Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
support vector machine
biblio
Applying Machine Learning to Anomaly-Based Intrusion Detection Systems
Submitted by aekwall on Mon, 01/20/2020 - 10:56am
NSL-KDD dataset
unsupervised anomaly traffic detection techniques
telecommunication traffic
Support vector machines
support vector machine
stochastic gradient decent
sequential model
security of data
Resiliency
regression analysis
random forests
random forest classifier
pubcrawl
anomaly-based Intrusion Detection Systems
NSL-KDD
Malicious Traffic
machine learning techniques
machine learning
logistic regression
intrusive traffics
Intrusion Detection systems (IDSs)
Intrusion Detection Systems
Internet-based traffic
internet
gradient methods
composability
biblio
Machine Learning Based Intrusion Detection System
Submitted by aekwall on Mon, 01/20/2020 - 10:55am
malicious activity
well-organized classification methodology
Training
Support vector machines
Support Vector Machine Naive Bayes
support vector machine
statistical methodologies
security of data
Resiliency
pubcrawl
Predictive Metrics
pattern classification
NSL- KDD knowledge discovery dataset
network traffic data
Naive Bayes
Market research
Bayes methods
machine learning based intrusion detection system
machine learning
learning (artificial intelligence)
Intrusion Detection Systems
Intrusion Detection
Informatics
false alarms
distrustful activity
detection rate
Data mining
Conferences
computer network security
composability
Comparative Analysis
biblio
Uncertainty-Aware Authentication Model for Fog Computing in IoT
Submitted by aekwall on Mon, 12/30/2019 - 11:16am
Naive Bayes
uncertainty-aware authentication model
uncertainty handling
uncertainty
Support vector machines
support vector machine
supervised learning
supervised classification algorithms
security issues
Scalability
Resiliency
regression analysis
pubcrawl
privacy issues
prediction model
pattern classification
Fog computing
Mobile Edge Computing
logistic regression
IoT
Internet of Things
Fog Computing and Security
Decision trees
Decision Tree
Cloud Computing
Cisco Systems
Bayes methods
authorisation
authentication
attribute based access control model
ABAC model
security
biblio
Anomaly Detection in Role Administered Relational Databases — A Novel Method
Submitted by aekwall on Mon, 11/04/2019 - 10:23am
relational databases
User profile
security feature
Role-Based Access Control database
Role administered relational databases
Quiplet
database management systems
database management system
database access control
common security measures
anomaly detection technique
anomaly detection system
access control measures
relational database security
authorisation
Intrusion Detection
Anomaly Detection
Training
Databases
Metrics
composability
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
Support vector machines
support vector machine
Access Control
biblio
Machine Learning for Reliable Network Attack Detection in SCADA Systems
Submitted by aekwall on Mon, 07/01/2019 - 9:10am
open SCADA protocols
Training
SVM
Support vector machines
support vector machine
supervisory control and data acquisition systems
security of data
SCADA Systems Security
SCADA systems
SCADA
Resiliency
Random Forest
pubcrawl
Protocols
Pipelines
Payloads
Anomaly Detection
network attacks
network attack detection
missing data estimation
malicious intrusions
machine learning
learning (artificial intelligence)
Intrusion Detection Systems
Human behavior
gas pipeline system
F1 score
data normalization
critical infrastructures
control engineering computing
composability
biblio
Malware Classification Using Deep Convolutional Neural Networks
Submitted by grigby1 on Mon, 06/10/2019 - 1:01pm
privacy
learning models
machine learning
malware
malware binaries
malware classification
malware images
Metrics
neural network
object detection
Pattern recognition
learning (artificial intelligence)
pubcrawl
resilience
Resiliency
support vector machine
support vector machine classifier training
Support vector machines
transfer learning
visual patterns
visualization
feature extraction
classification
classifier
convolutional neural nets
convolutional neural network
convolutional neural networks
Correlation
DCNN classification
deep convolutional neural networks
deep learning techniques
accuracy levels
Gray-scale
Hamming distance
Human behavior
image classification
image features
image representation
image type
improved image representation
invasive software
biblio
Detecting an Alteration in Biometric Fingerprint Databases
Submitted by aekwall on Mon, 03/25/2019 - 8:58am
Resiliency
pubcrawl
composability
support vector machine
Metrics
biometrics
Fake fingerprints
fingerprints
signal processing security
biblio
Cancelable Biometrics Technique for Iris Recognition
Submitted by grigby1 on Fri, 03/22/2019 - 11:35am
encryption noninvertible transformation
support vector machine
Scalability
Resiliency
resilience
Reliability
recognition rate
pubcrawl
Non-linear Quadratic kerne
Metrics
Iris recognition
feature extraction
Bath-A dataset
encryption
decryption noninvertible transformation
Databases
Cryptography
cancelable biometrics method
cancelable biometrics features
cancelable biometrics
biometric encryption
biometric data
bioinformatics
biblio
Unauthorized Access Point Detection Using Machine Learning Algorithms for Information Protection
Submitted by grigby1 on Fri, 03/15/2019 - 10:53am
pubcrawl
wireless LAN
wireless Internet environment
wireless integrated environment
Wireless fidelity
Wireless communication
wireless AP security
Wi-Fi
unauthorized AP
unauthorized Access Point detection
threat vectors
Support vector machines
support vector machine
security
RTT value data
Classification algorithms
protection
privacy
Prediction algorithms
multilayer perceptrons
military facilities
Metrics
machine learning algorithms
machine learning
learning (artificial intelligence)
information protection
hacking attacks
detection
computer network security
biblio
Classification of Multiple Affective Attributes of Customer Reviews: Using Classical Machine Learning and Deep Learning
Submitted by grigby1 on Wed, 03/06/2019 - 3:30pm
natural language processing
support vector machine
softmax regression
Scalability
restricted Boltzmann machines
Resiliency
resilience
pubcrawl
policy-based governance
Affective analysis
Metrics
Kansei engineering
Human behavior
Deep Belief Network
Customer reviews
composability
collaboration
belief networks
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »