Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Random Forest
biblio
Fraud Detection using Machine Learning and Deep Learning
Submitted by aekwall on Mon, 08/24/2020 - 1:37pm
credit card
Europe
Forestry
Credit cards
area under the ROC curve
Australian dataset
autoencoder
benchmark multiple machine learning methods
Boltzmann machines
cost of failure
financial data processing
data mining techniques
Deep belief networks
EU
European dataset
German dataset
k nearest neighbor
Matthews correlation coefficient
restricted boltzmann machine
security checks
pattern classification
Support vector machines
support vector machine
learning (artificial intelligence)
machine learning
Random Forest
Resiliency
pubcrawl
composability
deep learning
Data models
convolutional neural nets
deep learning methods
Data mining
convolutional neural networks
Artificial Neural Networks
belief networks
fraud
fraud detection
biblio
Predicting and Preventing Malware in Machine Learning Model
Submitted by grigby1 on Thu, 07/09/2020 - 1:57pm
Random Forest
machine learning model
malware prediction
malware prevention
pattern classification
Predictive models
privacy
privacy preserving technique
pubcrawl
machine learning algorithms
random forests
resilience
Resiliency
Scalability
security
support vector machine
Support vector machines
Training
Decision Tree
Algorithm robustness enhancement
Causative attack
Classification algorithms
Compositionality
data deletion
Data models
data privacy
Data Sanitization
AdaBoost
Decision trees
exploratory attack
Human behavior
Human Factors
invasive software
K-nearest-neighbors classifier
KNN classifier
machine learning
biblio
PMU Based Data Driven Approach For Online Dynamic Security Assessment in Power Systems
Submitted by grigby1 on Fri, 06/26/2020 - 1:17pm
real time synchronized measurements
power engineering computing
power system
power system control
Power system dynamics
power system security
power system stability
power system transient stability
pubcrawl
Random Forest
PMU based data driven approach
real-time systems
security
synchronized phasor measurements
system control
system operator
system pertaining
transient instability
wide-area dynamic security assessment
Decision Tree
Intelligent Data Security
Compositionality
Resiliency
Scalability
composability
cyber-physical systems
Data mining
data mining model
Data models
Intelligent Data and Security
Dynamic security assessment
IEEE 39 bus system
intelligent framework based approach
measurement data
Metrics
online dynamic security assessment
phasor measurement
Phasor measurement units
biblio
A Differential Privacy Random Forest Method of Privacy Protection in Cloud
Submitted by aekwall on Mon, 06/22/2020 - 11:19am
Decision trees
random forest classification algorithm
random forest algorithm
hybrid decision tree algorithm
high privacy protection
high classification performance
differential privacy random forest method
differential privacy protection
Forestry
classification accuracy
privacy protection
differential privacy
Cloud Computing
Prediction algorithms
pattern classification
privacy
composability
pubcrawl
Human behavior
Resiliency
Random Forest
Classification algorithms
data privacy
Scalability
biblio
HealthGuard: A Machine Learning-Based Security Framework for Smart Healthcare Systems
Submitted by grigby1 on Fri, 04/10/2020 - 12:53pm
nearest neighbour methods
healthguard
implantable medical devices
Internet-of-Things
k-nearest neighbor
machine learning-based detection techniques
machine learning-based security framework
malicious activities detection
malicious threats
medical emergency
Healthcare
patient monitoring
pervasive computing
Random Forest
SHS
Smart Healthcare System
smart healthcare systems
smart medical devices
Pervasive Computing Security
Human Factors
resilience
security
computer network security
Scalability
internet
health care
medical information systems
pubcrawl
Metrics
Resiliency
Internet of Things
Human behavior
random forests
neural nets
Anomaly Detection
artificial neural network
critical medical conditions
Decision Tree
Decision trees
diseases
biblio
DDoS Attack Mitigation through Root-DNS Server: A Case Study
Submitted by grigby1 on Fri, 04/03/2020 - 12:19pm
Predictive models
true positive rate metric
traffic routing algorithms
telecommunication traffic
Support vector machines
Servers
Routing protocols
root-DNS server
root dns
RIPE Atlas
resource allocation
Random Forest
quality of service
pubcrawl
Probes
predictive security metrics
anycast
Metrics
machine learning
logistic regression
Load management
load balancing
k-nearest neighbors
IP networks
IP anycast
high availability
domain name system
DDoS attack mitigation
DDoS
cyber security
computer network security
Computer crime
biblio
Analysis of Machine Learning Techniques for Ransomware Detection
Submitted by aekwall on Mon, 03/23/2020 - 1:25pm
malware detection
Resiliency
ransomware families
Ransomware
Random Forest
Scalability
pubcrawl
policy-based governance
pattern classification
Metrics
CICAndMal2017 dataset
machine learning-based ransomware detection
machine learning
learning (artificial intelligence)
invasive software
Human behavior
cryptology
computer networks
composability
classification methods
biblio
Ransomware detection using process mining and classification algorithms
Submitted by aekwall on Mon, 03/23/2020 - 1:25pm
pattern classification
Resiliency
ransomware detection
ransomware attacks
Ransomware
random forest algorithms
Random Forest
Scalability
pubcrawl
policy-based governance
process model
process mining methods
process mining
Classification algorithms
Metrics
J48
invasive software
Internet users
internet
Human behavior
feature extraction
detection ransomwares
Data mining
cryptology
computing power
composability
biblio
DDoS Attacks Detection and Mitigation in SDN Using Machine Learning
Submitted by grigby1 on Wed, 02/26/2020 - 4:42pm
network topology
WEKA
threat vectors
Support vector machines
support vector machine
software defined networking
security threat protection
SDN network
SDN
random forests
Random Forest
pubcrawl
privacy
Computer crime
nearest neighbour methods
Metrics
Measurement
machine learning
k-nearest neighbors
J48
Floods
distributed denial-of-service attack
DDoS attack detection
DDoS
control systems
computer network security
biblio
Hardware Trojan Insertion and Detection in Asynchronous Circuits
Submitted by grigby1 on Wed, 02/26/2020 - 4:38pm
neural network
Trojan horses
trojan horse detection
Trojan detection methods
synchronous hardware Trojan
supply chain security
Routing
Resiliency
resilience
Random Forest
pubcrawl
Pipelines
asynchronous circuit
logic design
Latches
hardware Trojan threats
hardware Trojan insertion
hardware trojan
Hardware
delays
deep learning
cyber physical systems
asynchronous hardware Trojan circuits
asynchronous circuits
« first
‹ previous
1
2
3
4
5
6
next ›
last »