Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
neural network
biblio
Intelligent Decentralized Dynamic Power Allocation in MANET at Tactical Edge based on Mean-Field Game Theory
Submitted by grigby1 on Tue, 11/17/2020 - 2:51pm
probability
mean-field game theory
military computing
mobile ad hoc network
mobile ad hoc networks
neural nets
neural network
online reinforcement learning
optimal decentralized power allocation
optimal power allocation algorithms
Mean-field game
pubcrawl
Reinforcement learning
resource management
Scalability
self-organizing features
tactical edge
Transmitters
wireless connection population
Human Factors
Artificial Neural Networks
Cost function
dynamic power allocation
Fokker-Planck equation
Fokker-Planck-Kolmogorov equation
game theory
Hamiltonian-Jacobian-Bellman equation
Heuristic algorithms
actor-critic-mass algorithm
intelligent decentralized dynamic power allocation
Interference
Internet of battlefield things
Internet of Things
iobt
learning (artificial intelligence)
MANET
Mathematical model
biblio
Poisoning Attack on Load Forecasting
Submitted by grigby1 on Wed, 11/04/2020 - 2:14pm
poisoning attack
Training data
statistical methods
simulated annealing
short-term load forecasting systems
security of data
Scalability
Resiliency
resilience
regression analysis
pubcrawl
Predictive models
power system security
power grids
power engineering computing
poisoning attack solution
AI Poisoning
outlier detection
Numerical models
neural network
multiple linear regression
MLR model
MLR attacking solution
Load modeling
load forecasting
Human behavior
Global Energy Forecasting Competition data
forecasting
data poisoning strategy
Data models
closed-form solution
biblio
A Study of EV BMS Cyber Security Based on Neural Network SOC Prediction
Submitted by grigby1 on Wed, 11/04/2020 - 1:36pm
Measurement
statistical analysis
statistic metrics
state of charge
stability
security of data
pubcrawl
power engineering computing
NeuralWare software
neural network SOC prediction
neural network
neural nets
metrics testing
Metrics
air pollution control
greenhouse gas emission policies
EV BMS cyber security
EV batterys state of charge
Electric Vehicles
electric vehicle market
electric vehicle
cyber security threat
cyber security
BP NN
battery testing
battery testers
Backpropagation
back propagation neural network training
biblio
An Algebraic Expert System with Neural Network Concepts for Cyber, Big Data and Data Migration
Submitted by aekwall on Mon, 10/12/2020 - 11:37am
Relational Database
machine learning experts system
mathematical algebraic form
neural nets
neural network
neural network computational graph structure
neural network node structure
Neural networks
output layers
pubcrawl
machine assistance approach
relational databases
Resiliency
rule probabilities
Scalability
security
structured approach
Syntactics
trees (mathematics)
value probabilities
data migration applications
algebraic expert system
Artificial Intelligence
Bayes methods
Bayesian probability tree approach
Big Data
cognition
Cyber database
data handling
data migration
False Data Detection
expert systems
Expert Systems and Security
grading decisions
Human behavior
Information Assurance
knowledge based systems
knowledge-base organization
Knowledgebase
learning (artificial intelligence)
biblio
Domain Flux-based DGA Botnet Detection Using Feedforward Neural Network
Submitted by grigby1 on Fri, 09/11/2020 - 12:09pm
Botnet detection
real-world domain names
neural network
HMM
frequency-domain analysis
feedforward neural network
edit distance
domain generation algorithm
domain flux-based DGA botnet detection
domain flux-based botnets
Domain Flux
DGA-based botnets
DGA
C&C server
feature extraction
Hidden Markov models
feedforward neural nets
botnet
ROC curve
Dictionaries
Compositionality
Metrics
botnets
invasive software
Correlation
computer network security
Resiliency
pubcrawl
biblio
Countering Malware Via Decoy Processes with Improved Resource Utilization Consistency
Submitted by grigby1 on Fri, 09/04/2020 - 3:16pm
malware
BIOS Security
resource utilization consistency
Probes
heatmap training mechanism
Heating systems
flow graphs
defensive deception
decoy processes
decoy process
control flow graphs
neural network
Human Factors
Scalability
neural nets
Neural networks
learning (artificial intelligence)
Training
resilience
Resiliency
Metrics
pubcrawl
machine learning
resource management
resource allocation
invasive software
biblio
Exploring features of HTTP responses for the classification of devices on the Internet
Submitted by aekwall on Mon, 08/24/2020 - 12:41pm
security researchers
web interfaces
static rules
manually labelling training sets
HTTP responses
HTTP response features
HTTP
future classification
devices on the Internet
automated classification
computer network security
Automated Response Actions
neural network
internet
pattern classification
neural nets
composability
pubcrawl
Resiliency
learning (artificial intelligence)
biblio
Intelligence Slicing: A Unified Framework to Integrate Artificial Intelligence into 5G Networks
Submitted by grigby1 on Thu, 08/13/2020 - 5:07pm
advanced radio transmission
artificial intelligence security
wireless networks
transmitting antennas
networking techniques
mobile networks
MIMO communication
Intelligence slices
industrial network security
fifth-generation networks
channel prediction
autonomous network management
artificial intelligence technology
AI module
AI algorithms
security
5G networks
network infrastructure
neural network
wireless channels
Task Analysis
resource allocation
Prediction algorithms
telecommunication network management
telecommunication computing
5G mobile communication
telecommunication security
pubcrawl
Artificial Intelligence
biblio
Natural Spoken Instructions Understanding for Robot with Dependency Parsing
Submitted by aekwall on Mon, 07/06/2020 - 10:14am
natural spoken instruction understanding
Robot
deep learning algorithms
benchmark ATIS task
dependency features
dependency parsing tree
FBM3
Filling
grammars
intent determination
Hidden Markov models
performance level
slot filling tasks
spoken instruction understanding module
spoken language understanding system
syntactic information
syntactic-based model
window vector
Cyber Dependencies
robots
Task Analysis
learning (artificial intelligence)
Resiliency
pubcrawl
Metrics
neural nets
Labeling
machine learning
trees (mathematics)
Scalability
human-robot interaction
natural language processing
neural network
Syntactics
Human Factors
control engineering computing
Compositionality
speech processing
biblio
Chaotic based Image Encryption - A Neutral Perspective
Submitted by grigby1 on Fri, 06/26/2020 - 12:44pm
encryption
Resiliency
resilience
Random sequences
pubcrawl
Neural networks
neural network
neural nets
information entropy analysis
Informatics
image encryption.
image encryption
Image coding
Entropy
encryption algorithm
chaos
encoding
efficient encryption
efficient algorithms
DNA
cyber-physical systems
Cryptography
correlation coefficient analysis
correlation attacks
Correlation
composability
Chaotic generators
chaotic generator
chaotic communication
chaotic based image encryption
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »