Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
gaussian distribution
biblio
Analysis of Intrusion Detection Performance by Smoothing Factor of Gaussian NB Model Using Modified NSL-KDD Dataset
Submitted by grigby1 on Fri, 01/13/2023 - 12:51pm
Shape
zero-day detection
smoothing
Gaussian NB
smoothing methods
Security by Default
NSL-KDD
network intrusion detection
gaussian distribution
Support vector machines
Intrusion Detection
Scalability
Analytical models
Radio frequency
Resiliency
resilience
pubcrawl
biblio
Quantum attack-resistant signature scheme from lattice cryptography for WFH
Submitted by grigby1 on Tue, 04/26/2022 - 2:50pm
Cryptography
digital signatures
gaussian distribution
identity-based signature
lattice
Lattices
pubcrawl
Quantum attack-resistant
quantum computing
reject sampling
resilience
Resiliency
Resistance
Resists
Scalability
biblio
API Security in Large Enterprises: Leveraging Machine Learning for Anomaly Detection
Submitted by grigby1 on Mon, 12/20/2021 - 11:30am
machine learning
Training
support vector machine (SVM)
support vector machine classification
security
Resiliency
resilience
Reliability
pubcrawl
Micro-service
Anomalies
gaussian distribution
feature extraction
Compositionality
composability
Application Programming Interface (API)
application program interfaces
Application program interface
APIs
API
biblio
An Anti-Quantum Signature Scheme over Ideal Lattice in Blockchain
Submitted by aekwall on Mon, 11/29/2021 - 2:29pm
security
blockchain
Resists
encryption
pubcrawl
composability
Elliptic curve cryptography
standards
Compositionality
anti-quantum
bonsai trees
gaussian distribution
ideal lattice
Lattices
theoretical cryptography
biblio
Evaluating the Soundness of Security Metrics from Vulnerability Scoring Frameworks
Submitted by grigby1 on Tue, 04/27/2021 - 3:59pm
Conferences
Decision Making
gaussian distribution
Guidelines
Measurement
Metrics
privacy
pubcrawl
security
security metric
Security Metrics
sound metric
system security
vulnerability scoring
biblio
GeoDA: A Geometric Framework for Black-Box Adversarial Attacks
Submitted by aekwall on Tue, 03/09/2021 - 12:05pm
image classification
Robustness
Resiliency
query processing
queries
pubcrawl
Perturbation methods
pattern classification
optimisation
Neural networks
natural image classifiers
minimal perturbation
Metrics
Measurement
mean curvature
Iterative methods
adversarial examples
geometric framework
gaussian distribution
estimation
effective iterative algorithm
Deep Networks
decision boundary
data samples
Covariance matrices
composability
carefully perturbed images
black-box settings
black-box perturbations
black-box attack algorithm
black-box adversarial attacks
black box encryption
biblio
The Software for Authorship and Style Attribution
Submitted by grigby1 on Fri, 08/28/2020 - 12:22pm
programming languages
Vocabulary
transcription variants
transcription symbols
text transforming
text analysis
style attribution
statistical analysis
Software
pubcrawl
attribution
phonostatistical structure
Metrics
Java programming language
Java
information science
Human behavior
gaussian distribution
composability
authorship attribution
biblio
Denial of Service Detection Mitigation Scheme using Responsive Autonomic Virtual Networks (RAvN)
Submitted by aekwall on Mon, 08/24/2020 - 12:47pm
mitigation scheme
anomalous mitigation solutions
anomaly detection schemes
Centroid-based-based clustering technique
data features
decision making skills
high rate denial of service attacks
high rate DoS attacks
intragroup variance
Kmeans
low rate detection
adaptive reconfigurable features
multivariate clustering method
multivariate gaussian distribution model
network performance statistics
ONOS SDN controller
open networking operating system
RAvN
responsive autonomic data-driven adaptive virtual networking framework
traffic monitoring tools
unsupervised machine learning technique
Autonomic Security
pubcrawl
computer network security
Monitoring
IP networks
telecommunication traffic
virtualisation
software defined networking
feature extraction
learning (artificial intelligence)
machine learning
Resiliency
security of data
composability
Decision Making
network traffic
gaussian distribution
pattern clustering
Software-Defined Networks
Unsupervised Learning
adaptive systems
network configurations
adaptive policy updates
biblio
A New Spatial Steganographic Scheme by Modeling Image Residuals with Multivariate Gaussian Model
Submitted by aekwall on Mon, 08/03/2020 - 10:29am
Steganography
adaptive filtering
steganographic methods
steganalysis
spatial steganographic scheme
spatial images
quantized multivariate Gaussian distribution
multivariate Gaussian model
image residuals modeling
high-pass filters
high-pass filtering
content-adaptive image steganographic schemes
approximated Fisher Information
Scalability
image filtering
Payloads
information processing
Media
gaussian distribution
Image coding
Metrics
Computational modeling
pubcrawl
Resiliency
feature extraction
security
biblio
Anomaly Detection in Network Traffic Using Dynamic Graph Mining with a Sparse Autoencoder
Submitted by grigby1 on Fri, 07/03/2020 - 4:54pm
outlier error values
highly structured adjacency matrix structures
increasing sparseness
learning (artificial intelligence)
Matrix decomposition
Metrics
network based attacks
network emulator
network security
network traffic
online learning algorithm
original adjacency matrix
Heuristic algorithms
pubcrawl
representative ecommerce traffic
Resiliency
resultant adjacency matrix
serious economic consequences
singular value decomposition
sparse autoencoder
Sparse matrices
telecommunication traffic
time 225.0 min
decomposition
autoencoder hyper-parameters
Bipartite graph
composability
Compositionality
Computer crime
computer network security
contiguous time intervals
cyber physical systems
Data mining
DDoS Attacks
anomaly detection algorithm
dynamic bipartite graph increments
dynamic graph
dynamic graph mining
dynamic network traffic
Dynamic Networks and Security
ecommerce websites
error distribution
GAAD
gaussian distribution
graph theory
1
2
3
next ›
last »