Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
neural network
biblio
Keystroke Analysis for User Identification Using Deep Neural Networks
Submitted by grigby1 on Tue, 01/28/2020 - 2:36pm
malicious users
user identification
typing style
typing dynamics
supervised learning
pubcrawl
pattern classification
neural network
neural net architecture
multilayer perceptrons
MLP deep neural network
Metrics
message authentication
Artificial Intelligence
learning (artificial intelligence)
keystroke analysis
keystroke
Human Factors
Human behavior
feature model
deep neural network architecture
deep learning-based classifiers
deep learning
decision-trees machine learning algorithm
Decision trees
authentication systems
biblio
Network Intrusion Detection using Supervised Machine Learning Technique with Feature Selection
Submitted by aekwall on Mon, 01/27/2020 - 10:20am
pattern classification
wrapper feature selection
supervised machine learning technique
supervised learning algorithm
intrusion detection success rate
artificial neural network based machine
intrusion
Predictive Metrics
Signal processing algorithms
Artificial Neural Networks
network traffic
neural network
machine learning techniques
network intrusion detection
security of data
neural nets
deep learning
composability
pubcrawl
Resiliency
machine learning
learning (artificial intelligence)
Feature Selection
feature extraction
support vector machine
Support vector machines
machine learning algorithms
Classification algorithms
biblio
Area Constraint Aware Physical Unclonable Function for Intelligence Module
Submitted by grigby1 on Mon, 12/09/2019 - 2:01pm
Hardware
Table lookup
security of IoT device
security countermeasures
PUF performance evaluation
pubcrawl
physical unclonable functions
Physical Unclonable Function
NN
Neurons
neural network
IoT devices
intelligence module
Hardware Security
area constraint aware physical unclonable function
Hamming distance
field programmable gate arrays
edge computing
Cryptography
computational intelligence
Compositionality
composability
circuit area
authentication techniques
authentication
Artificial Neural Networks
artificial intelligence technology
area constraint aware PUF
biblio
Research on Trust Degree Model of Fault Alarms Based on Neural Network
Submitted by grigby1 on Mon, 08/05/2019 - 11:35am
reliance
human trust
neural nets
neural network
Neurons
operator factors
policy-based governance
pubcrawl
Reliability
human machine system
resilience
Resiliency
Scalability
security of data
situational factors
Training
trust degree model
Databases
alarm system
Alarm systems
available experimental studies
Biological neural networks
collaboration
Compliance
computerised instrumentation
data base
alarm errors
Decision Making
false alarm rate
false trust
fault alarms
fault diagnosis
Human behavior
Human Factors
biblio
Classifying Malware Using Convolutional Gated Neural Network
Submitted by grigby1 on Mon, 06/10/2019 - 2:01pm
malware classification
Task Analysis
Resiliency
resilience
Recurrent neural networks
recurrent neural nets
pubcrawl
privacy
pattern classification
neural network
microsoft malware classification challenge
Metrics
malware detection
CNN
malware
malicious software
machine learning
Logic gates
invasive software
information technology society
Human behavior
Gated Recurrent Unit
feedforward neural nets
Deep Neural Network
convolutional neural networks
convolutional gated recurrent neural network model
biblio
Malware Classification Using Deep Convolutional Neural Networks
Submitted by grigby1 on Mon, 06/10/2019 - 2:01pm
privacy
learning models
machine learning
malware
malware binaries
malware classification
malware images
Metrics
neural network
object detection
Pattern recognition
learning (artificial intelligence)
pubcrawl
resilience
Resiliency
support vector machine
support vector machine classifier training
Support vector machines
transfer learning
visual patterns
visualization
feature extraction
classification
classifier
convolutional neural nets
convolutional neural network
convolutional neural networks
Correlation
DCNN classification
deep convolutional neural networks
deep learning techniques
accuracy levels
Gray-scale
Hamming distance
Human behavior
image classification
image features
image representation
image type
improved image representation
invasive software
biblio
Designing Subspecies of Hardware Trojans and Their Detection Using Neural Network Approach
Submitted by grigby1 on Fri, 03/15/2019 - 11:58am
learning (artificial intelligence)
true positive rate
Trojan horses
trojan horse detection
trigger circuits
TPR
third-party vendors
pubcrawl
outsourcing
neural-network based hardware-Trojan detection method
neural network approach
neural network
neural nets
machine-learning-based hardware-Trojan detection method
machine learning
Logic gates
Artificial Neural Networks
invasive software
integrated circuit design
high-performance hardware device
hardware trojan subspecies designing
hardware trojan
hardware devices mass-production
Hardware
gradient methods
gate-level netlist
feature extraction
electronic engineering computing
electric devices
Design Time
Benchmark testing
biblio
An Open-Source Tool for Automated Power Grid Stress Level Prediction at Balancing Authorities
Submitted by aekwall on Mon, 03/04/2019 - 10:48am
Resiliency
pubcrawl
composability
tools
Correlation
automated tool
balancing authority
energy. forecast
grid stress metric
neural network
open-source
power grids
Stress
temperature
Weather forecasting
Automated Response Actions
biblio
Preventing Neural Network Model Exfiltration in Machine Learning Hardware Accelerators
Submitted by grigby1 on Mon, 01/21/2019 - 12:39pm
Metrics
Training
Side-Channels
Scalability
Resiliency
pubcrawl
Neural networks
neural network
model theft
model exfiltration
Adversary Models
memory probing
machine learning
inference
Human behavior
Hardware Security
Hardware
Data models
Context modeling
Computational modeling
biblio
Vulnerability Detection for Source Code Using Contextual LSTM
Submitted by grigby1 on Mon, 01/21/2019 - 12:15pm
CLSTM
component
Compositionality
Conferences
Human behavior
Informatics
Metrics
neural network
pubcrawl
Resiliency
vulnerability detection
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »