Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
principle component analysis
biblio
Optimal Image Watermark Technique Using Singular Value Decomposition with PCA
Submitted by aekwall on Mon, 02/15/2021 - 4:43pm
Matrix converters
decomposition
wavelet transformation
tracing copyright infringements
principle component analysis
peak signal-to-noise ratio
optimum digital image watermark technique
intellectual property right
image compression
discrete wavelet transformation-singular value decomposition approach
banknote authentication
singular value decomposition
discrete wavelet transforms
principal component analysis
Matrix decomposition
Compositionality
Color
cyber physical systems
Watermarking
image watermarking
Image coding
data compression
PCA
Metrics
pubcrawl
biblio
Classification of Malware programs using autoencoders based deep learning architecture and its application to the microsoft malware Classification challenge (BIG 2015) dataset
Submitted by grigby1 on Wed, 06/20/2018 - 12:56pm
privacy
microcontrollers
Microsoft Malware Classification Challenge BIG2015
microsoft malware Classification challenge dataset
neural network
pattern classification
Pattern recognition
pattern recognition algorithms
principle component analysis
Metrics
pubcrawl
resilience
Resiliency
security
sensors
superior architecture
Time factors
gray scale images
autoencoder
classification process
classifier
Cybersecurity
deep learning
deep learning architecture
Devices
Global Positioning System
Acoustics
Human behavior
invasive software
Latches
learning (artificial intelligence)
malicious programs
malware classification
malware programs
biblio
User Behavior Anomaly Detection for Application Layer DDoS Attacks
Submitted by grigby1 on Tue, 01/16/2018 - 6:25pm
legitimate application layer requests
web services
Web servers
user behavior anomaly detection method
subspace anomaly detection method
student resource portal
Resiliency
pubcrawl
Protocols
protocol characteristics
principle component analysis
principal component analysis
Penetration Testing
PCA-subspace
PCA
Metrics
anomalous behavior instance detection
internet
Human behavior
HTTP Web server logs
HTTP DDoS attacks
file servers
feature extraction
distributed denial of service attacks
DDoS attack detection
Cyber Attacks
computer network security
Computer crime
composability
Browsers
application layer DDoS attacks
Anomaly Detection