Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
deep learning techniques
biblio
Using Deep Learning Techniques for Network Intrusion Detection
Submitted by grigby1 on Tue, 02/23/2021 - 2:47pm
composability
RNN
network intrusion attacks
intelligent network intrusion detection system
cyber-security attacks
convolutional neural network
neural network
deep learning techniques
network intrusion detection
Recurrent neural networks
recurrent neural network
convolutional neural networks
deep learning
learning (artificial intelligence)
recurrent neural nets
network security
computer network security
Resiliency
resilience
Metrics
pubcrawl
Intrusion Detection
convolutional neural nets
CNN
machine learning
feature extraction
biblio
Potential Barriers to Music Fingerprinting Algorithms in the Presence of Background Noise
Submitted by grigby1 on Wed, 01/20/2021 - 4:07pm
iKala dataset
song identification
signal classification
Shazam
Resiliency
resilience
pubcrawl
MusicBrainz dataset
music fingerprinting algorithms
music fingerprint classification
music
MIR-1K dataset
MFP
learning (artificial intelligence)
Image Processing
acoustic feature modeling
Human behavior
Hashing curve detection
digital signatures
digital signature
deep learning techniques
condensed signature
composability
classification
audio signal processing
audio signal
audio sample identification
Acoustic signal processing
Acoustic Fingerprints
Acoustic Fingerprint
biblio
Audio Based Drone Detection and Identification using Deep Learning
Submitted by aekwall on Mon, 08/03/2020 - 10:17am
drone activities
deep learning techniques
drone detection
Acoustic Fingerprinting
Acoustic Fingerprints
audio recorded samples
audio recording
deep neural network algorithms
Drone
Acoustics
drone audio clips
Drone Audio Dataset
drone identification
flying drones
multiprocedural process
private properties
UAVs
Unmanned Aerial Vehicles
convolutional neural network
machine learning algorithms
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
composability
machine learning
malicious activities
drones
Noise measurement
recurrent neural nets
Recurrent neural networks
Artificial Intelligence
deep learning
audio signal processing
autonomous aerial vehicles
recurrent neural network
biblio
A novel network intrusion detection algorithm based on Fast Fourier Transformation
Submitted by aekwall on Mon, 05/11/2020 - 11:19am
image classification
representation learning
network intrusion detection algorithm
Matrix converters
intrusion detection problem
fast Fourier transforms
fast Fourier transformation
Discrete Fourier transforms
FFT
deep learning techniques
NSL-KDD dataset
NSL-KDD
CNN model
deep learning
computer network security
Image coding
Intrusion Detection
network traffic
convolutional neural networks
convolutional neural nets
CNN
network intrusion detection
Metrics
composability
pubcrawl
Resiliency
learning (artificial intelligence)
machine learning algorithms
biblio
Analysis of Cybersecurity Threats in Cloud Applications Using Deep Learning Techniques
Submitted by grigby1 on Wed, 02/26/2020 - 4:41pm
IDS
threat vectors
telecommunications equipment
Support vector machines
security of data
pubcrawl
privacy
neural nets
Metrics
Measurement
learning (artificial intelligence)
cloud applications
enterprise grade security applications
enterprise applications
deep neural networks
deep learning techniques
deep learning
cybersecurity threats
Cybersecurity
cloud environments
Cloud Computing
biblio
Scalable and Configurable End-to-End Collection and Analysis of IoT Security Data : Towards End-to-End Security in IoT Systems
Submitted by grigby1 on Mon, 02/17/2020 - 5:05pm
scalable infrastructures
machine learning
modelling security data
Monitoring
Probes
pubcrawl
Scalability
scalable data collection infrastructure
scalable end-to-end collection
leverage machine learning
Scalable Security
security
security analytics
security data collection systems
security data modelling
security scalability
towards end-to-rnd security
deep learning techniques
complex IoT deployments
Compositionality
computer architecture
computer network security
configurable data collection infrastructure
configurable end-to-end collection
Data collection
data-driven IoT security
collecting processing security-related datasets
effective security analytics algorithms
Internet of Things
IoT platforms
IoT security
IoT security data
IoT systems
learning (artificial intelligence)
biblio
Malware Classification Using Deep Convolutional Neural Networks
Submitted by grigby1 on Mon, 06/10/2019 - 2:01pm
privacy
learning models
machine learning
malware
malware binaries
malware classification
malware images
Metrics
neural network
object detection
Pattern recognition
learning (artificial intelligence)
pubcrawl
resilience
Resiliency
support vector machine
support vector machine classifier training
Support vector machines
transfer learning
visual patterns
visualization
feature extraction
classification
classifier
convolutional neural nets
convolutional neural network
convolutional neural networks
Correlation
DCNN classification
deep convolutional neural networks
deep learning techniques
accuracy levels
Gray-scale
Hamming distance
Human behavior
image classification
image features
image representation
image type
improved image representation
invasive software
biblio
Physical security assessment with convolutional neural network transfer learning
Submitted by K_Hooper on Wed, 02/14/2018 - 11:59am
security of data
physical security
physical security assessment
physical security system
physical security video data
pubcrawl
Resiliency
Scalability
security
Periodic retraining
Support vector machines
target detection
Training
Training data
transfer learning
video signal processing
visible imager data
artificial intelligence security
object recognition tasks
Object recognition
object detection
Nuisance Alarms
neural nets
Metrics
machine learning
learning (artificial intelligence)
human in the loop ground truth data
Human behavior
feature extraction
deep learning techniques
convolutional neural network transfer learning
convolutional neural network
Artificial Neural Networks