Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
multilayer perceptrons
biblio
Unsupervised Anomaly Detection in RS-485 Traffic using Autoencoders with Unobtrusive Measurement
Submitted by grigby1 on Fri, 08/18/2023 - 3:14pm
Time series analysis
univariate time series
rs-485
multilayer perceptrons
Resiliency
ICS Anomaly Detection
Time measurement
autoencoder
Physical layer
Anomaly Detection
industrial control system
integrated circuits
industrial control
Protocols
Scalability
security
resilience
pubcrawl
biblio
Intrusion Detection Mechanisms: SVM, random forest, and extreme learning machine (ELM)
Submitted by aekwall on Wed, 03/23/2022 - 8:21am
composability
extreme learning machine
Extreme learning machines
Forestry
Indexes
Intrusion Detection
long term short memory
multilayer perceptrons
Predictive Metrics
pubcrawl
Radio frequency
Random Forest
Resiliency
support vector machine
Support vector machines
biblio
Addressing Imbalanced Data Problem with Generative Adversarial Network For Intrusion Detection
Submitted by aekwall on Mon, 03/29/2021 - 10:58am
Neural network (NN)
imbalanced data problem
Imbalanced dataset
Intrusion Detection
learning (artificial intelligence)
machine learning
MLP Neural Network
Multilayer Perceptron
multilayer perceptrons
network security.
Generators
Neural networks
pattern classification
Predictive Metrics
pubcrawl
Scalability
security of data
Training
UGR16 dataset
Cyber Attacks
Compositionality
Resiliency
adversarial samples
Attack detection
attack labels
balanced attack sample dataset
benign data
classification
Information Reuse and Security
Data models
data wrangling
defense mechanisms
Gallium nitride
Generative Adversarial Learning
generative adversarial network
Generative Adversarial Network (GAN)
generative adversarial networks
biblio
Deep Learning Enabled Intrusion Detection and Prevention System over SDN Networks
Submitted by grigby1 on Tue, 03/09/2021 - 1:38pm
SAE
malicious packets
MLP
Multilayer Perceptron
multilayer perceptrons
network configuration
packet length
Payloads
policy-based governance
prevention system
pubcrawl
machine learning
SDN networks
SDN switch
secure shell brute-force attacks
Software Defined Network
software defined networking
Software Defined Networks
SSH Brute-force
SSH brute-force attack
stacked auto-encoder
Switches
deep learning models
brute force attacks
centralized management approach
Computer crime
computer network security
convolutional neural nets
convolutional neural network
data planes
DDoS Attack
DDoS Attacks
deep learning
anomalous packets
denial-of-service attacks
DL-IDPS
Force
Human behavior
Human Factors
Intrusion Detection
learning (artificial intelligence)
Long short-term memory
LSTM
biblio
Black-Box Modelling of a DC-DC Buck Converter Based on a Recurrent Neural Network
Submitted by aekwall on Tue, 03/09/2021 - 11:04am
autoregressive processes
Training
System Identification
switching convertors
static behavior
recurrent nonlinear autoregressive exogenous neural network
prediction
power converter
nonsynchronous buck converter model
DC-DC power converter
DC-DC buck converter
black-box modelling
black-box model
black-box approach
Resiliency
black-box models
radial basis function networks
Artificial Neural Networks
multilayer perceptrons
DC-DC power convertors
recurrent neural network
recurrent neural nets
black box encryption
power engineering computing
neural network
Metrics
composability
pubcrawl
biblio
Performance Evaluation of Botnet Detection using Deep Learning Techniques
Submitted by grigby1 on Thu, 03/04/2021 - 1:57pm
Reliability
malicious activities
Metrics
Multilayer Perception
multilayer perceptrons
neural nets
neural network
performance evaluation
Performance Metrics
pubcrawl
Long short-term memory
reliable botnet detection
resilience
Resiliency
security
Sensitivity
traffic control
unknown botnet traffic
Zero day attacks
zero-day attack
Data models
botnet
botnet traffic detection
botnet traffic patterns
botnets
composability
computer network security
convolutional neural network
CTU-13 botnet traffic dataset
CTU-13 Dataset
basic network security goals
deep learning
deep learning-based approaches
defense
different deep learning models
hybrid CNN-LSTM
internet
invasive software
known botnet traffic
learning (artificial intelligence)
biblio
DDoS Attacks Detection by Using Machine Learning Methods on Online Systems
Submitted by grigby1 on Tue, 02/16/2021 - 11:59am
DDOS attacks detection
Handheld computers
denial-of-service attack
distributed denial of service attacks
multilayer perceptrons
Cyber Attacks
hypermedia
DDoS attack detection
C-support vector machine
Global Positioning System
detection accuracy rates
Hafnium compounds
HTTP flood
hypertext transfer protocol
k-nearest neighbor
multi layer perceptron
online systems
TCP SYN flood
computer network security
machine learning
cyber security
Intrusion Detection
pubcrawl
Human behavior
Metrics
resilience
Resiliency
learning (artificial intelligence)
Topology
random forests
Support vector machines
Computer crime
composability
nearest neighbour methods
DDoS
Random Forest
biblio
A Multilayer Perceptron-Based Distributed Intrusion Detection System for Internet of Vehicles
Submitted by grigby1 on Mon, 11/02/2020 - 11:09am
MultiLayer Perceptron neural network
wireless sensor networks
vehicular ad hoc networks
Vehicle to Vehicle communication
VANET
V2V communication
telecommunication security
telecommunication computing
sensors
security attacks
Roads
Resiliency
resilience
pubcrawl
multilayer perceptrons
Accidents
Multilayer Perceptron
MLP
Metrics
IoV network
Intrusion Detection
Internet of vehicles network
Internet of Vehicles (IoV)
Internet of Vehicles
Human Factors
embedded systems
distributed processing
distributed intrusion detection system
Ad hoc networks
biblio
An Anomaly Detector for CAN Bus Networks in Autonomous Cars based on Neural Networks
Submitted by aekwall on Mon, 07/20/2020 - 9:44am
critical phase
in-vehicle networks
academic researchers
anomaly detector
anomaly-detection techniques
autonomous cars
CAN bus networks
CAN packets
Controller Area Networks bus
controller area networks
ID field
industrial researchers
MLP Neural Network
MultiLayer Perceptron neural network
real-time detection
robust secure system
securing communication
wireless interfaces
pubcrawl
security of data
Detectors
intrusion detection system
Internet of Things
Protocols
cyber-physical systems
feature extraction
Resiliency
Automotive engineering
Neural networks
Computer hacking
Anomaly Detection
Intrusion Detection
pattern clustering
controller area network security
intrusion detection method
multilayer perceptrons
biblio
Keystroke Analysis for User Identification Using Deep Neural Networks
Submitted by grigby1 on Tue, 01/28/2020 - 1:36pm
malicious users
user identification
typing style
typing dynamics
supervised learning
pubcrawl
pattern classification
neural network
neural net architecture
multilayer perceptrons
MLP deep neural network
Metrics
message authentication
Artificial Intelligence
learning (artificial intelligence)
keystroke analysis
keystroke
Human Factors
Human behavior
feature model
deep neural network architecture
deep learning-based classifiers
deep learning
decision-trees machine learning algorithm
Decision trees
authentication systems
1
2
next ›
last »