Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber-threats
biblio
A Semantic Machine Learning Approach for Cyber Security Monitoring
Submitted by grigby1 on Fri, 11/20/2020 - 12:53pm
cyber-attacks
Stochastic Computing Security
stochastic styles
software technologies
semantic machine
Network Monitoring
information safety measure
digital global community
deterministic styles
destiny attacks
cyber- attacks
Cyber Attacks
cyber-threats
business processes
learning (artificial intelligence)
Computer crime
Data models
Scalability
Safety
Resiliency
resilience
pubcrawl
Monitoring
cyber security
machine learning
Training
security of data
biblio
Identity theft on e-government/e-governance digital forensics
Submitted by grigby1 on Fri, 10/16/2020 - 10:22am
Neural networks
fraudulent transactions
genetic algorithms
Government
government data processing
governments
identity theft
internet
Law
malicious online activity
fraud
policy-based governance
product reviews
pubcrawl
resilience
Resiliency
system intrusions
time 13.0 month
user anonymity
Cybercrime
collaboration
Computer crime
corporate users
credit card fraud
credit card transactions
Credit cards
credit transactions
cyber-threats
blockchain technology
Cybersecurity
cyberspace-low entry barriers
Digital Forensics
E-Governance
E-Government
electronic commerce
Electronic government
financial fraud
biblio
Suspicious Network Event Recognition Using Modified Stacking Ensemble Machine Learning
Submitted by grigby1 on Fri, 08/28/2020 - 2:34pm
extremely randomised trees
artificial intelligence-oriented automatic services
big-data analytics
cyber-threats
Data preprocessing
data science
Ensemble Learning
ensemble learning.
exploratory data analysis
AdaBoost
feature creation
modified stacking ensemble machine learning
Network Event Log Analytics
network intrusions
network traffic alerts
suspicious network event recognition dataset
suspicious network events
big data security in the cloud
neural nets
machine learning
data analysis
pubcrawl
Resiliency
Conferences
random forests
Big Data
pattern classification
security of data
Neural networks
Metrics
Random Forest
resilience
Scalability
Feature Selection
2019 IEEE BigData Cup Challenge
biblio
Inferring Malware Family through Application Protocol Sequences Signature
Submitted by BrandonB on Wed, 05/06/2015 - 1:04pm
application protocol sequences signature
computer network security
Cryptography
cyber-threats
Databases
Engines
Feeds
invasive software
learning (artificial intelligence)
machine learning algorithm
malicious packets detection
malware
malware automatic dynamic analysis
malware traffic detection
network traffic
Protocols
biblio
Inferring Malware Family through Application Protocol Sequences Signature
Submitted by BrandonB on Wed, 05/06/2015 - 1:01pm
application protocol sequences signature
computer network security
Cryptography
cyber-threats
Databases
Engines
Feeds
invasive software
learning (artificial intelligence)
machine learning algorithm
malicious packets detection
malware
malware automatic dynamic analysis
malware traffic detection
network traffic
Protocols
biblio
Inferring Malware Family through Application Protocol Sequences Signature
Submitted by BrandonB on Mon, 05/04/2015 - 1:42pm
application protocol sequences signature
computer network security
Cryptography
cyber-threats
Databases
Engines
Feeds
invasive software
learning (artificial intelligence)
machine learning algorithm
malicious packets detection
malware
malware automatic dynamic analysis
malware traffic detection
network traffic
Protocols