Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
recurrent neural nets
biblio
LSTM for Anomaly-Based Network Intrusion Detection
Submitted by aekwall on Mon, 05/11/2020 - 11:12am
network traffic
network system
Long-Short-Term Memory
CIDDS dataset
anomaly-based network intrusion detection
Long short-term memory
LSTM
computer science
deep learning
Recurrent neural networks
recurrent neural nets
Intrusion Detection
security of data
Anomaly Detection
testing
Training
network intrusion detection
Metrics
composability
pubcrawl
Resiliency
learning (artificial intelligence)
intrusion detection system
computer network security
biblio
A Temporal Recurrent Neural Network Approach to Detecting Market Anomaly Attacks
Submitted by grigby1 on Fri, 05/08/2020 - 3:02pm
recurrent neural nets
U.S. technology companies
Twitter
TRNN
text sequence dependency
temporal recurrent neural network approach
stock markets
social networking (online)
Social network services
social media
Sequence Prediction
security of data
Resiliency
resilience
Recurrent neural networks
recurrent neural network
Anomaly Detection
pubcrawl
policy-based governance
Neural Network Security
Metrics
market anomaly attacks detection
learning (artificial intelligence)
financial stocks markets
financial social media messages
financial market security
feature extraction
deep learning approaches
commodities markets
collaboration
Cognitive Hacking
Artificial Neural Networks
biblio
Cyberthreat Detection from Twitter using Deep Neural Networks
Submitted by grigby1 on Fri, 05/08/2020 - 2:43pm
security alert
Neural Network Security
Neural networks
open source intelligence platforms
OSINT
pipeline processing
policy-based governance
pubcrawl
public domain software
recurrent neural nets
Resiliency
named entity recognition task
security information
security of data
security-related information
social media networks
social networking (online)
Task Analysis
threat detection
tools
Twitter
cyberthreat detection
bidirectional long short-term memory network
classification task
collaboration
computer security
convolutional neural nets
convolutional neural network
cyber physical systems
cybersecurity information
cybersecurity-related sources
Artificial Neural Networks
cyberthreat intelligence
deep learning
deep neural networks
event management systems
indicators of compromise
information streams
IT infrastructure
learning (artificial intelligence)
Metrics
biblio
LuNet: A Deep Neural Network for Network Intrusion Detection
Submitted by grigby1 on Fri, 05/08/2020 - 2:43pm
recurrent neural nets
Metrics
network attack
network intrusion detection
network intrusion detection techniques
network traffic data
network traffic datasets
network users
Neural Network Security
policy-based governance
pubcrawl
machine learning
recurrent neural network
Recurrent neural networks
Resiliency
security issue
signature-based approach
spatial features
telecommunication traffic
temporal features
Training
feature extraction
AI-based solutions
Artificial Neural Networks
collaboration
computer network security
convolutional neural nets
convolutional neural network
cyber physical systems
Deep Neural Network
detection capability
advanced network attacks
hierarchical CNN+RNN neural network
input traffic data learning
intelligent capability
Intrusion Detection
intrusion detection system
Kernel
large scale network
learning (artificial intelligence)
LuNet
biblio
Anomaly Detection in Surveillance Videos
Submitted by aekwall on Mon, 04/13/2020 - 10:28am
long short-term memory networks
Videos
anomalous behavior
anomaly classification
CNN-LSTM model
explosion
Explosions
Frames
learning patterns
video surveillance
public safety
road accidents
spatial feature extraction
spatial feature learning
surveillance videos
temporal feature learning
UCF Crime dataset
convolutional neural nets
feature extraction
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
Metrics
LSTM networks
Training
security of data
Anomaly Detection
convolutional neural networks
image classification
video signal processing
recurrent neural nets
classification
surveillance
biblio
An Effective Android Ransomware Detection Through Multi-Factor Feature Filtration and Recurrent Neural Network
Submitted by aekwall on Mon, 03/23/2020 - 1:25pm
smart phones
multifactor feature filtration
majority voting process
