Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
feature engineering
biblio
Cloud Storage I/O Load Prediction Based on XB-IOPS Feature Engineering
Submitted by grigby1 on Wed, 08/23/2023 - 2:34pm
Schedules
Cloud Computing
Predictive models
security
pubcrawl
Conferences
performance evaluation
Scalability
i-o systems security
System performance
load balance
feature engineering
block storage
Xgboost
biblio
Deep Neural Network Based Efficient Data Fusion Model for False Data Detection in Power System
Submitted by grigby1 on Fri, 07/21/2023 - 1:40pm
power system stability
Termination of employment
feature engineering
Resiliency
system integration
data fusion
False Data Detection
security assessment
Data integration
deep learning
power system
resilience
composability
Data models
Human behavior
pubcrawl
Neural networks
biblio
The Application of 1D-CNN in Microsoft Malware Detection
Submitted by grigby1 on Fri, 12/23/2022 - 10:55am
deep learning
feature extraction
Neural networks
pubcrawl
Metrics
Resiliency
Databases
composability
malware
network security
malware detection
Semantics
Windows Operating System Security
1D-CNN
feature engineering
LightGBM
biblio
Phishing URL Detection via CNN and Attention-Based Hierarchical RNN
Submitted by aekwall on Mon, 01/20/2020 - 11:13am
Phishing Detection
Uniform resource locators
Fuses
attention-based hierarchical recurrent neural network module
attention-based hierarchical RNN
blacklisting
character-level spatial feature representations
convolutional neural network module
deep learning-based approach
feature engineering
Human Factors
phishing uniform resource locators
phishing URL classifier
phishing URL detection
phishing Websites
three-layer CNN
word-level temporal feature representations
zero-day phishing attacks
zero trust
pattern classification
cyber security
Electronic mail
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
policy-based governance
machine learning
Scalability
Computer crime
internet
Web sites
unsolicited e-mail
convolutional neural nets
recurrent neural nets
Phishing
deep learning
biblio
Differential mutual information forward search for multi-kernel discriminant-component selection with an application to privacy-preserving classification
Submitted by grigby1 on Thu, 02/15/2018 - 10:39am
privacy
Measurement
mKDCA feature-map
mobile computing
mobile sensing
multi-kernel learning
multikernel discriminant-component selection
multiple Kernel Discriminant Component Analysis feature-map
Mutual information
pattern classification
machine learning
privacy-aware classification
privacy-preserving classification
pubcrawl
Redundancy
resilience
Resiliency
Scalability
utility classification performance
Human behavior
Artificial Intelligence
Compressive Privacy
data privacy
Differential mutual information
Differential Mutual Information (DMI)
DMI forward search method
feature engineering
Fisher's discriminant analysis
high-quality predictor
AI
human factor
Human Factors
incremental forward search
Kernel
Kernel Discriminant Component Analysis (KDCA)
kernel selection
Kernels
learning (artificial intelligence)
biblio
A user-centric machine learning framework for cyber security operations center
Submitted by K_Hooper on Wed, 02/14/2018 - 11:00am
Scalability
Mathematical model
Metrics
model performance evaluations
Predictive models
preventive technologies
pubcrawl
Resiliency
risk score generation
risky user detection
malicious attacks
security event normalization
security information and event management system
security of data
SIEM
SOC analyst productivity
Symantec SOC production environment
user-centric
user-centric machine learning framework
flag alerts
computer security
cyber security operation center
cyber security operations center
cyber security practitioners
Data collection
Data models
data scientists
false positive rate reduction
feature engineering
artificial intelligence security
Human behavior
label creation
learning (artificial intelligence)
Learning systems
machine learning algorithm selection
machine learning algorithms
machine learning researchers
machine learning system