Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
classification model
biblio
DeCrypto Pro: Deep Learning Based Cryptomining Malware Detection Using Performance Counters
Submitted by grigby1 on Fri, 01/22/2021 - 1:38pm
DeCrypto Pro
LSTM
defense mechanisms
advanced persistent threats
antivirus applications
APTs
behavior profiling
benign compression
classification model
collaborative attacks
computational resources
cryptographic operations
cryptojacking
cryptomining
Long short-term memory
DeCrypto Profiler framework
deep cryptomining profiler
mission-critical cybersystems
model selection
operating context profiling system
performance counters
Ransomware
system features
system functionalities
Trojan Laziok
utility function
Windows performance counters
cyberattacks
Predictive models
machine learning
Data mining
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Data models
Computational modeling
random forests
recurrent neural nets
Cryptography
deep learning
pattern classification
malware
invasive software
malware detection
nearest neighbour methods
k-nearest neighbors
Random Forest
advanced persistent threat
APT
deep neural networks
encoding
biblio
Evaluating Features Selection on NSL-KDD Data-Set to Train a Support Vector Machine-Based Intrusion Detection System
Submitted by aekwall on Mon, 01/27/2020 - 9:20am
Measurement
support vector machine-based intrusion detection system
support vector machine model
NSL-KDD data-set
global information security
economic repercussions
DoS attacks
digital industry
data set
classification model
big companies
aforementioned data-set
Denial of Service attacks
Predictive Metrics
security of data
Intrusion Detection
Companies
cyber-attacks
support vector machine
machine learning
composability
pubcrawl
Resiliency
Feature Selection
feature extraction
Support vector machines
Data models
Kernel
biblio
Intrusion Detection Model of SCADA Using Graphical Features
Submitted by aekwall on Mon, 12/02/2019 - 11:04am
information scanning
time series
command injection attacks
classification model
command injection
denial of service
graphic area features
graphical features
iec 60870-5-104
message transmission
intrusion detection experiment environment
intrusion detection model
Intrusion Detection System (IDS)
Law
response injection
supervisory control and data acquisition (SCADA)
supervisory control and data acquisition system
time series features
Metrics
Protocols
Industrial Control Systems
SCADA
SCADA systems
feature extraction
Resiliency
pubcrawl
composability
security of data
pattern classification
production engineering computing
Mathematical model
Intrusion Detection
data set
power systems
data visualisation
industrial control
biblio
Recognition of Human Computer Operations Based on Keystroke Sensing by Smartphone Microphone
Submitted by grigby1 on Mon, 01/21/2019 - 11:28am
human computer interaction
word recognition procedure
ubiquitous computing
smartphone sensing
smartphone microphone
smart phones
sensors
Semantics
semantic features
Resiliency
pubcrawl
microphones
keystroke sensing
Keyboards
human computer operation recognition
human computer operation
acoustic features
Human behavior
Games
fingerprint identification techniques
fingerprint identification
Feature fusion
feature extraction
determined keystrokes
Context-aware services
computer keyboard
composability
classification model
Activity Recognition
Acoustics
Acoustic Fingerprints
biblio
"An efficient classification model for detecting advanced persistent threat"
Submitted by abfox on Tue, 02/14/2017 - 10:44am
Intrusion Detection
Vegetation
Training
targeted attack
pubcrawl170101
pattern classification
Organizations
model
Mathematical model
malware
intrusion prevention systems
advanced persistent threat
international trade
government agencies
firewalls
feature extraction
Cyber Attacks
classification model
APTs
antivirus solutions
advanced persistent threat detection