Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
tuning
biblio
Using Deep Reinforcement Learning to Evade Web Application Firewalls
Submitted by grigby1 on Tue, 04/19/2022 - 1:17pm
Adversarial Machine Learning
Firewalls (computing)
pubcrawl
q-learning
Reinforcement learning
resilience
Resiliency
Scalability
Semantics
signature based defense
SQL injection
Task Analysis
Training
tuning
Web Application Firewall (WAF)
biblio
Analysis of Algorithms for User Authentication using Keystroke Dynamics
Submitted by grigby1 on Tue, 08/17/2021 - 4:17pm
authentication
Forestry
Heuristic algorithms
Human behavior
keystroke analysis
keystroke dynamics
machine learning
Metrics
password
pubcrawl
tuning
User Authentication and XGBoost
Vegetation
biblio
Training Strategies for Autoencoder-based Detection of False Data Injection Attacks
Submitted by grigby1 on Wed, 06/30/2021 - 3:21pm
Load flow
tuning
Training
Smart Grids
security
Robustness
Resiliency
resilience
pubcrawl
Neural networks
Anomaly Detection
hyperparameter tuning
Human Factors
Human behavior
false data injection attack
False Data Detection
cyber physical systems
composability
autoencoder
biblio
Anomaly Detection with Autoencoder and Random Forest
Submitted by grigby1 on Tue, 03/30/2021 - 11:51am
Anomaly Detection
autoencoder
Computational modeling
Credit cards
deep learning
feature extraction
ICS Anomaly Detection
pubcrawl
Radio frequency
Random Forest
random forests
resilience
Resiliency
Scalability
tuning
biblio
Black Box to White Box: Discover Model Characteristics Based on Strategic Probing
Submitted by grigby1 on Thu, 03/04/2021 - 2:33pm
tuning
White Box Security
Libraries
machine learning
model characteristics
Probes
pubcrawl
resilience
security
security of data
strategic probing
text analysis
text generation
text transformer
Training
Training data
learning (artificial intelligence)
white box
white box adversarial attacks
Black Box Attacks
composability
Metrics
Resiliency
adversarial attacks
architecture attribution
black box encryption
deep classifier
GPT-2
image based classifiers
image classification
Industries
biblio
An Analytical Framework for Security-Tuning of Artificial Intelligence Applications Under Attack
Submitted by grigby1 on Thu, 08/13/2020 - 5:07pm
artificial intelligence applications
artificial intelligence security
signal classification
security-tuning
perturbation attack
parameters tuning
ML parameters
ML experts
ML algorithms
medical signal processing
k-nearest neighbors algorithm
input data perturbation attack
electroencephalography
electroencephalogram signals
EEG dataset
data classification
learning (artificial intelligence)
analytical framework
AI application
classification accuracy
tuning
testing
Prediction algorithms
Perturbation methods
machine learning algorithms
optimization
pubcrawl
Artificial Intelligence
security
machine learning
security of data
biblio
Artificial Intelligence based Network Intrusion Detection with Hyper-Parameter Optimization Tuning on the Realistic Cyber Dataset CSE-CIC-IDS2018 using Cloud Computing
Submitted by aekwall on Mon, 05/11/2020 - 11:19am
optimization
hyper-parameter optimization and realistic network traffic cyber dataset
hyper-parameter optimization tuning
Intrusion Detection
intrusion detection system
latest intrusion detection dataset
Metrics
network intrusion detection
neural nets
neural network algorithms
cyber-physical system traffic data
pubcrawl
realistic cyber dataset CSE-CIC-IDS2018
realistic cyber defense dataset
receiver operator characteristic
Resiliency
telecommunication traffic
tuning
web services
AWS
Human behavior
Amazon Web Services
area under ROC curve
Artificial Intelligence
artificial intelligence algorithms
artificial intelligence based network intrusion detection
artificial intelligence security
artificial intelligence technique
Artificial Neural Networks
Human Behavior and Cybersecurity
botnet
botnet attack detection
Canadian institute for cybersecurity
CIC
Cloud Computing
composability
computer network security
CSE-CIC-IDS2018
biblio
Reconfigurable Colloidal Microrobotic Swarm for Targeted Delivery
Submitted by grigby1 on Fri, 04/24/2020 - 12:01pm
Resiliency
oscillating behaviors
paramagnetic nanoparticles
potential biomedical applications
privacy
pubcrawl
real-time systems
real-time tracking
reconfigurable colloidal microrobotic swarm
resilience
nanoparticles
robots
rotating magnetic fields
size 400.0 nm
swarm
swarming patterns
swarms exhibits out-of-equilibrium structure
targeted delivery
tuning
untethered microrobots
magnetic resonance imaging
Coils
collective behaviour
composability
controlled velocity
drug delivery systems
external fields
external magnetic fields
magnetic actuation
Magnetic Particles
applied fields
Metrics
Microorganisms
microrobot
microrobotic swarm behaviours
microrobotic swarms
microrobots
multi-robot systems
nanomagnetics
biblio
Multi-Band Acoustic-Wave-Lumped-Element Resonator-Based Bandstop Filters with Continuously Tunable Stopband Bandwidths
Submitted by grigby1 on Wed, 01/16/2019 - 2:28pm
enhancement
tuning
surface acoustic-wave (SAW) resonator
Scattering parameters
RF/micro-wave filter
Resonators
Resonator filters
Radio frequency
high-quality-factor filter
pubcrawl
bandstop filter (BPF)
Band-pass filters
Acoustic-wave (AW) filter
Surface acoustic waves
acoustic coupling
Scalability
Resiliency
Human behavior
biblio
Robust IoT communication physical layer concept with improved physical unclonable function
Submitted by grigby1 on Mon, 06/11/2018 - 3:48pm
Ring Oscillator
Microelectronics Security
Physical Unclonable Function
pubcrawl
PUF
PUF-interfacing communication physical layer hardware
random identification hardware
reliability problems
resilience
Resiliency
Metrics
robust IoT communication physical layer
robust IoT communication physical layer concept
robust monitoring concepts
Robustness
size 65.0 nm
Spectral analysis
suitable physics
tuning
computer network security
Asia
Bandwidth
client-to-cloud communication physical layer
Cloud Computing
cloud-interfacing point
CMOS
CMOS technology
composability
aging
Conferences
generated PUF word
Hardware
hardware concepts
improved physical unclonable function
Internet of Things
IoT concept
IoT-cloud-based communication
1
2
next ›
last »