Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
SVM
biblio
Malware Detection Using Honeypot and Machine Learning
Submitted by grigby1 on Wed, 02/26/2020 - 4:42pm
malware
Trojan Horse malware
threat vectors
SVM
Support vector machines
support vector machine
signature-based security systems
Scalability
Resiliency
pubcrawl
privacy
Metrics
Measurement
malware detection
Adware malware
machine learning
learning (artificial intelligence)
invasive software
Human Factors
honey pots
honeypot
firewalls
digital signatures
Decision trees
Decision Tree
computer viruses
computer malware
biblio
Low-Rate DoS Attack Detection Using PSD Based Entropy and Machine Learning
Submitted by aekwall on Mon, 01/27/2020 - 10:20am
Training
TCP congestion-control mechanism
support vector machine based machine learning model
PSD based entropy
PSD
power spectral density
malicious LDoS traffic
Low-rate DDoS
LDoS attacks
Entropy.
decision algorithm
complex low-rate DoS attack detection
communication complexity
Predictive Metrics
decision theory
Entropy
Computer crime
SVM
detection algorithms
machine learning
composability
pubcrawl
Resiliency
learning (artificial intelligence)
feature extraction
Support vector machines
distributed denial of service attack
telecommunication traffic
intrusion detection system
DDoS
computer network security
biblio
Facial Expression Recognition with Deep Learning
Submitted by aekwall on Mon, 12/30/2019 - 12:13pm
Resiliency
Human behavior
pubcrawl
Metrics
SVM
CNN
facial recognition
facial expression
preprocess
biblio
Challenging Machine Learning Algorithms in Predicting Vulnerable JavaScript Functions
Submitted by grigby1 on Tue, 11/12/2019 - 4:25pm
Snyk platform
pattern classification
performing algorithm
performing models
Prediction algorithms
prediction models
Predictive models
predictive security metrics
pubcrawl
public databases
re-sampling strategies
security
security vulnerabilities
node security project
software metrics
software security issues
static source code metrics
Support vector machines
SVM
viable practical approach
Vulnerability
vulnerability information
vulnerable components
vulnerable functions
vulnerable javascript functions
Java
code fixing patches
code metrics
Computer crime
cyber-crime activities
Databases
dataset
deep learnin
deep learning
extensive grid-search algorithm
F-measure
forest based classifiers
GitHub
challenging machine
JavaScript
JavaScript programs
learning (artificial intelligence)
machie learning
machine learning
machine learning algorithms
Measurement
Metrics
mitigation techniques
natural language processing
nearest neighbour methods
biblio
Weakness Identification and Flow Analysis Based on Tor Network
Submitted by aekwall on Mon, 08/26/2019 - 10:08am
Router Systems Security
darknet
Human behavior
Metrics
network traffic analysis
policy-based governance
pubcrawl
resilience
security weaknesses
SVM
The Onion Router
biblio
Machine Learning for Reliable Network Attack Detection in SCADA Systems
Submitted by aekwall on Mon, 07/01/2019 - 10:10am
open SCADA protocols
Training
SVM
Support vector machines
support vector machine
supervisory control and data acquisition systems
security of data
SCADA Systems Security
SCADA systems
SCADA
Resiliency
Random Forest
pubcrawl
Protocols
Pipelines
Payloads
Anomaly Detection
network attacks
network attack detection
missing data estimation
malicious intrusions
machine learning
learning (artificial intelligence)
Intrusion Detection Systems
Human behavior
gas pipeline system
F1 score
data normalization
critical infrastructures
control engineering computing
composability
biblio
Route Cache Based SVM Classifier for Intrusion Detection of Control Packet Attacks in Mobile Ad-Hoc Networks
Submitted by aekwall on Mon, 06/10/2019 - 10:16am
Ad hoc networks
composability
Data models
IDS
MANET
MANET Attack Detection
Metrics
mobile computing
pubcrawl
Resiliency
Route cache
Routing
Routing protocols
Support vector machines
SVM
biblio
Collecting Cyber Threat Intelligence from Hacker Forums via a Two-Stage, Hybrid Process Using Support Vector Machines and Latent Dirichlet Allocation
Submitted by grigby1 on Fri, 03/15/2019 - 11:52am
security controls
machine learning algorithms
malicious proxy servers
malware
Metrics
nontraditional information sources
privacy
pubcrawl
resource management
machine learning
Support vector machines
SVM
text classification
threat vectors
topic modeling
two-stage hybrid process
Vocabulary
AV detection
learning (artificial intelligence)
leaked credentials
LDA
latent Dirichlet allocation
internet
hybrid machine learning model
hacker forums
hacker forum posts
cyber threat landscape
Cyber Threat Intelligence (CTI)
cyber threat intelligence
cyber security
CTI
Computer hacking
Computer crime
biblio
An Improved Spam Detection Method with Weighted Support Vector Machine
Submitted by aekwall on Mon, 02/25/2019 - 11:40am
KFCM
WSVM
weighted SVM
weighted support vector machine
weight variables
Unsolicited electronic mail
Training
SVM
spam filtering
spam detection method
spam detection
Prediction algorithms
KPCM
KFCM algorithm
Scalability
email users
unsolicited e-mail
internet
pattern classification
Metrics
pubcrawl
Human behavior
learning (artificial intelligence)
feature extraction
Support vector machines
machine learning algorithms
Kernel
biblio
A Zero-Day Resistant Malware Detection Method for Securing Cloud Using SVM and Sandboxing Techniques
Submitted by grigby1 on Mon, 12/10/2018 - 11:38am
OS images
zero-day resistant malware detection method
Zero-day resistance
Zero-day attacks
Zero day attacks
user machine
tools
SVM
Support vector machines
security of data
sandboxing techniques
Resiliency
resilience
pubcrawl
phase exhaustive technique
Cloud Computing
operating systems (computers)
networking schemes
n-class SVM
Metrics
malware
machine learning
IT infrastructure
feature extraction
defense
Conferences
computer security
composability
clouds
« first
‹ previous
1
2
3
4
5
next ›
last »