Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
support vector machine
biblio
XSS Attack Detection With Machine Learning and n-Gram Methods
Submitted by aekwall on Mon, 12/14/2020 - 12:29pm
Training data
nearest neighbour methods
Predictive Metrics
pubcrawl
Resiliency
security of data
support vector machine
Support vector machines
SVM
Naive Bayes
Uniform resource locators
vulnerable
Web sites
website
XSS attack
XSS attack detection
XSS attacks
KNN
Bayes methods
composability
cookies
Cross Site Scripting
cross-site scripting
detection script
feature extraction
k-nearest neighbour
Attack vectors
learning (artificial intelligence)
machine learning
machine learning algorithms
malicious script
malicious scripts
N-gram
n-gram method
biblio
Blackhole Attack Detection Using Machine Learning Approach on MANET
Submitted by aekwall on Mon, 12/14/2020 - 12:29pm
Secure AODV
Mobile Ad-hoc Network consists
Mobile adhoc Network
mobile radio
neural nets
on-demand routing mechanism
Predictive Metrics
pubcrawl
quality of service
Resiliency
Routing protocols
Scalability
mobile ad hoc networks
security
security mechanism
security of data
self-configurable type
support vector machine
Support vector machines
Support Vector Model
telecommunication security
Throughput
time 37.27 ms
blackhole attack detection
ad hoc network
Ad hoc networks
Ad-hoc-on-Demand Distance Vector
AODV
artificial neural network
Attack vectors
black hole AODV
Black hole attack
Black hole attacks
Blackhole Attack (BA)
MANET Attack Detection
composability
Compositionality
delays
energy consumption
high QoS parameter
learning (artificial intelligence)
machine learning approach
MANET
manet privacy
Metrics
biblio
Interference of Cyber Endanger using Support Vector Machine
Submitted by aekwall on Mon, 12/14/2020 - 12:29pm
on-line exchanges
Web structure associations
Web record remark
Support vector machines
Support Vector Machine(SVM)
support vector machine
sort machine
security of data
SDA
robotized revelation
Resiliency
pubcrawl
Predictive Metrics
persistent repeated mischief
PC systems
Patching
advanced badgering
monetary machine
mobile phones
line associations
less steeply-esteemed acknowledgment displays
internet
Interference
Hinduja
cyberbullying
cyber-tormenting cases
cyber endanger
cosmology
composability
burden their mates
basic ordinary language sections
assembling
biblio
Convolutional Neural Networks as Classification Tools and Feature Extractors for Distinguishing Malware Programs
Submitted by grigby1 on Thu, 10/29/2020 - 11:11am
malware detection
visualization
Training
testing
SVM
Support vector machines
support vector machine
Resiliency
resilience
pubcrawl
privacy
pattern classification
nearest neighbour methods
microsoft malware classification challenge
Metrics
malware programs
anti-malware industry
malware classification
malware
learning (artificial intelligence)
KNN
k-nearest neighbors
invasive software
Human behavior
feature extractors
feature extraction
convolutional neural networks
convolutional neural nets
computer architecture
computationally efficient CNN-based architecture
CNN based algorithms
classification tools
biblio
Machine Learning Bluetooth Profile Operation Verification via Monitoring the Transmission Pattern
Submitted by grigby1 on Fri, 09/04/2020 - 4:27pm
radio frequency output power
electronic engineering computing
Hardware Security
hardware-software security
integrated circuit manufacture
k-nearest neighbor
license communication IC
low computational complexity
low-cost legacy technology
mobile radio
profile classification algorithm
custom low-frequency integrated circuit
RF envelope detector
RF output power
RF Power
signal classification
smart descriptive time-domain feature extraction
Supervisory Circuit
support vector machine
transmission pattern
Cyber Physical System
bluetooth security
cyber physical systems
telecommunication security
pubcrawl
composability
Resiliency
resilience
Human behavior
machine learning
feature extraction
classifier
learning (artificial intelligence)
security
formal verification
Decision Tree
system-on-chip
telecommunication computing
Bluetooth
Blue-tooth
Bluetooth profile operation verification
Bluetooth SoC
Bluetooth System-on-Chip
communication complexity
biblio
Fraud Detection using Machine Learning and Deep Learning
Submitted by aekwall on Mon, 08/24/2020 - 1:37pm
credit card
Europe
Forestry
Credit cards
area under the ROC curve
Australian dataset
autoencoder
benchmark multiple machine learning methods
Boltzmann machines
cost of failure
financial data processing
data mining techniques
Deep belief networks
EU
European dataset
German dataset
k nearest neighbor
Matthews correlation coefficient
restricted boltzmann machine
security checks
pattern classification
Support vector machines
support vector machine
learning (artificial intelligence)
machine learning
Random Forest
Resiliency
pubcrawl
composability
deep learning
Data models
convolutional neural nets
deep learning methods
Data mining
convolutional neural networks
Artificial Neural Networks
belief networks
fraud
fraud detection
biblio
Performance Comparison of Support Vector Machine, K-Nearest-Neighbor, Artificial Neural Networks, and Recurrent Neural networks in Gender Recognition from Voice Signals
Submitted by aekwall on Mon, 08/10/2020 - 10:36am
mel frequency kepstrum coefficients
voice signals
Voice Signal
Support vector machines
support vector machine
Resiliency
Recurrent Neural Networks (RNN)
Recurrent neural networks
recurrent neural nets
pubcrawl
policy-based governance
Artificial Neural Networks
K-Nearest-Neighbor
k-nearest neighborhood method
gender recognition
feature extraction
cyber physical systems
biometrics (access control)
biometric data
audio signal processing
audio signal
biblio
Intrusion Detection For Controller Area Network Using Support Vector Machines
Submitted by aekwall on Mon, 07/20/2020 - 10:43am
Internet of Things
Support vector machines
support vector machine based intrusion detection system
support vector machine
security countermeasures
Resiliency
pubcrawl
Protocols
process secure communication
parameter selection
machine learning
light-weight nature
Intrusion Detection
automobile communications
feature vector selection
feature extraction
ECU
delays
cyber-physical systems
controller area networks
controller area network security
controller area network
computer network security
communication standard
CAN protocol
automobiles
biblio
Predicting and Preventing Malware in Machine Learning Model
Submitted by grigby1 on Thu, 07/09/2020 - 1:57pm
Random Forest
machine learning model
malware prediction
malware prevention
pattern classification
Predictive models
privacy
privacy preserving technique
pubcrawl
machine learning algorithms
random forests
resilience
Resiliency
Scalability
security
support vector machine
Support vector machines
Training
Decision Tree
Algorithm robustness enhancement
Causative attack
Classification algorithms
Compositionality
data deletion
Data models
data privacy
Data Sanitization
AdaBoost
Decision trees
exploratory attack
Human behavior
Human Factors
invasive software
K-nearest-neighbors classifier
KNN classifier
machine learning
biblio
Research on fusion diagnosis method of thermal fault of Marine diesel engine
Submitted by aekwall on Mon, 05/18/2020 - 10:49am
fault diagnosis
single sensor data
multiple fault diagnosis models
Marine vehicles
marine diesel engine thermal fault
marine diesel engine
intelligent fault fusion diagnosis method
information fusion
environmental noise
diesel engines
AVL BOOST software
multiple fault diagnosis
mechanical engineering computing
Data models
Human Factors
Temperature measurement
genetic algorithms
genetic algorithm
cyber physical systems
Mathematical model
Metrics
pubcrawl
Resiliency
support vector machine
Support vector machines
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »