Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Random Forest
biblio
Blockchain Based DDoS Mitigation Using Machine Learning Techniques
Submitted by grigby1 on Tue, 09/07/2021 - 2:22pm
KNN (K-Nearest Neighbors) Algorithm
Servers
Resiliency
resilience
Random Forest
pubcrawl
Peer-to-peer computing
Metrics
machine learning (ML)
machine learning
blockchain
IP networks
Human behavior
feature extraction
Decision Tree
DDOS attacks detection
DDoS attack mitigation
DDoS (Distributed Daniel of Service)
Computer crime
composability
biblio
Reversible Database Watermarking Based on Random Forest and Genetic Algorithm
Submitted by grigby1 on Tue, 08/31/2021 - 10:07am
Prediction algorithms
Watermarking
usability
Robustness
reversible watermarking
Resiliency
resilience
relational database security
Random Forest
pubcrawl
composability
Metrics
Human behavior
Histograms
Histogram Shifting
genetic algorithms
genetic algorithm
distortion
copyright protection
biblio
Anomaly Detection with Autoencoder and Random Forest
Submitted by grigby1 on Tue, 03/30/2021 - 10:51am
Anomaly Detection
autoencoder
Computational modeling
Credit cards
deep learning
feature extraction
ICS Anomaly Detection
pubcrawl
Radio frequency
Random Forest
random forests
resilience
Resiliency
Scalability
tuning
biblio
Robust Early Stage Botnet Detection using Machine Learning
Submitted by grigby1 on Tue, 03/09/2021 - 1:22pm
pubcrawl
invasive software
learning (artificial intelligence)
machine learning classifiers
malware
Metrics
PCA
principal component analysis
Protocols
identity theft
Random Forest
resilience
Resiliency
robust early stage botnet detection
security of data
Servers
Support vector machines
telecommunication security
cyberattacks
Botnet detection
botnet detection techniques
botnets
click fraud
Command and Control Channel (C&C)
composability
Computer crime
computer network security
botnet
Cybersecurity
DDoS
early-stage botnet detection
efficient detection rate
feature extraction
feature selection techniques
fraud
biblio
DDoS Attacks Detection by Using Machine Learning Methods on Online Systems
Submitted by grigby1 on Tue, 02/16/2021 - 11:59am
DDOS attacks detection
Handheld computers
denial-of-service attack
distributed denial of service attacks
multilayer perceptrons
Cyber Attacks
hypermedia
DDoS attack detection
C-support vector machine
Global Positioning System
detection accuracy rates
Hafnium compounds
HTTP flood
hypertext transfer protocol
k-nearest neighbor
multi layer perceptron
online systems
TCP SYN flood
computer network security
machine learning
cyber security
Intrusion Detection
pubcrawl
Human behavior
Metrics
resilience
Resiliency
learning (artificial intelligence)
Topology
random forests
Support vector machines
Computer crime
composability
nearest neighbour methods
DDoS
Random Forest
biblio
Detection of DDoS Attack and Classification Using a Hybrid Approach
Submitted by grigby1 on Tue, 02/16/2021 - 11:58am
hybrid feature selection method
Classifiers.
cross-validation
DDoS category
DDoS detection
DDoS detection rate
decision table
discretize dataset
Feature Selection
Bayes Net classifiers
J48 classifier
KDD DDoS dataset
Naive Bayes Classifiers
naive Bayes methods
NSL DDoS dataset
NSL KDD dataset
selected DDoS packets
weka tool
computer network security
security of data
Cloud Computing
machine learning
pubcrawl
Human behavior
Metrics
resilience
Resiliency
learning (artificial intelligence)
random forests
composability
pattern classification
Random Forest
Cloud Security
machine learning classifiers
DDoS Attack
DDoS attack detection
biblio
DeCrypto Pro: Deep Learning Based Cryptomining Malware Detection Using Performance Counters
Submitted by grigby1 on Fri, 01/22/2021 - 1:38pm
DeCrypto Pro
LSTM
defense mechanisms
advanced persistent threats
antivirus applications
APTs
behavior profiling
benign compression
classification model
collaborative attacks
computational resources
cryptographic operations
cryptojacking
cryptomining
Long short-term memory
DeCrypto Profiler framework
deep cryptomining profiler
mission-critical cybersystems
model selection
operating context profiling system
performance counters
Ransomware
system features
system functionalities
Trojan Laziok
utility function
Windows performance counters
cyberattacks
Predictive models
machine learning
Data mining
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Data models
Computational modeling
random forests
recurrent neural nets
Cryptography
deep learning
pattern classification
malware
invasive software
malware detection
nearest neighbour methods
k-nearest neighbors
Random Forest
advanced persistent threat
APT
deep neural networks
encoding
biblio
Malware Classification Using Machine Learning Algorithms and Tools
Submitted by grigby1 on Thu, 10/29/2020 - 10:10am
malware
tools
Support vector machines
Resiliency
resilience
Random Forest
pubcrawl
privacy
pattern classification
Metrics
matrix algebra
malware samples
malware classification
Classification algorithms
machine learning algorithms
machine learning
learning (artificial intelligence)
invasive software
Human behavior
feature extraction
family classification
emerging malwares
confusion matrix
comparative classification
comparable features
Cohen's Kappa
biblio
Classification of XSS Attacks by Machine Learning with Frequency of Appearance and Co-occurrence
Submitted by aekwall on Mon, 09/28/2020 - 11:35am
pattern classification
XSS attack scripts
Word2Vec
vectorization
Uniform resource locators
Training
SVM
Support vector machines
SCW
Scalability
Resiliency
Random Forest
Radio frequency
pubcrawl
preprocessing method
Phishing
attack detection filter
machine learning algorithms
machine learning
learning (artificial intelligence)
Kernel
internet
information collection
hypermedia markup languages
Human behavior
HTTP cookies
fake HTML input form
dummy sites
Cross Site Scripting
cross site
Computer crime
biblio
Suspicious Network Event Recognition Using Modified Stacking Ensemble Machine Learning
Submitted by grigby1 on Fri, 08/28/2020 - 2:34pm
extremely randomised trees
artificial intelligence-oriented automatic services
big-data analytics
cyber-threats
Data preprocessing
data science
Ensemble Learning
ensemble learning.
exploratory data analysis
AdaBoost
feature creation
modified stacking ensemble machine learning
Network Event Log Analytics
network intrusions
network traffic alerts
suspicious network event recognition dataset
suspicious network events
big data security in the cloud
neural nets
machine learning
data analysis
pubcrawl
Resiliency
Conferences
random forests
Big Data
pattern classification
security of data
Neural networks
Metrics
Random Forest
resilience
Scalability
Feature Selection
2019 IEEE BigData Cup Challenge
« first
‹ previous
1
2
3
4
5
6
next ›
last »