Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
supervised learning
biblio
An Overview of Machine Learning Based Approaches in DDoS Detection
Submitted by grigby1 on Tue, 09/07/2021 - 12:59pm
composability
Computer crime
DDoS attack detection
DDoS detection
denial-of-service attack
distributed denial of service
feature extraction
Human behavior
machine learning
Metrics
pubcrawl
Reactive power
resilience
Resiliency
supervised learning
Support vector machines
biblio
A Neural Embedding for Source Code: Security Analysis and CWE Lists
Submitted by grigby1 on Thu, 06/24/2021 - 9:51am
pubcrawl
vulnerability classification
Training
Syntactics
supervised learning
static analysis
source code embedding
Software
security
resilience
Pervasive Computing Security
natural language processing
Java
composability
Autonomic Security
Metrics
Human Factors
Scalability
Resiliency
biblio
An Efficient Vulnerability Extrapolation Using Similarity of Graph Kernel of PDGs
Submitted by aekwall on Tue, 05/18/2021 - 2:21pm
feature extraction
Resiliency
Human behavior
pubcrawl
privacy
Metrics
vulnerability detection
Labeling
Training
Compositionality
Open Source Software
Graph Kernel
supervised learning
extrapolation
program dependence graph
vulnerability extrapolation
biblio
The Development of Artificial Intelligence Technology And Its Application in Communication Security
Submitted by grigby1 on Thu, 05/13/2021 - 10:58am
security
Neural networks
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Industries
Communication networks
composability
maintenance engineering
artificial intelligence technology
artificial intelligence security
supervised learning
communication security
security field
biblio
Detection of Malicious SCADA Communications via Multi-Subspace Feature Selection
Submitted by grigby1 on Wed, 05/05/2021 - 11:31am
Redundancy
SCADA Systems Security
Feature Selection
SCADA System Security
Mutual information
Ensemble Learning
cyberphysical systems
Pipelines
SCADA
Compositionality
feature extraction
SCADA systems
supervised learning
Data models
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
Intrusion Detection
biblio
Practical and White-Box Anomaly Detection through Unsupervised and Active Learning
Submitted by grigby1 on Thu, 03/04/2021 - 1:35pm
pubcrawl
white-box anomaly detection
user experience
Unsupervised Learning
Unsupervised Anomaly Detection
Time series analysis
time series
supervised learning
security of data
RRCF algorithm
RRCF
robust random cut forest
Resiliency
resilience
random forests
White Box Security
Neural networks
Monitoring
Metrics
Labeling
KPI anomaly detection framework
key performance indicators
iRRCF
Forestry
composability
Anomaly Detection
active learning
security
white box
biblio
Network Intrusion Detection Method Based on GAN Model
Submitted by grigby1 on Tue, 02/23/2021 - 1:45pm
performance indicators
Metrics
multi-classification model
network intrusion detection
network intrusion detection method
neural nets
original classification model
parameter setting
pattern classification
loss function
pubcrawl
resilience
security of data
supervised learning
supervised learning multiclassification model
Training
training method
Transforms
Gallium nitride
Resiliency
Predictive Metrics
Scalability
adversarial idea
binary classification model
composability
Computational modeling
detection accuracy
Generative Adversarial Learning
gan
GAN model
generated adversarial network
generative adversarial networks
label sample set
label samples
learning (artificial intelligence)
biblio
Identifying Ubiquitious Third-Party Libraries in Compiled Executables Using Annotated and Translated Disassembled Code with Supervised Machine Learning
Submitted by aekwall on Mon, 02/22/2021 - 12:44pm
Databases
vector
Matrices
k-nearest neighbor search
clustering methods
Bayes method
nearest neighbor search
supervised learning
Classification algorithms
Microprogramming
Predictive Metrics
reverse engineering
Software
Measurement
neural network
supply chain management
Libraries
tools
internet
graph theory
pubcrawl
machine learning
Support vector machines
Task Analysis
biblio
Graph Embedding Based Familial Analysis of Android Malware using Unsupervised Learning
Submitted by grigby1 on Fri, 12/11/2020 - 1:32pm
Malware Analysis
Unsupervised Learning
supervised learning
SRA
smart phones
similarity relationships
Semantics
security
Resiliency
resilience
pubcrawl
privacy
pattern clustering
pattern classification
Metrics
malware link network
analytical workload
malware
learning (artificial intelligence)
invasive software
Human behavior
graph theory
graph embedding techniques
graph embedding
GefDroid
feature extraction
familial analysis
Face
detection algorithms
application program interfaces
Android malware
biblio
Few-Shot Transfer Learning for Text Classification With Lightweight Word Embedding Based Models
Submitted by aekwall on Mon, 11/02/2020 - 1:30pm
pooling strategy
Few-shot learning
few-shot transfer learning tasks
lightweight word embedding-based models
modified hierarchical pooling strategy
parameter-free pooling operations
parameter-free property
parameters training
plug-and-play way
deep learning architectures
semantic compositionality
Semantic Networks
semantic text
simple word embedding-based models
supervised data
unseen text sequences
word embedding based models
word processing
text categorization
Data models
feature extraction
Human behavior
pubcrawl
Computational modeling
pattern classification
Training
text analysis
Task Analysis
text classification
transfer learning
deep learning
Human Factors
Compositionality
Computing Theory and Compositionality
supervised learning
data-hungry deep models
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »