommunication traffic
wireless channels
IP networks
Compositionality
covert channel communication
covert channels
Decision Tree
DNS
DNS protocols
feature extraction
generic detection model
composability
IP protocols
IPv4
k-nearest neighbors
Kernel
logistic regression
Logistics
machine learning
network covert channel
biblio
K-nearest Neighbor Search by Random Projection Forests
Submitted by grigby1 on Fri, 05/22/2020 - 1:38pm
Clustering algorithms
Vegetation
tree-based methodology
rpForests
random projection forests
multicore computers
kNN search
kNN distances
exponential decay
ensemble size
ensemble random projection trees
ensemble methods
Ensemble
clustered computers
nearest neighbor search
k-nearest neighbor search
learning (artificial intelligence)
search problems
computational complexity
k-nearest neighbors
nearest neighbour methods
Measurement
Metrics
Big Data
random forests
pubcrawl
Unsupervised Learning
Forestry
Data mining
machine learning algorithms
machine learning
biblio
K-Nearest Neighbors and Grid Search CV Based Real Time Fault Monitoring System for Industries
Submitted by grigby1 on Fri, 05/22/2020 - 1:23pm
model-based techniques
flask
graphical user interface (GUI)
grid search cross validation
grid search CV
induction machine
Induction machines
K-Nearest Neighbors (KNN)
KNN
knowledge-based approach
Feature Selection
Python
python web framework
real time fault monitoring
signature extraction-based approach
Statistics
time fault monitoring system
user friendly interface
nearest neighbor search
nearest neighbour methods
pubcrawl
Circuit faults
Data models
internet
Industries
production engineering computing
Classification algorithms
Metrics
Measurement
grid search
Prediction algorithms
k-nearest neighbors
user interfaces
condition monitoring (CM)
cross validation (CV)
fault detection
fault detection techniques
fault diagnosis
biblio
DDoS Attack Mitigation through Root-DNS Server: A Case Study
Submitted by grigby1 on Fri, 04/03/2020 - 11:19am
Predictive models
true positive rate metric
traffic routing algorithms
telecommunication traffic
Support vector machines
Servers
Routing protocols
root-DNS server
root dns
RIPE Atlas
resource allocation
Random Forest
quality of service
pubcrawl
Probes
predictive security metrics
anycast
Metrics
machine learning
logistic regression
Load management
load balancing
k-nearest neighbors
IP networks
IP anycast
high availability
domain name system
DDoS attack mitigation
DDoS
cyber security
computer network security
Computer crime
biblio
DDoS Attacks Detection and Mitigation in SDN Using Machine Learning
Submitted by grigby1 on Wed, 02/26/2020 - 3:42pm
network topology
WEKA
threat vectors
Support vector machines
support vector machine
software defined networking
security threat protection
SDN network
SDN
random forests
Random Forest
pubcrawl
privacy
Computer crime
nearest neighbour methods
Metrics
Measurement
machine learning
k-nearest neighbors
J48
Floods
distributed denial-of-service attack
DDoS attack detection
DDoS
control systems
computer network security
biblio
Spectral analysis techniques for acoustic fingerprints recognition
Submitted by BrandonB on Mon, 05/04/2015 - 10:27am
Fingerprint recognition
vessel recognition
Spectrogram
Spectral analysis
signal spectral characteristics
principal components analysis
principal component analysis
PCA
noise source
noise reduction
neural nets
KNN
k-nearest neighbors
frequency 60 Hz
Finite impulse response filters
Acoustic Fingerprint
fingerprint identification
filtering system
FFT
feature extraction
Boats
audio signals
audio signal
Artificial Neural Networks
artificial neural network
ANN
Acoustics
Acoustic signal processing
acoustic noise
acoustic fingerprints recognition