Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
logistic regression
biblio
Static Malware Analysis using PE Header files API
Submitted by aekwall on Thu, 02/02/2023 - 4:23pm
Neural networks
Support vector machines
Computational modeling
Analytical models
Resiliency
Human behavior
composability
SVM
malware
static analysis
Market research
Phishing
neural network
pubcrawl
logistic regression
API
biblio
A lightweight machine learning based security framework for detecting phishing attacks
Submitted by grigby1 on Wed, 10/12/2022 - 2:37pm
phishing attacks
Uniform resource locators
UNB dataset2
Transforms
SVM
security
real-time systems
Random Forest
pubcrawl
feature extraction
Phishing
neural network
machine learning
logistic regression
KNN
kaggle dataset1
Human behavior
biblio
Defences Against web Application Attacks and Detecting Phishing Links Using Machine Learning
Submitted by aekwall on Fri, 07/01/2022 - 9:47am
Classification algorithms
Chained Attacks
Web application
PHP and MySQL
long short term memory networks
logistic regression
Apache access Logs
server
application security
support vector machine
Random Forest
Phishing
Support vector machines
attacks
cyber security
Training data
machine learning
Resiliency
Scalability
pubcrawl
machine learning algorithms
Training
deep learning
biblio
Stacking Ensemble-based XSS Attack Detection Strategy Using Classification Algorithms
Submitted by aekwall on Tue, 04/19/2022 - 11:29am
pubcrawl
XSS payload
Uniform resource locators
Technological innovation
Stacking Ensembles
Stacking
software libraries
Scalability
Resiliency
Random Forest
classification
Predictive models
logistic regression
k-means clustering
Human behavior
Decision Tree
Cross-site scripting (XSS) attack
cross-site scripting
Cross Site Scripting
Classification algorithms
biblio
Sagacious Intrusion Detection Strategy in Sensor Network
Submitted by grigby1 on Tue, 02/23/2021 - 2:47pm
smart appliances
Prediction algorithms
logistic regression
regression analysis
network intrusion detection
KNN
WSN
malicious attackers
support vector machine
neural nets
ANN
data corpus
external attacks
IDS methodology
Naive Bayes
sagacious intrusion detection strategy
time division multiple access
Support vector machines
Classification algorithms
service attacks
Floods
Denial of Service attacks
sensors
telecommunication computing
composability
wireless sensor networks
telecommunication security
computer network security
Resiliency
resilience
Metrics
pubcrawl
Intrusion Detection
biblio
A Protocol Independent Approach in Network Covert Channel Detection
Submitted by grigby1 on Thu, 07/16/2020 - 12:18pm
supervised learning
network traffic dataset
protocol independent approach
protocol-independent approach
Protocols
pubcrawl
resilience
Resiliency
Scalability
stealth tunnels
network storage covert channel detection
supervised machine learning technique
support vector machine (SVM)
Support vector machines
TCP
TCP protocols
telecommunication computing
telecommunication traffic
wireless channels
IP networks
Compositionality
covert channel communication
covert channels
Decision Tree
DNS
DNS protocols
feature extraction
generic detection model
composability
IP protocols
IPv4
k-nearest neighbors
Kernel
logistic regression
Logistics
machine learning
network covert channel
biblio
DDoS Attack Mitigation through Root-DNS Server: A Case Study
Submitted by grigby1 on Fri, 04/03/2020 - 12:19pm
Predictive models
true positive rate metric
traffic routing algorithms
telecommunication traffic
Support vector machines
Servers
Routing protocols
root-DNS server
root dns
RIPE Atlas
resource allocation
Random Forest
quality of service
pubcrawl
Probes
predictive security metrics
anycast
Metrics
machine learning
logistic regression
Load management
load balancing
k-nearest neighbors
IP networks
IP anycast
high availability
domain name system
DDoS attack mitigation
DDoS
cyber security
computer network security
Computer crime
biblio
Fingerprint Quality Classification for CSI-based Indoor Positioning Systems
Submitted by aekwall on Mon, 01/27/2020 - 10:19am
Support vector machines
Resiliency
pubcrawl
composability
Predictive Metrics
channel state information
fingerprint
Indoor Positioning
logistic regression
biblio
Applying Machine Learning to Anomaly-Based Intrusion Detection Systems
Submitted by aekwall on Mon, 01/20/2020 - 11:56am
NSL-KDD dataset
unsupervised anomaly traffic detection techniques
telecommunication traffic
Support vector machines
support vector machine
stochastic gradient decent
sequential model
security of data
Resiliency
regression analysis
random forests
random forest classifier
pubcrawl
anomaly-based Intrusion Detection Systems
NSL-KDD
Malicious Traffic
machine learning techniques
machine learning
logistic regression
intrusive traffics
Intrusion Detection systems (IDSs)
Intrusion Detection Systems
Internet-based traffic
internet
gradient methods
composability
biblio
Uncertainty-Aware Authentication Model for Fog Computing in IoT
Submitted by aekwall on Mon, 12/30/2019 - 12:16pm
Naive Bayes
uncertainty-aware authentication model
uncertainty handling
uncertainty
Support vector machines
support vector machine
supervised learning
supervised classification algorithms
security issues
Scalability
Resiliency
regression analysis
pubcrawl
privacy issues
prediction model
pattern classification
Fog computing
Mobile Edge Computing
logistic regression
IoT
Internet of Things
Fog Computing and Security
Decision trees
Decision Tree
Cloud Computing
Cisco Systems
Bayes methods
authorisation
authentication
attribute based access control model
ABAC model
security
1
2
3
next ›
last »