Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data mining
biblio
Automatically Generating Malware Summary Using Semantic Behavior Graphs (SBGs)
Submitted by grigby1 on Tue, 09/21/2021 - 3:51pm
Malware Analysis
Semantics
semantic behavior graph
Resiliency
resilience
pubcrawl
privacy
microsoft windows
Metrics
malware summary
behavior association
malware
Human behavior
Heuristic algorithms
Grippers
graph theory
feature extraction
Data mining
behavior description
biblio
LGMal: A Joint Framework Based on Local and Global Features for Malware Detection
Submitted by grigby1 on Tue, 09/21/2021 - 3:51pm
malware detection
static analysis
Smart City
smart cities
Semantics
Resiliency
resilience
pubcrawl
privacy
Metrics
convolutional neural network
Malware Analysis
malware
Human behavior
graph theory
graph convolutional networks
feature extraction
Data mining
convolutional neural networks
biblio
SecBot: a Business-Driven Conversational Agent for Cybersecurity Planning and Management
Submitted by aekwall on Tue, 09/07/2021 - 11:17am
Social Agents
Business
chatbot
Companies
Computer crime
conversational agents
Data mining
Human behavior
Metrics
pubcrawl
Scalability
social networking (online)
Training
biblio
A Convolutional Encoder Network for Intrusion Detection in Controller Area Networks
Submitted by aekwall on Tue, 09/07/2021 - 11:11am
false negative rate
Training
security
Resiliency
pubcrawl
network intrusion detection
Internet of Things
IDS
feature extraction
Network Security Architecture
Data processing
Data mining
cyber-physical systems
controller area network security
controller area network
Computational modeling
CNN
biblio
Research and Development of QR Code Steganography Based on JSteg Algorithm in DCT Domain
Submitted by grigby1 on Tue, 08/31/2021 - 12:57pm
Data mining
discrete cosine transforms
Image coding
pubcrawl
QR codes
resilience
Resiliency
Resists
standards
Transform coding
Watermarking
biblio
An Efficient Database Backup and Recovery Scheme using Write-Ahead Logging
Submitted by grigby1 on Tue, 08/31/2021 - 11:06am
Human behavior
Write-Ahead Logging
Resiliency
resilience
relational database security
pubcrawl
Metrics
Instruction sets
i-o systems security
Cloud Computing
Database systems
database management system
Database Backup and Recovery
Data mining
data management
Conferences
Computer crashes
composability
biblio
Machine Learning Approach to Predict Computer Operating Systems Vulnerabilities
Submitted by grigby1 on Tue, 08/17/2021 - 3:56pm
microsoft windows
security
Resiliency
resilience
pubcrawl
Predictive models
predictive security metrics
Operating systems security
operating system
composability
Metrics
machine leaning
Linux Operating System Security
Linux operating system
Linux
Databases
Data mining
computer
biblio
Multi-Authority Attribute Based Encryption With Policy-hidden and Accountability
Submitted by grigby1 on Tue, 07/27/2021 - 12:25pm
attribute-based encryption
Collusion
Data mining
encryption
feature extraction
Human behavior
Multi-authority
policy-based governance
pubcrawl
Resists
Scalability
security
standards
Traceability
biblio
Application of Attention Model Hybrid Guiding based on Artificial Intelligence in the Course of Intelligent Architecture History
Submitted by grigby1 on Wed, 06/30/2021 - 3:40pm
intelligent architecture
visual saliency
smart cities
security
Scalability
Resiliency
resilience
pubcrawl
Monitoring
intelligent data
Artificial Intelligence
energy consumption
education
Data models
Data mining
Computational modeling
Compositionality
Buildings
Attention Model
biblio
Taking advantage of unsupervised learning in incident response
Submitted by aekwall on Thu, 06/24/2021 - 11:55am
malware
feature extraction
machine learning
Resiliency
pubcrawl
composability
tools
Training
Cybersecurity
computer security
Data mining
Automated Response Actions
dimensionality reduction
quick incident response
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »