Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
supervised learning
biblio
A Security System Using Deep Learning Approach for Internet of Vehicles (IoV)
Submitted by grigby1 on Mon, 11/02/2020 - 12:09pm
pubcrawl
Unsupervised Learning
supervised learning
spectrum utilization
Smart Spectrum Utilization
smart offices
Smart Environments
smart cities
security threats
security of data
secure applications
Resiliency
resilience
reliable services
reliable communication services
connected vehicles
neural nets
mobile computing
Metrics
learning (artificial intelligence)
IoV security system
IoT
Internet of Vehicles
Internet of Things
Human Factors
deep learning methodology
deep learning approach
deep learning
critical V2X infrastructures deployment
connected vehicles communication
biblio
Synonym-based Attack to Confuse Machine Learning Classifiers Using Black-box Setting
Submitted by grigby1 on Fri, 09/04/2020 - 4:11pm
machine learning algorithms
ML models
black-box setting
black-box attack
Blogs
bot tweets
bots
convolutional neural network
deep learning classifiers
testing
machine learning classifiers
ML-based bot detection algorithms
ML-based models
popular content sharing platform
supervised learning
synonym-based attack
vulnerability constraints
Black Box Security
Resiliency
computer network security
invasive software
feature extraction
social networking (online)
Artificial Intelligence
pubcrawl
composability
Metrics
Cryptography
resilience
pattern classification
Training
learning (artificial intelligence)
machine learning
deep learning
Predictive models
biblio
A Protocol Independent Approach in Network Covert Channel Detection
Submitted by grigby1 on Thu, 07/16/2020 - 12:18pm
supervised learning
network traffic dataset
protocol independent approach
protocol-independent approach
Protocols
pubcrawl
resilience
Resiliency
Scalability
stealth tunnels
network storage covert channel detection
supervised machine learning technique
support vector machine (SVM)
Support vector machines
TCP
TCP protocols
telecommunication computing
telecommunication traffic
wireless channels
IP networks
Compositionality
covert channel communication
covert channels
Decision Tree
DNS
DNS protocols
feature extraction
generic detection model
composability
IP protocols
IPv4
k-nearest neighbors
Kernel
logistic regression
Logistics
machine learning
network covert channel
biblio
FACT - Fine grained Assessment of web page CredibiliTy
Submitted by aekwall on Mon, 07/13/2020 - 11:19am
health domain Web pages
automated
automated genre-aware credibility assessment
Credibility
crowdsourced Web
fine grained assessment
GCS
genre
genre credibility score
gradient boosted decision tree classified genres
supervised learning
quality
search engine queries
trillion web pages
web assessment
web of trust
Web page
Web page credibility
WEBCred framework
WOT
text analysis
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
composability
pattern classification
internet
tools
Web sites
security of data
software engineering
information retrieval
information security
Decision trees
search engines
Web pages
framework
ranking
biblio
PGSM-DPI: Precisely Guided Signature Matching of Deep Packet Inspection for Traffic Analysis
Submitted by grigby1 on Fri, 07/03/2020 - 1:26pm
deep packet inspection
feature extraction
Forestry
Inspection
Mathematical model
optimization
Protocols
pubcrawl
resilience
Resiliency
Scalability
supervised learning
biblio
Conditional Generative Adversarial Network on Semi-supervised Learning Task
Submitted by grigby1 on Fri, 06/12/2020 - 12:21pm
Mathematical model
Tensile stress
supervised learning
semisupervised learning method
Semisupervised learning
semi-supervised
Scalability
Resiliency
resilience
pubcrawl
neural nets
MNIST dataset
Metrics
abundant unlabeled data
image classification
Generators
generative adversarial networks
generative adversarial network
Generative Adversarial Learning
Gallium nitride
deep neural networks
Data models
conditional generative adversarial network
conditional GAN model
conditional
biblio
Natural Language Processing Based Part of Speech Tagger using Hidden Markov Model
Submitted by aekwall on Mon, 05/18/2020 - 10:54am
Hidden markov-model
Viterbi algorithm
tagged sentences
supervised learning
stochastic taggers
rule based taggers
POS tagging
part-of-speech tagging
part of speech tagger
natural language processing applications
Malayalam language
Indian languages
Scalability
hidden Markov model
Hidden Markov models
language translation
tagging
natural language processing
Stochastic processes
Computational modeling
pubcrawl
Human behavior
Resiliency
Conferences
biblio
Detection of Spammers in the Reconnaissance Phase by machine learning techniques
Submitted by grigby1 on Fri, 05/15/2020 - 11:56am
pubcrawl
Xgboost
Twitter
testing
supervised learning
social networking (online)
Social Network Fake Profiles
security of data
Scalability
Resiliency
resilience
reconnaissance phase
artificial honeypot profiles
professional social networks
organizational social network
Network reconnaissance
machine learning techniques
machine learning algorithms
machine learning
learning (artificial intelligence)
Feature Based Strategy
DspamRPfast model
Conferences
Classification algorithms
biblio
Spam Domain Detection Method Using Active DNS Data and E-Mail Reception Log
Submitted by grigby1 on Mon, 02/10/2020 - 11:17am
Metrics
unsolicited e-mail
Training
system monitoring
supervised learning
spoofed e-mails
SPF
spam mail
spam domain detection
spam detection
sender IP address
sender domain authentication
Scalability
pubcrawl
Postal services
active DNS
message authentication
IP networks
internet
Human Factors
Human behavior
feature extraction
Electronic mail
e-mail reception log
e-mail log analysis
DMARC
DKIM
authentication
active DNS data
biblio
Keystroke Analysis for User Identification Using Deep Neural Networks
Submitted by grigby1 on Tue, 01/28/2020 - 2:36pm
malicious users
user identification
typing style
typing dynamics
supervised learning
pubcrawl
pattern classification
neural network
neural net architecture
multilayer perceptrons
MLP deep neural network
Metrics
message authentication
Artificial Intelligence
learning (artificial intelligence)
keystroke analysis
keystroke
Human Factors
Human behavior
feature model
deep neural network architecture
deep learning-based classifiers
deep learning
decision-trees machine learning algorithm
Decision trees
authentication systems
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »