Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
classification
biblio
Improving Black Box Classification Model Veracity for Electronics Anomaly Detection
Submitted by aekwall on Tue, 03/09/2021 - 11:05am
electronics anomaly detection
fault detection
KNN
BB-stepwise algorithm
black box
black box classification model veracity
black box model
classification model transparency
data driven classification models
decision tree models
fault diagnosis
electronics devices
electronics industry
higher transparency
Industrial electronics
KNN models
KNN-stepwise
manufactured electronics
Stepwise
Metrics
performance evaluation
Classification algorithms
Data models
nearest neighbour methods
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
composability
Conferences
pattern classification
manufacturing systems
production engineering computing
black box encryption
Decision trees
classification
Veracity
Feature Selection
biblio
Combating TCP Port Scan Attacks Using Sequential Neural Networks
Submitted by grigby1 on Tue, 02/23/2021 - 1:57pm
port scans
transport protocols
telecommunication traffic
TCP port scan attacks
TCP packet
TCP datagrams
sequential neural networks
Scalability
Resiliency
resilience
pubcrawl
attack reconnaissance tool
NMAP scan pcap files
Neural networks
neural nets
Network reconnaissance
learning (artificial intelligence)
general packetized traffic
computer network security
complex TCP classes
Communication networks
classification
biblio
Cookies in a Cross-site scripting: Type, Utilization, Detection, Protection and Remediation
Submitted by grigby1 on Wed, 02/10/2021 - 12:20pm
Browsers
Cross Site Scripting
XSS
spyware
protection
mitigation
cookies
Cisco 2018
artificial intelligence techniques
cross-site scripting
classification
web applications
Cryptography
Artificial Intelligence
security vulnerabilities
Data protection
internet
Scalability
Resiliency
resilience
Human behavior
pubcrawl
security of data
encryption
biblio
Potential Barriers to Music Fingerprinting Algorithms in the Presence of Background Noise
Submitted by grigby1 on Wed, 01/20/2021 - 3:07pm
iKala dataset
song identification
signal classification
Shazam
Resiliency
resilience
pubcrawl
MusicBrainz dataset
music fingerprinting algorithms
music fingerprint classification
music
MIR-1K dataset
MFP
learning (artificial intelligence)
Image Processing
acoustic feature modeling
Human behavior
Hashing curve detection
digital signatures
digital signature
deep learning techniques
condensed signature
composability
classification
audio signal processing
audio signal
audio sample identification
Acoustic signal processing
Acoustic Fingerprints
Acoustic Fingerprint
biblio
Identification of Computer Displays Through Their Electromagnetic Emissions Using Support Vector Machines
Submitted by aekwall on Mon, 12/14/2020 - 11:28am
information security
Training
TEMPEST information security problem
tempest
Support vector machines
signal processing
security of data
Resiliency
pubcrawl
Predictive Metrics
pattern classification
Monitoring
matrix algebra
Kernel
computer displays
Image reconstruction
image classification
F1-score
Electromagnetics
electromagnetic emissions
display image capture
confusion matrix
Computer graphics
Antenna measurements
Artificial Intelligence
classification
composability
biblio
Applications of Graph Integration to Function Comparison and Malware Classification
Submitted by grigby1 on Fri, 12/11/2020 - 1:34pm
pubcrawl
NET
pagerank
PageRank measure integration vectorization
PageRank vector
pattern classification
Perron vector
PMIV
privacy
probability
probability measure
Metrics
random forests
resilience
Resiliency
set theory
standalone classifier
text analysis
text-only feature space
vanilla random forest
vertex set
hand-engineered functions
abstract syntax tree
classification
code block
decompilation
directed graphs
easy-to-compute glass-box vectorization scheme
feature extraction
function comparison
graph integration
graph theory
.NET files
Human behavior
invasive software
Lebesgue antiderivatives
machine learning
malware
Malware Analysis
malware classification
markov chain
Markov processes
biblio
Identification of Darknet Markets’ Bitcoin Addresses by Voting Per-address Classification Results
Submitted by grigby1 on Fri, 09/04/2020 - 2:58pm
bitcoin security
Weapons
voting per-address classification
security forensics aspect
Measurement
law enforcement
illegal products
forensic
DNM
decentralized digital currency
darknet markets
common ledger
classification
Bitcoin transactions
data privacy
financial data processing
bitcoin
drugs
Distributed databases
Roads
cryptocurrencies
blockchain
Human behavior
pubcrawl
machine learning
feature extraction
Scalability
biblio
NO-DOUBT: Attack Attribution Based On Threat Intelligence Reports
Submitted by grigby1 on Fri, 08/28/2020 - 11:23am
Metrics
Training
threat intelligence reports
threat intelligence
threat actors
text representation algorithm
text analysis
Text
Task Analysis
security literature
security analytics
security
pubcrawl
NLP
natural language processing
Information Reuse and Security
malware
machine learning algorithms
machine learning
learning (artificial intelligence)
invasive software
Human behavior
feature extraction
composability
classification
attribution
attack attribution
Resiliency
Compositionality
biblio
Research on Intrusion Detection Based on Improved DBN-ELM
Submitted by aekwall on Mon, 08/24/2020 - 12:37pm
pattern classification
majority voting
Deep confidence network
DBN-ELM
classifier
Deep Belief Network
extreme learning machine
NSL-KDD dataset
belief networks
feedforward neural nets
Training
Intrusion Detection
Neurons
classification
composability
pubcrawl
Resiliency
feature extraction
machine learning algorithms
Classification algorithms
security of data
biblio
Optimized Activation Function on Deep Belief Network for Attack Detection in IoT
Submitted by aekwall on Mon, 08/24/2020 - 12:37pm
optimisation
Proposed Feature Extraction
operational security
Lion Algorithm
higher-order statistical features
feature extraction process
feature classification process
DP management
attack detection system
activation function optimization
Deep Belief Network
belief networks
Attack detection
classification
statistical analysis
IoT
Training
pattern classification
Neurons
optimization
composability
pubcrawl
Resiliency
feature extraction
Classification algorithms
security
Internet of Things
Conferences
security of data
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »