Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Predictive Metrics
biblio
Enhancing Image-Based Malware Classification Using Semi-Supervised Learning
Submitted by aekwall on Mon, 02/07/2022 - 5:04pm
Costs
semi-supervised learning
ResNet
Malware Visualization’ ∏-Model
malware classification
LeNet
image-based
Semisupervised learning
Gray-scale
Data models
Predictive Metrics
supervised learning
CNN
malware
Human behavior
Resiliency
pubcrawl
privacy
biblio
EC-Model: An Evolvable Malware Classification Model
Submitted by aekwall on Mon, 02/07/2022 - 5:04pm
Task Analysis
privacy
deep learning
Training
pubcrawl
Resiliency
Human behavior
malware
malware detection
Neurons
Labeling
Predictive Metrics
Adaptation models
multi-task learning
malware classification
biblio
Co-training For Image-Based Malware Classification
Submitted by aekwall on Mon, 02/07/2022 - 5:03pm
visualization
privacy
Training
feature extraction
pubcrawl
Resiliency
Human behavior
computer security
malware
malware detection
Predictive Metrics
Collaborative Work
co-learning
Gray-scale
Semisupervised learning
malware classification
biblio
Graph-Based Malware Detection Using Opcode Sequences
Submitted by grigby1 on Mon, 02/07/2022 - 4:45pm
Histograms
Malware Analysis and Graph Theory
privacy
Predictive Metrics
Human behavior
Resiliency
encryption
feature extraction
graph-based detection
Hardware
static analysis
Image edge detection
malware
Malware Analysis
malware detection
Metrics
opcode analysis
Packed Malware
pubcrawl
resilience
biblio
Intrusion Detection System Framework Using Machine Learning
Submitted by grigby1 on Mon, 02/07/2022 - 4:42pm
machine learning
tools
telecommunication traffic
SVM (Support Vector Machine)
Support vector machines
resilience
privacy
Predictive Metrics
machine learning algorithms
IDS
intrusion detection system
Intrusion Detection
Correlation and Chi-Square Based feature selection algorithms
Artificial Neural Networks
ANN (Artificial Neural Networks)
composability
Resiliency
pubcrawl
biblio
Pay Attention: Improving Classification of PE Malware Using Attention Mechanisms Based on System Call Analysis
Submitted by grigby1 on Mon, 02/07/2022 - 4:42pm
privacy
Predictive Metrics
malware classification
Human behavior
machine learning algorithms
malware
Malware Analysis
Metrics
Neural networks
Prediction algorithms
pubcrawl
resilience
Resiliency
static analysis
Training
Transformers
biblio
Application of Machine Learning in Network Security Situational Awareness
Submitted by grigby1 on Mon, 02/07/2022 - 4:42pm
Support vector machines
composability
Resiliency
Predictive Metrics
education
feature extraction
machine learning
machine learning algorithms
network security
Prediction algorithms
privacy
pubcrawl
resilience
security
situational awareness
biblio
A Robust Support Vector Machine Based Auto-Encoder for DoS Attacks Identification in Computer Networks
Submitted by aekwall on Mon, 01/10/2022 - 12:52pm
intrusion detection system
Support vector machines
support vector machine classification
Scalability
Resiliency
real-time systems
pubcrawl
Predictive Metrics
machine learning
threat vectors
Intrusion Detection
Human behavior
feature extraction
DoS
computer networks
Computational modeling
composability
Attack vectors
biblio
Detection of Distributed Denial of Service Attacks in SDN using Machine learning techniques
Submitted by aekwall on Mon, 01/10/2022 - 12:52pm
machine learning
Support vector machines
support vector machine (SVM)
software-defined network (SDN)
Software algorithms
Software
security
pubcrawl
Predictive Metrics
machine learning algorithms
SDN security
Human behavior
Distributed Denial of Service (DDoS)
denial-of-service attack
Decision trees
Decision Tree
composability
Attack vectors
Resiliency
Scalability
biblio
Heuristic Approach for Countermeasure Selection Using Attack Graphs
Submitted by aekwall on Mon, 01/10/2022 - 12:51pm
Task Analysis
Computational modeling
pubcrawl
Resiliency
composability
risk management
computer security
Manuals
Predictive Metrics
attack graphs
Countermeasure Planning
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
…
next ›
last »