Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data mining
biblio
Evaluating the Performance of Machine Learning Sentiment Analysis Algorithms in Software Engineering
Submitted by aekwall on Mon, 09/28/2020 - 11:33am
Automated Secure Software Engineering
tool performance
software engineering domain
machine learning sentiment analysis algorithms
evaluation performance
datasets
automated sentiment tool
automated sentiment analysis
sentiment analysis
Software algorithms
Benchmark testing
machine learning algorithms
software engineering
Data mining
machine learning
Training
tools
composability
pubcrawl
Resiliency
learning (artificial intelligence)
biblio
AutoAttacker: A reinforcement learning approach for black-box adversarial attacks
Submitted by grigby1 on Fri, 09/04/2020 - 4:10pm
adversarial-machine-learning
Black Box Security
white-box access
reinforcement-learning
Reinforcement learning
perturbed inputs
classifier attack
black-box-attack
black-box model
black-box adversarial attacks
AutoAttacker
Cryptography
adversarial example discovery
machine learning model
learning (artificial intelligence)
Data mining
pattern classification
resilience
Resiliency
Metrics
composability
pubcrawl
biblio
Nash Equilibrium of Multiple, Non-Uniform Bitcoin Block Withholding Attackers
Submitted by grigby1 on Fri, 09/04/2020 - 3:59pm
bitcoin security
seemingly malicious behavior
nonuniform Bitcoin mining pools
nonuniform Bitcoin block withholding attackers
Nash equilibrium conditions
Nash Equilibrium
Miner's Dilemma
MATLAB
mathematical analysis
in-depth profit analysis
cryptocurrency miners
BWH attack
blockchain distributed databases
Bitcoin-like systems
Scalability
profitability
bitcoin
cryptocurrency
Distributed databases
game theory
Peer-to-peer computing
cryptocurrencies
Data mining
Human behavior
pubcrawl
Hardware
blockchain
biblio
Forensic Analysis of Bitcoin Transactions
Submitted by grigby1 on Fri, 09/04/2020 - 3:58pm
bitcoin security
transaction processing
transaction patterns
suspicious bitcoin addresses
Petri nets
forensic investigation
forensic analysis
Firing
FABT
Bitcoin transactions
bitcoin transaction net
bitcoin transaction data
data privacy
financial data processing
bitcoin
pattern matching
visualization
cryptocurrencies
Data mining
Human behavior
pubcrawl
computer science
Forensics
Scalability
biblio
Targeted Addresses Identification for Bitcoin with Network Representation Learning
Submitted by grigby1 on Fri, 09/04/2020 - 3:58pm
Human behavior
transaction addresses
transaction address
security risk
security of data
Scalability
pubcrawl
pattern classification
network representation learning
learning (artificial intelligence)
imbalanced multi-classification
illegal transactions
addresses identification algorithms
feature extraction
fault tolerance
drugs
Decision trees
de-anonymity approach
Data mining
cryptocurrencies
bitcoin security
bitcoin
annotated data
biblio
Identification of State Registers of FSM Through Full Scan by Data Analytics
Submitted by grigby1 on Fri, 08/28/2020 - 3:55pm
industrial property
state transitions
state register identification
Silicon
Scalability
Resiliency
resilience
regression analysis
Registers
pubcrawl
Physical design
OpenCores
logic design
Intellectual Property Protection
Big Data
FSM state registers
FSM design
finite-state machine
finite state machines
electronic engineering computing
downstream design
Decision trees
Decision Tree
Data protection
Data mining
data analysis
big data security metrics
Big Data Analytics
biblio
A Comparison of Performance Metrics with Severely Imbalanced Network Security Big Data
Submitted by grigby1 on Fri, 08/28/2020 - 3:53pm
sampling
pattern classification
Performance Metrics
Precision-Recall Curve
Predictive models
pubcrawl
Radio frequency
resilience
Resiliency
minority classes
sampling distribution ratio
sampling methods
Scalability
severe class imbalance
severely imbalanced network security big data
Sparks
testing dataset roles
Training
Data mining
Apache Spark framework
area under the receiver operating characteristic curve
Big Data
Big Data Analytics
big data security metrics
Cluster Computing
computer network security
data analysis
apache spark
Geometric Mean
imbalanced data
learning (artificial intelligence)
machine learning
majority class
Measurement
metrics testing
Metrics
biblio
Fraud Detection using Machine Learning and Deep Learning
Submitted by aekwall on Mon, 08/24/2020 - 1:37pm
credit card
Europe
Forestry
Credit cards
area under the ROC curve
Australian dataset
autoencoder
benchmark multiple machine learning methods
Boltzmann machines
cost of failure
financial data processing
data mining techniques
Deep belief networks
EU
European dataset
German dataset
k nearest neighbor
Matthews correlation coefficient
restricted boltzmann machine
security checks
pattern classification
Support vector machines
support vector machine
learning (artificial intelligence)
machine learning
Random Forest
Resiliency
pubcrawl
composability
deep learning
Data models
convolutional neural nets
deep learning methods
Data mining
convolutional neural networks
Artificial Neural Networks
belief networks
fraud
fraud detection
biblio
Detecting DoS Attack in Smart Home IoT Devices Using a Graph-Based Approach
Submitted by aekwall on Mon, 08/17/2020 - 11:18am
graph-based outlier detection in Internet of Things
attack graphs
attack signatures
current security solutions
denial-of-service attacks
DoS Attack Detection
GODIT
graph data
graph mining
DoS attack
graph-stream anomaly detection approaches
IoT-equipped smart home show
machine learning approaches
packet inspection
real-time graph stream
smart home IoT devices
smart home IoT traffic
cyber-attacks
IP networks
Internet of Things
real-time systems
learning (artificial intelligence)
Resiliency
pubcrawl
composability
graph theory
computer network security
Anomaly Detection
Data mining
Intrusion Detection
IoT security
Smart homes
Smart Home
Predictive Metrics
biblio
Intrusion Detection Using Deep Learning and Statistical Data Analysis
Submitted by aekwall on Mon, 08/10/2020 - 10:37am
Mathematical model
statistical data analysis
KDD cup 99 datasets
binary classification model
deep learning algorithm
artificial neural network
deep learning
data classification
cyber physical systems
Artificial Neural Networks
computer networks
statistical analysis
Data mining
data analysis
Intrusion Detection
pattern classification
neural nets
machine learning
policy-based governance
pubcrawl
Resiliency
learning (artificial intelligence)
feature extraction
network security
Data models
Classification algorithms
computer network security
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
…
next ›
last »