Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
threat vectors
biblio
Mapping Cyber Threat Intelligence to Probabilistic Attack Graphs
Submitted by grigby1 on Thu, 05/19/2022 - 12:57pm
security
pubcrawl
Conferences
privacy
Computer crime
Metrics
Probabilistic logic
resilience
Current measurement
Feeds
threat vectors
biblio
Intrusion Representation and Classification using Learning Algorithm
Submitted by grigby1 on Thu, 05/19/2022 - 12:56pm
Training
security
Support vector machines
Intrusion Detection
pubcrawl
privacy
Classification algorithms
Metrics
Cybersecurity
testing
genetic algorithms
threat vectors
intrusion
decomposition
discriminatory
Fitness value
biblio
A Machine Learning Approach to Detection of Critical Alerts from Imbalanced Multi-Appliance Threat Alert Logs
Submitted by grigby1 on Thu, 05/19/2022 - 12:56pm
Noise measurement
Oversampling
data cleaning
class imbalance
alert screening
alert fatigue
threat vectors
cleaning
automation
Training
Metrics
Big Data
privacy
pubcrawl
Support vector machines
security
machine learning
biblio
Hybrid Evolutionary Approach in Feature Vector for Ransomware Detection
Submitted by grigby1 on Thu, 05/19/2022 - 12:56pm
Malware Analysis
threat vectors
Support vector machines
static analysis
ransomware detection
Radio frequency
pubcrawl
privacy
network security
Metrics
Ransomware
machine learning algorithms
machine learning
Internet of Things
Feature Selection
feature extraction
Cybersecurity
Cryptography
cyber-physical systems
Resiliency
biblio
Identification of Cyber Threats and Parsing of Data
Submitted by grigby1 on Thu, 05/19/2022 - 12:55pm
Organizations
Support vector machines
pubcrawl
Radio frequency
Correlation
privacy
Benchmark testing
Metrics
Market research
Technological innovation
threat vectors
biblio
Machine Learning for Threat Recognition in Critical Cyber-Physical Systems
Submitted by grigby1 on Thu, 05/19/2022 - 12:55pm
privacy
Trustworthy Artificial Intelligence
threat vectors
threat assessment
Support vector machines
Stress
risk management
Radio frequency
pubcrawl
Trustworthy Systems
Metrics
machine learning
information management
Healthcare
Cybersecurity
cyber-physical systems
critical infrastructures
Computer crime
biblio
A Mixed Method For Internal Threat Detection
Submitted by grigby1 on Thu, 05/19/2022 - 12:55pm
deep learning
feature extraction
Support vector machines
pubcrawl
Conferences
Heuristic algorithms
Data models
privacy
Metrics
automation
Internal Threat
threat vectors
fully connected neural network
mixed detection
support vector data description
Variational Auto-Encoders
biblio
User Behaviour based Insider Threat Detection in Critical Infrastructures
Submitted by grigby1 on Thu, 05/19/2022 - 12:54pm
privacy
User Behavior Analysis
Insider Threat Detection (ITD)
Bi-directional Long Short Term Memory (bi-LSTM)
threat vectors
statistical analysis
support vector machine (SVM)
Metrics
Computer crime
critical infrastructure
pubcrawl
Anomaly Detection
machine learning
cyber security
Support vector machines
Organizations
feature extraction
deep learning
biblio
Detection of Advanced Persistent Threats using Artificial Intelligence for Deep Packet Inspection
Submitted by grigby1 on Mon, 04/25/2022 - 3:23pm
IDS
zero days
telecommunication traffic
Support vector machines
security
Scalability
Resiliency
resilience
Recurrent neural networks
pubcrawl
Payload
Inspection
threat vectors
feature extraction
deep packet inspection
Data models
Cybersecurity
cyber
Big Data
autoencoder
APT
Anomaly Detection
AI
biblio
A Robust Support Vector Machine Based Auto-Encoder for DoS Attacks Identification in Computer Networks
Submitted by aekwall on Mon, 01/10/2022 - 12:52pm
intrusion detection system
Support vector machines
support vector machine classification
Scalability
Resiliency
real-time systems
pubcrawl
Predictive Metrics
machine learning
threat vectors
Intrusion Detection
Human behavior
feature extraction
DoS
computer networks
Computational modeling
composability
Attack vectors
1
2
3
4
5
6
7
next ›
last »