Long short-term memory
filtration
feature selection algorithms
feature filtration techniques
deep learning-based malware detection model
Android ransomware detection
Android malware dataset
Android malware
Android environment
recurrent neural network
defense mechanisms
recurrent neural nets
forensic analysis
security
Malware Analysis
Digital Forensics
Metrics
deep learning
Ransomware
composability
pubcrawl
Resiliency
learning (artificial intelligence)
Feature Selection
feature extraction
mobile computing
invasive software
smart devices
biblio
Network Penetration Identification Method Based on Interactive Behavior Analysis
Submitted by grigby1 on Tue, 01/28/2020 - 2:36pm
penetration attacks
long-term memory shortage
LSTM
malicious attacks
Mathematical model
Metrics
national economy
Network penetration identification method
network penetration recognition technology
ordinary recurrent neural network
penetration attack
Long short-term memory
pubcrawl
recurrent neural nets
recurrent neural network
Recurrent neural networks
Sebek
Sebek technology
short-short time memory network
time series
time series modeling
Hidden Markov models
attack recognition method
attacker information collection
attacker keystroke record
Computer hacking
computer network security
Data models
feature extraction
gradient disappearance problem
gradient explosion
attack identification
honeynet
Human behavior
Human Factors
interaction behavior
interactive behavior analysis
internet
keystroke analysis
keystroke sequences
Logic gates
biblio
Intrusion Detection Using Swarm Intelligence
Submitted by aekwall on Mon, 01/27/2020 - 10:26am
random neural network based system
mean squared error
multilayer perceptrons
Neural networks
Neurons
NSL-KDD
NSL-KDD Train
particle swarm optimization
Prediction algorithms
pubcrawl
mean square error methods
recurrent neural nets
Recurrent neural networks
RNN-ABC
sensitive information
SQL
SQL injection
Swarm Intelligence
Training
hybrid multilayer perceptron based intrusion detection system
Artificial Bee Colony
artificial bee colony algorithm
Biological neural networks
communication technologies
composability
Compositionality
computer network security
Cyber Attacks
Denial-of-Service
anomaly-based intrusion detection scheme
insecure channel
Internet of Things
Internet-of-Things devices
Intrusion Detection
IoT device
IoT security
learning (artificial intelligence)
man-in-middle
biblio
Phishing URL Detection via CNN and Attention-Based Hierarchical RNN
Submitted by aekwall on Mon, 01/20/2020 - 12:13pm
Phishing Detection
Uniform resource locators
Fuses
attention-based hierarchical recurrent neural network module
attention-based hierarchical RNN
blacklisting
character-level spatial feature representations
convolutional neural network module
deep learning-based approach
feature engineering
Human Factors
phishing uniform resource locators
phishing URL classifier
phishing URL detection
phishing Websites
three-layer CNN
word-level temporal feature representations
zero-day phishing attacks
zero trust
pattern classification
cyber security
Electronic mail
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
policy-based governance
machine learning
Scalability
Computer crime
internet
Web sites
unsolicited e-mail
convolutional neural nets
recurrent neural nets
Phishing
deep learning
biblio
A Collaborative DDoS Mitigation Solution Based on Ethereum Smart Contract and RNN-LSTM
Submitted by aekwall on Wed, 12/18/2019 - 2:24pm
mitigation technique
effective DDoS defence
ethereum
ethereum smart contract
hardware resources
Human behavior
individual DDoS attack class
learning (artificial intelligence)
Lightning
Metrics
distributed denial-of-service
pubcrawl
recurrent neural nets
resilience
Resiliency
RNN-LSTM
signalling DDoS system
smart contracts
telecommunication signalling
telecommunication traffic
computer network security
autonomous systems
blockchain
blockchain technology
collaboration
collaborative DDoS mitigation solution
collaborative protection mitigation
complex configuration
composability
Computer crime
attack traffic flow
coordinated DDoS mitigation approaches
cryptocurrencies
DDoS attack mitigation
ddos mitigation
deep learning
Deep learning DDoS detection system
defence capabilities
defence mechanisms
defence systems
« first
‹ previous
1
2
3
4
5
6
next ›
last »