Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
support vector machine
biblio
An Intelligent Software defined Network Controller for preventing Distributed Denial of Service Attack
Submitted by aekwall on Wed, 02/13/2019 - 11:59am
Resiliency
machine learning based intelligent method
Naive Bayes
naive Bayes algorithm
nearest neighbour methods
network computing environment
network layer
network management mechanism
operating system
pubcrawl
machine learning algorithms
Scalability
SDN network
Software Defined Network
Software Defined Network architecture
software defined networking
support vector machine
Support vector machines
telecommunication traffic
data traffic
Attack vectors
Bayes methods
Classification algorithms
computer architecture
Computer crime
computer network management
computer network security
cyber security
Data models
Application Layer
denial of service
distributed denial of service
distributed denial of service attack
Human behavior
infected packets
intelligent software
intelligent software defined network controller
k-nearest neighbor
biblio
SoundAuth: Secure Zero-Effort Two-Factor Authentication Based on Audio Signals
Submitted by grigby1 on Fri, 02/08/2019 - 4:34pm
password
zero-effort two-factor authentication
zero-effort 2FA mechanism
user-friendliness
user experience
two factor authentication
time synchronization
Support vector machines
support vector machine
SoundAuth
smart phones
smart phone
Servers
pubcrawl
ambient audio signals
online front-ends
machine learning
learning (artificial intelligence)
Human Factors
Human behavior
co-presence detection
challenge-response protocol
Browsers
browser
authorisation
authentication
audio signals
ambient sound
biblio
LipPass: Lip Reading-based User Authentication on Smartphones Leveraging Acoustic Signals
Submitted by grigby1 on Mon, 01/21/2019 - 12:28pm
privacy protection
learning (artificial intelligence)
lip movement patterns
lip reading-based user authentication system
LipPass
Lips
message authentication
mobile computing
pattern classification
Human behavior
pubcrawl
replay attacks
Resiliency
smart phones
Smartphones
spoofer detectors
support vector machine
Support vector machines
biometric-based authentication
Acoustic signal processing
acoustic signals
Acoustics
audio signal processing
authentication
authorisation
binary classifiers
binary tree-based authentication
Acoustic Fingerprints
build-in audio devices
composability
Data protection
deep learning-based method
Doppler effect
Doppler profiles
feature extraction
biblio
Cyber-Attack Detection for Industrial Control System Monitoring with Support Vector Machine Based on Communication Profile
Submitted by grigby1 on Wed, 07/18/2018 - 10:05am
IDS
penetration tests
privacy
production engineering computing
Support vector machines
Training
cyber-attack detection
Europe
ICS Anomaly Detection
pubcrawl
resilience
ICS communication profile
support vector machine
industrial control
industrial control system monitoring
Resiliency
Scalability
security
security of data
integrated circuits
Intrusion Detection Systems
cyber security test
Monitoring
biblio
Parallelization of Machine Learning Applied to Call Graphs of Binaries for Malware Detection
Submitted by grigby1 on Wed, 06/20/2018 - 12:50pm
program compilers
machine learning algorithms
malware
Malware Analysis
malware detection
Metrics
OpenMP version
parallelization
privacy
machine learning
pubcrawl
resilience
Resiliency
shortest path graph kernel
SPGK
support vector machine
Support vector machines
SVM
graph theory
Binary Analysis
byte-level n-grams
call graphs
compiler intermediate representations
compiler techniques
dynamic trace analysis
Engines
feature extraction
adaptive learning-based techniques
graph-based program representations
graphics processing units
Heterogeneous computing
Human behavior
invasive software
Kernel
learning (artificial intelligence)
biblio
CVSSA: Cross-Architecture Vulnerability Search in Firmware Based on Support Vector Machine and Attributed Control Flow Graph
Submitted by grigby1 on Tue, 05/01/2018 - 11:38am
function level features
vulnerability function
Training
third-party code bases
SVM
suspicious functions
Support vector machines
support vector machine
Software
security of data
Resiliency
resilience
real-world firmware images
pubcrawl
Microprogramming
Metrics
ACFG
flow graphs
firmware security
firmware
feature extraction
CVSSA
cross-architecture vulnerability search methods
cross-architecture
computer architecture
Computational modeling
composability
bipartite matching
binary firmware
basic-block level features
attributed control flow graph
biblio
Sample-Based Regularization for Support Vector Machine Classification
Submitted by grigby1 on Tue, 05/01/2018 - 11:38am
regularization scheme
training sample selection
training sample level
Training data
Training
SVM
Support vector machines
support vector machine classification
support vector machine
selected training data
sample-based regularization
Resiliency
resilience
composability
Regularization
pubcrawl
optimization
Metrics
maximum margin-based classification
linear combination
kernel methods
Kernel
image classification
human action recognition tasks
Fasteners
Dropout
biblio
A Support Vector Machine Based Approach for Code Smell Detection
Submitted by grigby1 on Tue, 05/01/2018 - 11:38am
resilience
Training
SVMCSD
Support vector machines
support vector machine
Software systems
software quality
software metrics
software maintenance
software developers
Resiliency
Anti-patterns
public domain software
pubcrawl
Metrics
Measurement
learning (artificial intelligence)
DETEX
computer science
composability
code smells
code smell detection
biblio
On the Detection of Adversarial Attacks Against Deep Neural Networks
Submitted by grigby1 on Tue, 05/01/2018 - 11:37am
active learning
Adversarial Machine Learning
composability
Deep Neural Network
machine learning security
Metrics
pubcrawl
resilience
Resiliency
support vector machine
Support vector machines
biblio
Support Vector Machine for Network Intrusion and Cyber-Attack Detection
Submitted by grigby1 on Wed, 04/11/2018 - 2:49pm
network intrusion
Training
threat vectors
telecommunication traffic
Support vector machines
support vector machine
statistical techniques
statistical analysis
security of data
pubcrawl
privacy
Ports (Computers)
anomaly-based IDS
ML techniques
Metrics
Measurement
machine learning
Local area networks
learning (artificial intelligence)
Intrusion Detection Systems
Intrusion Detection
cyber-security threats
cyber-attack detection
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »