Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
neural network
biblio
New TSBuilder: Shifting towards Cognition
Submitted by aekwall on Mon, 05/18/2020 - 10:56am
supervised machine learning
cognition
artificial thinking
human thinking
multilayer Rosenblatt perceptron
natural language texts
new TSBuilder
rigid categorization
rigidity
Biological neural networks
term length
term system builder
term system building
term system construction
Text Mining
TSBuilder
word terms identification
Scalability
neural network
Data mining
natural language processing
text analysis
machine learning
Decision Making
Neurons
standards
deep learning
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
Classification algorithms
Task Analysis
biblio
Neural Network Spam Filtering Technology
Submitted by grigby1 on Fri, 05/08/2020 - 3:01pm
neural nets
unsolicited e-mail
Training
spam filtering
security of data
Resiliency
resilience
pubcrawl
policy-based governance
pattern classification
neural network technology development
neural network spam filtering technology
Neural Network Security
neural network
artificial neural network model
Metrics
information security
information filtering
Filtering
e-mail spam filtering
e-mail messages filtration
e-mail messages classification
databases knowledge discovery technology
Data mining
collaboration
Biological neural networks
Artificial Neural Networks
biblio
Information Network Risk Assessment Based on AHP and Neural Network
Submitted by grigby1 on Fri, 05/08/2020 - 2:54pm
Metrics
Neural Network Security
system risk value
security risk assessment
risk judgment matrix consistency
neural network technology
neural network
information network security risk assessment application
information network risk assessment
automatic assessment
asset risk value
analytic hierarchy process
AHP method
AHP
information network
risk analysis
security of data
neural nets
information networks
Communication networks
Object recognition
matrix algebra
Resiliency
resilience
policy-based governance
pubcrawl
Neural networks
security
risk management
collaboration
Training
biblio
Real-Time Early Warning of Network Security Threats Based on Improved Ant Colony Algorithm
Submitted by grigby1 on Fri, 05/08/2020 - 2:44pm
energy consumption
Neural Network Security
Threat early warning
optimized algorithm
network security threat real-time early warning
network security threat perception algorithm
network security threat detection process
Improved ant colony algorithm
ant colony optimisation
ant colony algorithm
Alarm systems
neural network
security
Metrics
Artificial Intelligence
stability
network security
real-time systems
Big Data
Communication networks
computer network security
collaboration
policy-based governance
pubcrawl
biblio
ECU Fingerprinting through Parametric Signal Modeling and Artificial Neural Networks for In-vehicle Security against Spoofing Attacks
Submitted by grigby1 on Fri, 05/08/2020 - 2:44pm
parametric signal modeling
ECU fingerprinting
eight-channel lengths
electronic control unit (ECU)
feature-set
Image edge detection
in-vehicle control networks
in-vehicle security
Intrusion Detection System (IDS)
lumped element model
Lumped element model (LEM)
machine learning (ML)
modern electric vehicles
on-board communications
data theft
performance matrix (PM)
Physical layer
received signal
receiver operating characteristic (ROC)
spoofing attacks
traditional cybersecurity methods
Transfer functions
transmitted messages
transmitter
Transmitters
transmitting electronic control unit
unique transfer function
Neural Network Security
artificial neural network (ANN)
pubcrawl
policy-based governance
collaboration
computer network security
message authentication
telecommunication security
Cryptographic Protocols
Protocols
neural nets
Metrics
confidentiality
neural network
Artificial Neural Networks
Neural networks
autonomous vehicles
basic security features
CAN messages
CAN network
channel imperfections
channel-specific step response
communication system
Connected autonomous vehicles
control system parameters
Controller area network (CAN)
controller area network protocol
controller area networks
biblio
APT Attack Situation Assessment Model Based on optimized BP Neural Network
Submitted by grigby1 on Fri, 05/08/2020 - 2:42pm
APT
Neural Network Security
Training samples
timing
Situation Prediction
security situation
neural network
genetic algorithms
attack situation assessment model
Attack Path
adaptive genetic algorithm
BP Neural Network
Backpropagation
security of data
advanced persistent threat
Metrics
neural nets
Trojan horses
network security
collaboration
policy-based governance
pubcrawl
Neural networks
security
Predictive models
Training
biblio
Hardware Trojan Insertion and Detection in Asynchronous Circuits
Submitted by grigby1 on Wed, 02/26/2020 - 4:38pm
neural network
Trojan horses
trojan horse detection
Trojan detection methods
synchronous hardware Trojan
supply chain security
Routing
Resiliency
resilience
Random Forest
pubcrawl
Pipelines
asynchronous circuit
logic design
Latches
hardware Trojan threats
hardware Trojan insertion
hardware trojan
Hardware
delays
deep learning
cyber physical systems
asynchronous hardware Trojan circuits
asynchronous circuits
biblio
Representation of White- and Black-Box Adversarial Examples in Deep Neural Networks and Humans: A Functional Magnetic Resonance Imaging Study
Submitted by grigby1 on Tue, 02/18/2020 - 11:53am
resilience
Metrics
neural nets
neural network
neurophysiology
Noise
pubcrawl
representation patterns
representational similarity
medical image processing
Resiliency
Task Analysis
vision
visual perception
visual representation
Visual systems
visualization
white box cryptography
DNNs
Biological neural networks
biomedical MRI
black-box adversarial examples
brain
brain-inspired deep neural networks
complex level visual tasks
composability
computer vision
adversarial example
Facial animation
fMRI
Functional magnetic resonance imaging
functional magnetic resonance imaging study
high-level visual tasks
human performance
human vision
human visual system
biblio
Construction of Cyber Range Network Security Indication System Based on Deep Learning
Submitted by grigby1 on Mon, 02/17/2020 - 5:17pm
machine learning
Viruses (medical)
situational awareness
Resiliency
resilience
relevant network security situation assessment algorithms
quantitative evaluation
qualitative evaluation
pubcrawl
neural network
network security
Metrics
advanced artificial intelligence deep learning technology
learning (artificial intelligence)
Indication System
deep learning
Cyberspace
cyber range network security indication system
cyber range
computer security
computer network security
composability
Artificial Intelligence
biblio
Mathematical Modeling of the Security Management Process of an Information System in Conditions of Unauthorized External Influences
Submitted by aekwall on Mon, 02/17/2020 - 2:22pm
neural network
wavelet transforms
wavelet transform
unauthorized external influences
signal processing security
security of data
security management process
Resiliency
pubcrawl
privacy
Neural networks
Dynamical Systems
neural nets
Metrics
mathematical modeling
information system
impact
dynamic analysis
conflict
composability
adaptive response unit
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »