Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
recurrent neural nets
biblio
RNN-VED for Reducing False Positive Alerts in Host-based Anomaly Detection Systems
Submitted by aekwall on Thu, 04/08/2021 - 4:35pm
natural language processing
variational encoder-decoder architecture
sequence to sequence
RNN-VED
normal behavior learning
model input-data representation
host-based anomaly detection systems
false positive alerts
ADFALD.
ADFA-LD dataset
Information Reuse and Security
system-call traces
HIDS
anomaly prediction
one-class classification
security of data
host-based intrusion detection systems
Hidden Markov models
Compositionality
Semantics
Recurrent neural networks
recurrent neural nets
Anomaly Detection
data structures
Decoding
pubcrawl
Resiliency
learning (artificial intelligence)
Classification algorithms
biblio
A Deep Learning-based Malware Hunting Technique to Handle Imbalanced Data
Submitted by aekwall on Mon, 03/29/2021 - 11:59am
Generative Adversarial Network(GAN)
generative adversarial network
LSTM
Predictive Metrics
machine learning approaches
antivirus companies
common threats
convolutional neural network (CNN)
cyber-security dangers
deep learning-based malware hunting technique
deep learning
Imbalanced
imbalanced training data sets
long short term memory
Long Short Term Memory(LSTM)
multiple class classification problems
Opcode
opcode sequences
oversampling minority classes
Generative Adversarial Learning
pattern classification
malware
invasive software
Data models
machine learning algorithms
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
Computational modeling
Scalability
internet
Training
CNN
convolutional neural nets
convolutional neural network
generative adversarial networks
recurrent neural nets
malware samples
biblio
Brain-Computer Interface based User Authentication System for Personal Device Security
Submitted by grigby1 on Tue, 03/09/2021 - 3:03pm
recurrent neural network
mentally selected circle
mentally uttered number
Metrics
particle filter
password
personal device security
PF
pubcrawl
recurrent neural nets
Kalman filters
resilience
RNN
security
security of data
SSVEP brain pattern
two stage security verification
user authentication system
visual evoked potentials
brain-computer interface system
Human behavior
Scalability
Resiliency
3 × 3 spatial matrix
BCI
biometric security
BIOS
brain
brain pattern classification
pattern locks
brain-computer interfaces
CCA
EKF
electroencephalography
EMD
ERNN
extended-Kalman filter
flickering circle
biblio
Black-Box Modelling of a DC-DC Buck Converter Based on a Recurrent Neural Network
Submitted by aekwall on Tue, 03/09/2021 - 12:04pm
autoregressive processes
Training
System Identification
switching convertors
static behavior
recurrent nonlinear autoregressive exogenous neural network
prediction
power converter
nonsynchronous buck converter model
DC-DC power converter
DC-DC buck converter
black-box modelling
black-box model
black-box approach
Resiliency
black-box models
radial basis function networks
Artificial Neural Networks
multilayer perceptrons
DC-DC power convertors
recurrent neural network
recurrent neural nets
black box encryption
power engineering computing
neural network
Metrics
composability
pubcrawl
biblio
A Black Box Modeling Technique for Distortion Stomp Boxes Using LSTM Neural Networks
Submitted by aekwall on Tue, 03/09/2021 - 12:03pm
correlation coefficient
stomp box
sound effect
Nonlinear distortion
LSTM neural networks
distortion stomp box
distortion sound
commercial stomp boxes
black box modeling
nonlinear systems
Integrated circuit modeling
LSTM
learning (artificial intelligence)
recurrent neural nets
black box encryption
neural network
Training
Neural networks
Metrics
composability
pubcrawl
Resiliency
machine learning
biblio
RNN-based Prediction for Network Intrusion Detection
Submitted by grigby1 on Tue, 02/23/2021 - 2:47pm
prediction model
sliding window
scoring function
RNN-based prediction
LSTM model
industrial IoT environments
data mining regression techniques
cosine similarity
anomaly detection methods
RNN
N-gram
LSTM
IDS
Euclidean distance
network intrusion detection
Internet of Things
regression analysis
composability
production engineering computing
recurrent neural nets
Data models
Resiliency
resilience
Metrics
pubcrawl
Intrusion Detection
Data mining
Anomaly Detection
Predictive models
security of data
biblio
Using Deep Learning Techniques for Network Intrusion Detection
Submitted by grigby1 on Tue, 02/23/2021 - 2:47pm
composability
RNN
network intrusion attacks
intelligent network intrusion detection system
cyber-security attacks
convolutional neural network
neural network
deep learning techniques
network intrusion detection
Recurrent neural networks
recurrent neural network
convolutional neural networks
deep learning
learning (artificial intelligence)
recurrent neural nets
network security
computer network security
Resiliency
resilience
Metrics
pubcrawl
Intrusion Detection
convolutional neural nets
CNN
machine learning
feature extraction
biblio
XSS Detection Technology Based on LSTM-Attention
Submitted by grigby1 on Wed, 02/10/2021 - 1:21pm
LSTM-attention detection model
XSS attacks
abstract features
added attention mechanism
attention mechanism
context-related features
Cross-site scripting (XSS)
inadequate feature extraction
long short-term memory recurrent neural network
cross-site scripting
malicious attack codes
traditional XSS detection methods
Word2Vec
XSS codes
XSS detection model
XSS detection technology
XSS payload features
Cross Site Scripting
Scalability
learning (artificial intelligence)
security of data
feature extraction
pubcrawl
Human behavior
resilience
Resiliency
robots
deep learning
Data models
internet
recurrent neural nets
pattern classification
Recurrent neural networks
Context modeling
LSTM
biblio
DeepMal: A CNN-LSTM Model for Malware Detection Based on Dynamic Semantic Behaviours
Submitted by aekwall on Mon, 02/08/2021 - 1:41pm
cyber-criminals
recurrent neural nets
Human Factors
LSTM
Compositionality
high-level abstractions
CNN-LSTM model
Cyber Dependencies
component-CNN
convolution
deep learning framework
DeepMal
dynamic semantic behaviours
evil intentions
locally spatial correlations
malicious programs
malware classification task
sequential longterm dependency
Metrics
malware
malware detection
invasive software
Data models
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
Scalability
Neurons
pattern classification
Training
machine learning
convolutional neural nets
natural language processing
NLP techniques
biblio
DeCrypto Pro: Deep Learning Based Cryptomining Malware Detection Using Performance Counters
Submitted by grigby1 on Fri, 01/22/2021 - 2:38pm
DeCrypto Pro
LSTM
defense mechanisms
advanced persistent threats
antivirus applications
APTs
behavior profiling
benign compression
classification model
collaborative attacks
computational resources
cryptographic operations
cryptojacking
cryptomining
Long short-term memory
DeCrypto Profiler framework
deep cryptomining profiler
mission-critical cybersystems
model selection
operating context profiling system
performance counters
Ransomware
system features
system functionalities
Trojan Laziok
utility function
Windows performance counters
cyberattacks
Predictive models
machine learning
Data mining
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Data models
Computational modeling
random forests
recurrent neural nets
Cryptography
deep learning
pattern classification
malware
invasive software
malware detection
nearest neighbour methods
k-nearest neighbors
Random Forest
advanced persistent threat
APT
deep neural networks
encoding
1
2
3
4
5
6
next ›
last »