Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
neural network
biblio
Research on Application of Convolutional Neural Network in Intrusion Detection
Submitted by aekwall on Thu, 05/13/2021 - 11:31am
Intrusion Detection
security
feature extraction
Resiliency
pubcrawl
policy-based governance
Metrics
Neural networks
internet
convolutional neural networks
Communication networks
Artificial Neural Networks
deep learning
neural network
cyber physical systems
biblio
Agent Based Cybersecurity Model for Business Entity Risk Assessment
Submitted by grigby1 on Tue, 03/30/2021 - 12:04pm
Predator prey systems
Mathematical model
multi-agent systems
network agents
network setting
network threats
network traffic features
network transactions
neural nets
neural network
Neural networks
Organizations
internal attacks
pubcrawl
risk assessment
risk management
risk-based approach
security
security solutions
self-organizing behavior
telecommunication traffic
third-party users
time-state chart
Workstations
Cybersecurity
agent-based modelling
agent-based system modelling
attack-state
Business
business data processing
business entity risk assessment
complex enterprise systems
computer network security
computer networks
critical infrastructure
cyber-attacks
agent based cybersecurity
data access
defense mechanism
defense strategies
dynamic state changes
external attacks
Human behavior
Human Factors
human interactions
information exchange
innovative information technology
biblio
Black-Box Modelling of a DC-DC Buck Converter Based on a Recurrent Neural Network
Submitted by aekwall on Tue, 03/09/2021 - 12:04pm
autoregressive processes
Training
System Identification
switching convertors
static behavior
recurrent nonlinear autoregressive exogenous neural network
prediction
power converter
nonsynchronous buck converter model
DC-DC power converter
DC-DC buck converter
black-box modelling
black-box model
black-box approach
Resiliency
black-box models
radial basis function networks
Artificial Neural Networks
multilayer perceptrons
DC-DC power convertors
recurrent neural network
recurrent neural nets
black box encryption
power engineering computing
neural network
Metrics
composability
pubcrawl
biblio
A Black Box Modeling Technique for Distortion Stomp Boxes Using LSTM Neural Networks
Submitted by aekwall on Tue, 03/09/2021 - 12:03pm
correlation coefficient
stomp box
sound effect
Nonlinear distortion
LSTM neural networks
distortion stomp box
distortion sound
commercial stomp boxes
black box modeling
nonlinear systems
Integrated circuit modeling
LSTM
learning (artificial intelligence)
recurrent neural nets
black box encryption
neural network
Training
Neural networks
Metrics
composability
pubcrawl
Resiliency
machine learning
biblio
Software architecture for the application of facial recognition techniques through IoT devices
Submitted by aekwall on Tue, 03/09/2021 - 11:58am
neural network
Transportation
Systematics
Software measurement
software architecture proposal
Software Architecture
Software
security of data
Scalability
Resiliency
pubcrawl
process control
personal data
biometric encryption
Metrics
IoT devices
Internet of Things
feature extraction
facial recognition time
facial recognition techniques
facial recognition
face recognition
encryption
data privacy
biometrics (access control)
Big Data
biblio
Performance Evaluation of Botnet Detection using Deep Learning Techniques
Submitted by grigby1 on Thu, 03/04/2021 - 2:57pm
Reliability
malicious activities
Metrics
Multilayer Perception
multilayer perceptrons
neural nets
neural network
performance evaluation
Performance Metrics
pubcrawl
Long short-term memory
reliable botnet detection
resilience
Resiliency
security
Sensitivity
traffic control
unknown botnet traffic
Zero day attacks
zero-day attack
Data models
botnet
botnet traffic detection
botnet traffic patterns
botnets
composability
computer network security
convolutional neural network
CTU-13 botnet traffic dataset
CTU-13 Dataset
basic network security goals
deep learning
deep learning-based approaches
defense
different deep learning models
hybrid CNN-LSTM
internet
invasive software
known botnet traffic
learning (artificial intelligence)
biblio
Evading Deepfake-Image Detectors with White- and Black-Box Attacks
Submitted by grigby1 on Thu, 03/04/2021 - 2:35pm
security of data
neural nets
neural network
optimization
Perturbation methods
popular forensic approach
pubcrawl
resilience
Resiliency
Robustness
Metrics
significant vulnerabilities
social networking (online)
state- of-the-art classifier
synthesizer
synthetic content
synthetically-generated content
target classifier
Training
Twitter
fraudulent social media profiles
white box
security
attack case studies
AUC
black-box attack
composability
deepfake-image detectors
disinformation campaigns
Forensics
White Box Security
Generators
image area
image classification
Image forensics
image generators
image representation
image sensors
image-forensic classifiers
learning (artificial intelligence)
biblio
Using Deep Learning Techniques for Network Intrusion Detection
Submitted by grigby1 on Tue, 02/23/2021 - 2:47pm
composability
RNN
network intrusion attacks
intelligent network intrusion detection system
cyber-security attacks
convolutional neural network
neural network
deep learning techniques
network intrusion detection
Recurrent neural networks
recurrent neural network
convolutional neural networks
deep learning
learning (artificial intelligence)
recurrent neural nets
network security
computer network security
Resiliency
resilience
Metrics
pubcrawl
Intrusion Detection
convolutional neural nets
CNN
machine learning
feature extraction
biblio
An intrusion detection system integrating network-level intrusion detection and host-level intrusion detection
Submitted by grigby1 on Tue, 02/23/2021 - 2:46pm
composability
scalable neural-network-based hybrid IDS framework
network-level intrusion detection
IDS field
host-level intrusion detection
host-level IDS
cyber-attackers
ADFA dataset
NSL-KDD dataset
software quality
Scalability
network intrusion detection
neural network
software reliability
cyber-attacks
learning (artificial intelligence)
Computer crime
intrusion detection system
cyber security
computer network security
Resiliency
resilience
Metrics
pubcrawl
Intrusion Detection
convolutional neural nets
Data mining
security
machine learning
biblio
Identifying Ubiquitious Third-Party Libraries in Compiled Executables Using Annotated and Translated Disassembled Code with Supervised Machine Learning
Submitted by aekwall on Mon, 02/22/2021 - 1:44pm
Databases
vector
Matrices
k-nearest neighbor search
clustering methods
Bayes method
nearest neighbor search
supervised learning
Classification algorithms
Microprogramming
Predictive Metrics
reverse engineering
Software
Measurement
neural network
supply chain management
Libraries
tools
internet
graph theory
pubcrawl
machine learning
Support vector machines
Task Analysis
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »