Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
detection rate
biblio
Analysis of Data Transforming Technology for Malware Detection
Submitted by grigby1 on Mon, 02/07/2022 - 4:45pm
malware
malicious script
GBM
detection rate
data conversion
Malware Analysis
learning (artificial intelligence)
software engineering
Training data
privacy
Resiliency
resilience
Metrics
Human behavior
pubcrawl
machine learning
deep learning
biblio
Test Method for Automatic Detection Capability of Civil Aviation Security Equipment Using Bayesian Estimation
Submitted by aekwall on Tue, 04/27/2021 - 1:10pm
Safety
false alarm rate
security
Bayes methods
cyber-physical systems
Resiliency
pubcrawl
detection rate
information technology
Markov processes
estimation
Monte Carlo methods
belief networks
Bayesian estimation
civil aviation security equipment
prohibited items
biblio
Data-driven Stealthy Actuator Attack against Cyber-Physical Systems
Submitted by aekwall on Mon, 01/25/2021 - 12:54pm
actuators
stealthy attack
data-driven stealthy actuator attack
Data-Driven
cyber-physical system security
convex optimization problem
attack signal
arbitrary detectors
Technological innovation
Covariance matrices
convex programming
actuator security
computer network security
Metrics
detection rate
composability
pubcrawl
Human behavior
Resiliency
Electronic mail
cyber-physical systems
security
Detectors
biblio
Effective and Fast DeepFake Detection Method Based on Haar Wavelet Transform
Submitted by grigby1 on Fri, 01/15/2021 - 12:02pm
generated face
Blur inconsistency
blur inconsistency detection scheme
DeepFake detection method
DeepFake generation algorithms
DeepFake videos
distortion
exclusive blur inconsistency
face images
face region
fake face
DeepFake
Generative Adversarial Networks GANs
Haar transforms
Haar wavelet
Haar wavelet transform
high-quality fake videos
realistic manner
source video
surrounding context
Wavelet domain
Gallium nitride
Human behavior
Human Factors
Metrics
Resiliency
Scalability
neural nets
resilience
face recognition
feature extraction
pubcrawl
Image edge detection
gan
object detection
generative adversarial networks
Face
Videos
wavelet transforms
video signal processing
detection rate
biblio
Efficient Network Intrusion Detection Using PCA-Based Dimensionality Reduction of Features
Submitted by grigby1 on Tue, 12/01/2020 - 1:47pm
network traffic
learning (artificial intelligence)
low-dimensional features
machine learning
Measurement
minority class instances
multiclass classification show
multiclass combined performance metric
network intrusion detection system
IP networks
PCA
PCA-based dimensionality reduction
principal component analysis
pubcrawl
resilience
Resiliency
security of data
Support vector machines
feature dimensionality reduction approach
Bayesian network
belief networks
binary classification
CICIDS2017 network intrusion dataset
class distribution parameters
composability
detection rate
dimensionality reduction
Bayes methods
feature extraction
high-dimensional features
IDS
imbalanced class distributions
imbalanced data
imbalanced distribution
intrusion detection system
biblio
Wormhole attack detection in ad hoc network using machine learning technique
Submitted by aekwall on Mon, 08/03/2020 - 10:19am
machine learning algorithms
wormhole attack detection
wormhole attack
Training
telecommunication security
Task Analysis
stochastic gradient descent
security
Resiliency
Peer-to-peer computing
Naive Bayes
multiple wormhole tunnels
Metrics
machine learning technique
pubcrawl
machine learning
learning (artificial intelligence)
final task
Feature Selection
false alarm rate
detection rate
data generation
data collection operation
Compositionality
Ad hoc networks
Ad Hoc Network Security
ad hoc network environment
ad hoc network
biblio
Machine Learning Based Intrusion Detection System
Submitted by aekwall on Mon, 01/20/2020 - 11:55am
malicious activity
well-organized classification methodology
Training
Support vector machines
Support Vector Machine Naive Bayes
support vector machine
statistical methodologies
security of data
Resiliency
pubcrawl
Predictive Metrics
pattern classification
NSL- KDD knowledge discovery dataset
network traffic data
Naive Bayes
Market research
Bayes methods
machine learning based intrusion detection system
machine learning
learning (artificial intelligence)
Intrusion Detection Systems
Intrusion Detection
Informatics
false alarms
distrustful activity
detection rate
Data mining
Conferences
computer network security
composability
Comparative Analysis
biblio
Comparing the Performance of Adaptive Boosted Classifiers in Anomaly based Intrusion Detection System for Networks
Submitted by aekwall on Mon, 01/20/2020 - 11:55am
intrusion detection Kaggle dataset
Training
tools
Resiliency
Random Tree
pubcrawl
pattern classification
network intrusion detection
network based intrusion detection
naïve Bayes classifier
Metrics
lengthy detection process
learning (artificial intelligence)
Intrusion Detection Systems
intrusion detection system
adaptive boosted classifiers
Intrusion Detection
hybrid anomaly based intrusion detection system
discretization
detection rate
Decision trees
Data mining
Correlation based feature weighted Naïve Bayes
Correlation
computer network security
composability
boosting techniques
boosting process
boosting
biblio
Secure APIT Localization Scheme Against Sybil Attacks in Distributed Wireless Sensor Networks
Submitted by aekwall on Mon, 02/18/2019 - 12:58pm
lightweight sybilfree-APIT algorithm
Metrics
wireless localization schemes
wireless devices
Wireless communication
SF-APIT scheme
SF-APIT
sensor placement
sensor nodes
secure APIT localization scheme
RSSI
received signal strength
range-free method
location-aware applications
localization
telecommunication security
hostile WSN
distributed WSNs
distributed WSN
distributed wireless sensor networks
detection rate
Cryptography
Communication system security
antennas
Peer-to-peer computing
sybil attacks
Global Positioning System
wireless sensor networks
composability
pubcrawl
biblio
RansomWall: A layered defense system against cryptographic ransomware attacks using machine learning
Submitted by aekwall on Wed, 01/16/2019 - 2:08pm
Metrics
zero-day intrusions
worldwide cybersecurity attacks
Windows Operating System Security
user files hostage
trees (mathematics)
suspicious ransomware behavior
strong trap layer
specific behavioral patterns
Servers
security of data
Resiliency
RansomWall tag
pubcrawl
operating systems (computers)
Microsoft Windows operating system
attacked OS
malware
machine learning algorithms
learning (artificial intelligence)
layered defense system
invasive software
initial layers
gradient tree boosting algorithm
Engines
encryption
detection rate
Cryptography
cryptographic ransomware families
cryptographic ransomware attacks
Computer crime
composability
1
2
next ›
last »