Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
machine learning methods
biblio
A Malware Detection Method Based on Improved Fireworks Algorithm and Support Vector Machine
Submitted by aekwall on Mon, 12/14/2020 - 11:31am
Levy Flights
SVM
Support vector machines
support vector machine
signature-based anti-virus systems
Resiliency
pubcrawl
Predictive Metrics
penalty factor
pattern classification
particle swarm optimization
particle swarm optimisation
optimal parameter combination
Malware detection method
malware detection
machine learning methods
threat vectors
learning (artificial intelligence)
kernel function parameter
invasive software
improved fireworks algorithm
genetic algorithms
Fireworks algorithm
Evolutionary algorithms
differential evolution
Decision trees
computer systems
composability
classification performance
privacy
Measurement
biblio
Design-Based Fingerprinting Using Side-Channel Power Analysis for Protection Against IC Piracy
Submitted by grigby1 on Thu, 07/30/2020 - 1:06pm
machine learning methods
integrated circuit modelling
integrated circuit testing
integrated circuits
Inverters
ip protection
IP/IC providers
learning (artificial intelligence)
Logic gates
machine learning
Integrated circuit modeling
Metrics
minimal design variations
modified netlist
pubcrawl
resilience
side-channel power analysis
supply chains
Trojan horses
fingerprinting scheme
policy-based governance
composability
IP piracy
Benchmark testing
circuit CAD
Computer crime
Cryptography
design-based fingerprinting
Fingerprinting
Resiliency
gate-level netlist changes
Hardware
Human behavior
Human Factors
IC design flow
IC piracy
industrial property
integrated circuit design
biblio
Detection of Covert Timing Channels with Machine Learning Methods Using Different Window Sizes
Submitted by grigby1 on Thu, 07/16/2020 - 11:17am
machine learning methods
window sizes
Vectors
timing
telecommunication channels
TCPIP
Scalability
Resiliency
resilience
pubcrawl
Protocols
network steganography
composability
machine learning
Linux
learning (artificial intelligence)
information security
hidden data
feature extraction
data packets
covert timing channel
covert channels
computer network security
Compositionality
biblio
Research of Classical Machine Learning Methods and Deep Learning Models Effectiveness in Detecting Anomalies of Industrial Control System
Submitted by grigby1 on Mon, 06/10/2019 - 12:56pm
resilience
machine learning algorithms
machine learning methods
modern industrial control systems
neural nets
Neural networks
privacy
production engineering computing
pubcrawl
machine learning
Resiliency
security
security of data
signal correlations
Support vector machines
Tennessee Eastman process simulation data
Training
Anomaly Detection
linear algorithms
learning (artificial intelligence)
industrial process anomaly detection task
industrial control
ICS security
ICs
Feeds
deep learning models
deep learning
Decision trees
Data processing
Cyber Attacks
control engineering computing
composability
anomaly detection evaluation dataset
biblio
Low-Cost Breaking of a Unique Chinese Language CAPTCHA Using Curriculum Learning and Clustering
Submitted by aekwall on Mon, 04/01/2019 - 9:08am
security
learning (artificial intelligence)
low-cost breaking
machine learning methods
microsoft windows
natural language processing
OCR software
optical character recognition
pattern clustering
potential training methods
pubcrawl
Kernel
Task Analysis
text analysis
text distortion
text-based CAPTCHAs focus
Training
transcription tasks
unique Chinese language CAPTCHA
web services
Web sites
curriculum clustering
CAPTCHA
captchas
Chinese language question-and-answer Website
CNN
composability
convolution
convolutional neural network
convolutional neural networks
correct response
automated access
curriculum learning
feature map
feedforward neural nets
Human behavior
human user
image distortion
inverted character
inverted characters
inverted symbols
biblio
Detection of Spam E-mails with Machine Learning Methods
Submitted by aekwall on Mon, 02/25/2019 - 10:42am
naïve Bayes classifier
vector space model
Unsolicited electronic mail
unsolicited e-mail
spam filtering
spam e-mails
spam detection
security of data
Scalability
pubcrawl
Postal services
pattern classification
offensive content
Analytical models
Metrics
machine learning methods
machine learning
learning (artificial intelligence)
internet
Human behavior
Filtering
e-mail filtering
e-mail communication
content information
Bayes methods
biblio
Columbus: Filesystem Tree Introspection for Software Discovery
Submitted by grigby1 on Tue, 12/12/2017 - 12:19pm
Metadata Discovery Problem
tools
standards
software packaging knowledge
software packages
software management
software engineering
software discovery
Scalability
Resiliency
querying package management tools
pubcrawl
program diagnostics
problem diagnosis
Packaging
Operational analytics
agile development practices
metadata
meta data
machine learning methods
licensing requirement compliance
learning (artificial intelligence)
filesystem tree introspection
file metadata
feature extraction
drift detection situations
Docker Images
data structures
Compositionality
Columbus
Cloud Computing
cloud
biblio
Enhanced recognition of keystroke dynamics using Gaussian mixture models
Submitted by grigby1 on Wed, 03/08/2017 - 1:45pm
Gaussian mixture model
standards
pubcrawl170115
outlier detection
mixture models
machine learning methods
learning (artificial intelligence)
keystroke dynamics
keystroke data
image recognition
image enhancement
human computer interaction
GMM
Gaussian processes
Gaussian Mixture Models
authentication
gaussian distribution
Gaussian density estimator
feature extraction
error statistics
equal error rate
enhanced recognition
EER
directed graphs
digraph patterns
Cryptographic Protocols
computer authentication
biometrics (access control)
biometrics