Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
logistic regression
biblio
A method to detect Internet of Things botnets
Submitted by aekwall on Mon, 05/20/2019 - 9:00am
IoT Security 2018
widespread botnets
unauthorized access
security of data
security
Resiliency
pubcrawl
Protocols
performance evaluation
Metrics
malware
main security problems
Logistics
logistic regression
authorisation
IoT devices
IoT
invasive software
Internet of Things
Human behavior
Cybersecurity
computer network security
composability
common characteristics
botnets
Botnet detection
botnet
biblio
Identifying Malicious Botnet Traffic Using Logistic Regression
Submitted by grigby1 on Fri, 04/05/2019 - 9:24am
regression analysis
Logistics
machine learning
malware
Metrics
network security
network traffic
Payloads
popular network monitoring framework
pubcrawl
logistic regression
resilience
Resiliency
security of data
significant economic harm
social harm
statistical learning method
telecommunication traffic
vulnerable devices
cyber-attacks
botnet
botnet activity
Botnet detection
botnet infestation
botnet malware
botnets
Compositionality
cyber security
aggregate statistics
feature extraction
Hidden Markov models
identifying malicious botnet traffic
internet
intrusion detection system
invasive software
learning (artificial intelligence)
lightweight logistic regression model
biblio
Classification for Authorship of Tweets by Comparing Logistic Regression and Naive Bayes Classifiers
Submitted by aekwall on Mon, 03/04/2019 - 9:46am
regression analysis
machine learning techniques
Metrics
mobile phone
Naive Bayes
naïve Bayes classifier
pattern classification
pre-processed data
privacy
pubcrawl
Python
machine learning model
security
social computing
social media
social networking (online)
text analysis
text classification
Training
tweets authorship
Twitter
Twitter account
fake news
attribution
authorisation
authorship attribution
authorship attribution techniques
Bayes methods
classification
composability
digital identities
dubious sources
Electronic mail
anonymity
feature extraction
feature vector
Human behavior
human-in-the-loop security center paradigm
learning (artificial intelligence)
logistic regression
logistic regression based classifier
Logistics
machine learning
biblio
Application of Machine Learning to Identify Counterfeit Website
Submitted by aekwall on Mon, 02/18/2019 - 11:56am
Support vector machines
support vector machine
Resiliency
pubcrawl
composability
counterfeit website
Decision Tree
fraudulent website
logistic regression
Metrics
biblio
Quantifying the impact of adversarial evasion attacks on machine learning based android malware classifiers
Submitted by Katie Dey on Mon, 08/06/2018 - 12:24pm
malicious apps
user devices
Training data
Training
Support vector machines
statistical analysis
smart phones
regression analysis
Random Forest
nonlinear classifiers
neural network
neural nets
malware
adversarial evasion attacks
machine learning
logistic regression
linear classifiers
learning (artificial intelligence)
invasive software
Humanoid robots
feature extraction
Androids
Android-based devices
Android Malware Detection
android malware classifiers
Extraction
biblio
Using Mathematical Methods Against Denial of Service (DoS) Attacks in VANET
Submitted by grigby1 on Thu, 06/07/2018 - 2:03pm
Metrics
VANET
security
Resiliency
resilience
Policy-Governed Secure Collaboration
policy-based governance
Policy
neural networks security
neural network
MANET
mathematical models.
logistic regression
DoS attack
cyber physical systems
collaboration
Attack detection
pubcrawl
attack mitigation
biblio
A Regression Model Based Approach for Identifying Security Requirements in Open Source Software Development
Submitted by grigby1 on Mon, 03/05/2018 - 12:08pm
open source software development
up-front RE
textual information retrieval techniques
testing
software engineering
security requirements identification methods
security requirements identification
security of data
security
Resiliency
resilience
requirements engineering
regression model based approach
regression analysis
pubcrawl
OSS projects
coding theory
Open Source Software
Metrics
Measurement
Logistics
logistic regression
lightweight representation
just-in-time requirements engineering
information retrieval
Formal Specification
Cryptography
Compositionality
Complexity theory
comment writing
comment security aspect
biblio
Exploring linguistic features for extremist texts detection (on the material of Russian-speaking illegal texts)
Submitted by K_Hooper on Wed, 01/10/2018 - 10:14am
Scalability
psycholinguistic features
pubcrawl
Random Forest
regression analysis
Resiliency
Russian language
Russian legislation
Russian-speaking illegal text material
psych olinguistic features
semantic features
Semantics
Social network services
Support vector machines
Terrorism
text analysis
text classification
text detection
Human behavior
Bayes methods
classification methods
classification quality
Dictionaries
differentiating feature
extremist texts
feature extraction
gradient boosting
automatic extremist text detection
learning (artificial intelligence)
linear SVM
linguistic features
logistic regression
multinomial naive Bayes
natural language processing
pattern classification
Pragmatics
biblio
An ensemble model with hierarchical decomposition and aggregation for highly scalable and robust classification
Submitted by grigby1 on Thu, 12/28/2017 - 12:17pm
highly scalable classification
Xgboost
Training
sub-model training
sub-model integration
regression analysis
pubcrawl
Predictive models
pattern classification
model decomposition
Metrics
machine learning
Logistics
logistic regression
learning (artificial intelligence)
binary classification problem
Hearthstone
game state information
flexible robust scheme
feature extraction
extreme gradient boosted decision trees
ensemble model
deep learning
decomposition
Decision trees
Data models
computer games
computer game
Computational modeling
Compositionality
biblio
Scalable and Secure Logistic Regression via Homomorphic Encryption
Submitted by grigby1 on Wed, 03/29/2017 - 11:39am
additively homomorphic encryption
composability
logistic regression
Metrics
outsourced computation
pubcrawl
Resiliency
white box
white box cryptography
« first
‹ previous
1
2
3
next ›
last »