Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
classifiers
biblio
An Optimization driven – Deep Belief Neural Network Model for Prediction of Employment Status after Graduation
Submitted by grigby1 on Fri, 03/31/2023 - 8:27am
belief networks
Training
Predictive models
Neural networks
pubcrawl
Metrics
Data models
Industries
Performance Metrics
Measurement
Employment
classifiers
Chimp Optimization
Deep Belief Neural Network
Employability
biblio
A Fog-Augmented Machine Learning based SMS Spam Detection and Classification System
Submitted by aekwall on Mon, 11/08/2021 - 3:24pm
Support vector machines
Training
edge computing
Fog computing
Servers
feature extraction
machine learning
pubcrawl
privacy
Mobile handsets
classifiers
Cloud Computing
smart cities
SMS Spam
threat vectors
Measurement
biblio
Detection of XSS in web applications using Machine Learning Classifiers
Submitted by grigby1 on Wed, 02/10/2021 - 1:21pm
Web pages
Cross Site Scripting
random forests
cross-site scripting attack
classifiers
Classified Algorithms
cross-site scripting
Vegetation
Uniform resource locators
feature extraction
JavaScript
malware
Scalability
Resiliency
resilience
Human behavior
pubcrawl
machine learning
biblio
Utilizing Netflow Data to Detect Slow Read Attacks
Submitted by aekwall on Mon, 11/09/2020 - 1:14pm
machine learners
application layer DDoS attacks
application servers
classifiers
IP Flow Information Export standard
IPFIX
IPFIX standard
legitimate network requests
low volume attack methods
open systems
NetFlow
Netflow data
network security solutions
SiLK
Slow Read
slow read attack detection models
slow read DDoS attacks
Information Reuse and Security
pubcrawl
Computer crime
computer network security
false alarm rate
IP networks
Protocols
invasive software
learning (artificial intelligence)
Resiliency
distributed denial of service
internet
tools
computer networks
file servers
Web servers
Compositionality
malware
memory resources
biblio
Enhanced TCP Sequence Number Steganography Using Dynamic Identifier
Submitted by grigby1 on Mon, 02/10/2020 - 11:42am
classifiers
composability
ISN
Metrics
network steganography
Packets
privacy
pubcrawl
Steganography
steganography detection
transmission control protocol
biblio
Detection of SQL Injection Attacks: A Machine Learning Approach
Submitted by grigby1 on Mon, 02/10/2020 - 11:25am
classifiers
collaboration
Database application
Database Security
Human behavior
machine learning
Metrics
policy-based governance
privacy
pubcrawl
resilience
Resiliency
SQL detection
SQL injection
biblio
Fuzzy Rough Set Feature Selection to Enhance Phishing Attack Detection
Submitted by grigby1 on Tue, 11/26/2019 - 3:47pm
random forests
pattern classification
personal information
Phishing
phishing attack detection
Phishing Detection
phishing Web sites
pubcrawl
random forest classification
machine learning-based strategies
rough set theory
Rough sets
Training
Uniform resource locators
universal feature set
Web pages
Web sites
Fuzzy Rough Set
Computer crime
confidential information
cybercrime activities
definitive features
Electronic mail
feature extraction
Feature Selection
FRS feature selection
classifiers
fuzzy rough set feature selection
fuzzy rough set theory
fuzzy set theory
generalizable phishing detection
Human behavior
human factor
legitimate Web site
biblio
Automated Generation and Selection of Interpretable Features for Enterprise Security
Submitted by grigby1 on Fri, 03/22/2019 - 1:00pm
machine learning method
Training data
security of data
security
Scalability
Resiliency
resilience
pubcrawl
pattern clustering
Metrics
malware
malicious activity detection
big data security
learning (artificial intelligence)
Fourier transforms
fourier analysis
feature extraction
enterprise security logs
DNF formulas
cyber security
Clustering algorithms
classifiers
Boolean functions
file
Physical Adversarial Examples for Image Classifiers and Object Detectors
Submitted by akarns on Thu, 09/27/2018 - 9:35am. Contributor:
Ivan Evtimov
BIO
Adversarial Machine Learning
object detection
road signs
classifiers
adversarial examples
Posters
Poster
biblio
Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark
Submitted by grigby1 on Wed, 09/12/2018 - 11:15am
security of data
Naive Bayes
network traffic
pattern classification
privacy
pubcrawl
public dataset
Relays
security
machine learning
sole statistical features
specific anonymity tool
statistical analysis
telecommunication traffic
tools
Tor
Traffic classification
users privacy
dark web
anonymity services
Bandwidth
Bayes methods
Bayesian network
belief networks
classifiers
communication content
Cryptography
anonymity
data privacy
encryption
Human behavior
Human Factors
I2P
internet
JonDonym
learning (artificial intelligence)
1
2
next ›
last »