Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
genetic algorithm
biblio
A GAN-based Method for Generating SQL Injection Attack Samples
Submitted by grigby1 on Fri, 02/03/2023 - 3:49pm
Artificial Intelligence
SQL injection detection
Web vulnerability
data augmentation
usability
generative adversarial networks
generative adversarial network
genetic algorithm
SQL injection
Market research
security
privacy
Data models
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
biblio
Genetic Algorithm based Hardware Trojan Detection
Submitted by grigby1 on Thu, 05/19/2022 - 1:02pm
transition probability
trojan horse detection
Trigger coverage
Test pattern generators
SCOAP
Logical Testing
ISCAS ’85 and 89
and Trojan coverage
masking
Communication Systems
genetic algorithm
pubcrawl
genetic algorithms
Trojan horses
hardware trojan
Benchmark testing
composability
integrated circuits
Hardware
Resiliency
resilience
biblio
Optimal Parameters Design for Model Predictive Control using an Artificial Neural Network Optimized by Genetic Algorithm
Submitted by aekwall on Mon, 01/31/2022 - 4:31pm
Measurement
Inverters
Predictive models
pubcrawl
Scalability
Resiliency
Artificial Neural Networks
model predictive control
Linear programming
genetic algorithm
artificial neural network
employee welfare
Switching frequency
T-type inverter
weighting factor design
work factor metrics
biblio
Generating Audio Adversarial Examples with Ensemble Substituted Models
Submitted by aekwall on Mon, 01/31/2022 - 4:12pm
Speech recognition
machine learning
Conferences
pubcrawl
Metrics
Resiliency
composability
automatic speech recognition
Stability analysis
genetic algorithm
black-box attack
White Box Security
biblio
Application of Bio-inspired Algorithms to the Cryptanalysis of Asymmetric Ciphers on the Basis of Composite Number
Submitted by aekwall on Mon, 01/10/2022 - 12:47pm
RSA
Compositionality
Resiliency
quadratic sieve
integer factorization
Genetics
genetic algorithm
fitness function
bio-inspired algorithms
Asymmetric Encryption
Reliability
genetic algorithms
Prototypes
Approximation algorithms
Human behavior
Metrics
pubcrawl
Public key
encryption
biblio
Deception Maze: A Stackelberg Game-Theoretic Defense Mechanism for Intranet Threats
Submitted by aekwall on Mon, 12/20/2021 - 12:22pm
game theory
simulation
resource management
Resiliency
pubcrawl
Organizations
Metrics
Human behavior
genetic algorithm
Games
game theoretic security
Deception Technology
Data Breach
Conferences
Computational modeling
advanced persistent threat
Scalability
Predictive Metrics
Human Factors
biblio
A Method for Constructing Heterogeneous Entities Pool in NFV Security Architecture Based on Mimic Defense
Submitted by grigby1 on Thu, 09/30/2021 - 2:37pm
computer architecture
Conferences
genetic algorithm
genetic algorithms
heterogeneous entities pool
mimic defense
network function virtualization
Network Security Architecture
pubcrawl
resilience
Resiliency
resource management
security
simulation
biblio
Slow Hypertext Transfer Protocol Mitigation Model in Software Defined Networks
Submitted by grigby1 on Tue, 09/07/2021 - 3:21pm
Protocols
Web servers
Support vector machines
support vector machine
Software Defined Network
slow distributed denial of service
slow DDoS mitigation
Resiliency
resilience
pubcrawl
composability
Metrics
IP networks
Human behavior
genetic algorithms
genetic algorithm
denial-of-service attack
DDOS attacks detection
DDoS attack mitigation
Computer crime
biblio
Adversarial Attack against LSTM-Based DDoS Intrusion Detection System
Submitted by grigby1 on Tue, 09/07/2021 - 2:04pm
Intrusion Detection
tools
Resiliency
resilience
pubcrawl
probability weighted
Metrics
machine learning algorithms
machine learning
LSTM
adversarial samples
Human behavior
genetic algorithms
genetic algorithm
Detectors
DDoS detector
DDoS attack detection
Computer crime
composability
biblio
Reversible Database Watermarking Based on Random Forest and Genetic Algorithm
Submitted by grigby1 on Tue, 08/31/2021 - 11:07am
Prediction algorithms
Watermarking
usability
Robustness
reversible watermarking
Resiliency
resilience
relational database security
Random Forest
pubcrawl
composability
Metrics
Human behavior
Histograms
Histogram Shifting
genetic algorithms
genetic algorithm
distortion
copyright protection
1
2
3
4
5
next ›
last »