Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
MLP
biblio
On the Performance of Isolation Forest and Multi Layer Perceptron for Anomaly Detection in Industrial Control Systems Networks
Submitted by grigby1 on Fri, 09/30/2022 - 7:44am
ICs
reconnaissance attack
iForest
Resiliency
ICS Anomaly Detection
deep neural networks
MLP
SCADA
integrated circuits
deep learning
industrial control
Scalability
resilience
pubcrawl
Intrusion Detection
Neural networks
Forestry
machine learning algorithms
biblio
Efficient Detection Of SQL Injection Attack(SQLIA) Using Pattern-based Neural Network Model
Submitted by aekwall on Tue, 04/19/2022 - 10:20am
security
Computational modeling
Resiliency
composability
Payloads
Phishing
pubcrawl
SQL injection
cyber attack
MLP
parsing
SQLIA
Structured Query Language
Tagged Patterns
tagging
Cross Layer Security
biblio
Deep Learning Enabled Intrusion Detection and Prevention System over SDN Networks
Submitted by grigby1 on Tue, 03/09/2021 - 1:38pm
SAE
malicious packets
MLP
Multilayer Perceptron
multilayer perceptrons
network configuration
packet length
Payloads
policy-based governance
prevention system
pubcrawl
machine learning
SDN networks
SDN switch
secure shell brute-force attacks
Software Defined Network
software defined networking
Software Defined Networks
SSH Brute-force
SSH brute-force attack
stacked auto-encoder
Switches
deep learning models
brute force attacks
centralized management approach
Computer crime
computer network security
convolutional neural nets
convolutional neural network
data planes
DDoS Attack
DDoS Attacks
deep learning
anomalous packets
denial-of-service attacks
DL-IDPS
Force
Human behavior
Human Factors
Intrusion Detection
learning (artificial intelligence)
Long short-term memory
LSTM
biblio
SSH and FTP brute-force Attacks Detection in Computer Networks: LSTM and Machine Learning Approaches
Submitted by grigby1 on Tue, 03/09/2021 - 1:36pm
learning (artificial intelligence)
telecommunication traffic
SSH
pubcrawl
policy-based governance
pattern classification
password
network traffic anomaly detection
network security
MLP
machine learning classifiers
machine learning approaches
machine learning algorithms
machine learning
LSTM
long short-term memory deep learning approach
Anomaly Detection
Intrusion Detection
internet
Human Factors
Human behavior
high-level attacks
FTP
dictionary-based brute-force attacks
Dictionaries
deep learning.
deep learning
computer network security
Computer Network Attacks
brute-force
brute force attacks
biblio
A Multilayer Perceptron-Based Distributed Intrusion Detection System for Internet of Vehicles
Submitted by grigby1 on Mon, 11/02/2020 - 11:09am
MultiLayer Perceptron neural network
wireless sensor networks
vehicular ad hoc networks
Vehicle to Vehicle communication
VANET
V2V communication
telecommunication security
telecommunication computing
sensors
security attacks
Roads
Resiliency
resilience
pubcrawl
multilayer perceptrons
Accidents
Multilayer Perceptron
MLP
Metrics
IoV network
Intrusion Detection
Internet of vehicles network
Internet of Vehicles (IoV)
Internet of Vehicles
Human Factors
embedded systems
distributed processing
distributed intrusion detection system
Ad hoc networks
biblio
CEPHEID: the infrastructure-less indoor localization using lighting fixtures' acoustic frequency fingerprints
Submitted by aekwall on Mon, 08/03/2020 - 9:16am
CEPHEID scheme
Acoustic Fingerprints
self localization
MLP
infrastructure-less indoor localization
indoor positioning experiments
Indoor Positioning
indoor localization scheme
environmental fingerprint
DNN classifier
discrete electronic components
Computer peripherals
CHEPEID
characteristic flickering pattern
Resiliency
ceiling lighting fixtures
indoor radio
lighting
Discrete Fourier transforms
light emitting diodes
DNN
estimation
Cameras
Mathematical model
wireless sensor networks
composability
pubcrawl
Human behavior
biblio
Spam Review Detection Using Deep Learning
Submitted by grigby1 on Mon, 02/10/2020 - 10:18am
CNN
deep learning
Human behavior
Human Factors
LSTM
Metrics
MLP
pubcrawl
RNN
Scalability
spam
spam detection
Spam review detection
spam reviews
biblio
Analyst Intuition Inspired High Velocity Big Data Analysis Using PCA Ranked Fuzzy K-Means Clustering with Multi-Layer Perceptron (MLP) to Obviate Cyber Security Risk
Submitted by grigby1 on Wed, 11/14/2018 - 12:21pm
pattern classification
learning (artificial intelligence)
log history annotation
malware
malware attacks
manually labelled data
MLP
Monitoring
Multi-layer Perceptron (MLP)
multilayer perceptrons
network datasets
network protocols
network user
neural network classifier multilayer perceptron base
IP networks
pattern clustering
PCA ranked fuzzy k-means clustering
principal component analysis
Principal Component Analysis (PCA)
pubcrawl
resilience
Resiliency
Scalability
scoring system
security
special semisupervise method
statistical data generation
Virus
cyber threats
analyst intuition inspired high velocity big data analysis
Artificial Intelligence
attacker IP addresses characteristics
Big Data
Clustering algorithms
computer networks
computer network security
computer security
cyber-attacks
cyber security
cyber security expert
cyber security log classification
cyber security risk
Analyst Intuition
data analysis
Data mining
efficient security monitoring system
Expectation Regulated
expert system
expert systems
Fuzzy k-means (FKM)
fuzzy set theory
High Velocity
Human behavior
integrated datasets
invasive software
biblio
An assessment of vulnerability of hardware neural networks to dynamic voltage and temperature variations
Submitted by grigby1 on Thu, 06/07/2018 - 2:06pm
natural language processing
timing
temperature variations
Speech recognition
Resiliency
resilience
pubcrawl
problem solving
Neural Network Resilience
neural network algorithms
neural nets
adders
multilayer perceptrons
MLP
medical applications
Logic gates
learning (artificial intelligence)
hardware neural networks
Hardware
dynamic voltage
CNN
Biological neural networks
biblio
Semantification of Identifiers in Mathematics for Better Math Information Retrieval
Submitted by grigby1 on Tue, 03/07/2017 - 12:13pm
definitions
identifiers
mathematical information retrieval
mathematical knowledge management
mathematical language processing
Mathematics
mathoid
mathosphere
MIR
MLP
namespace discovery
pubcrawl170201
wikipedia