Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Unsupervised Learning
biblio
An Attack-Resilient Architecture for the Internet of Things
Submitted by grigby1 on Thu, 09/16/2021 - 1:10pm
Access Control
Analytical models
Anomaly Detection
Data models
Internet of Things
Intrusion Detection
machine learning
network security
pubcrawl
resilience
Resiliency
Resilient Security Architectures
Unsupervised Learning
biblio
Practical and White-Box Anomaly Detection through Unsupervised and Active Learning
Submitted by grigby1 on Thu, 03/04/2021 - 2:35pm
pubcrawl
white-box anomaly detection
user experience
Unsupervised Learning
Unsupervised Anomaly Detection
Time series analysis
time series
supervised learning
security of data
RRCF algorithm
RRCF
robust random cut forest
Resiliency
resilience
random forests
White Box Security
Neural networks
Monitoring
Metrics
Labeling
KPI anomaly detection framework
key performance indicators
iRRCF
Forestry
composability
Anomaly Detection
active learning
security
white box
biblio
Unsupervised Discovery Of Semantically Aware Communities With Tensor Kruskal Decomposition: A Case Study In Twitter
Submitted by aekwall on Mon, 02/15/2021 - 4:47pm
recursive community structure
functional Twitter elements
hashtag semantics
heavy degree distribution tail
high clustering coefficient values
higher order analytics
higher order counterpart
Julia
Kruskal decomposition
low diameter
news aggregators
Political Campaigns
politics
rank one tensors
functional coherency
semantic weight
semantically aware communities
Structural coherency
structural Twitter elements
substantial empirical evidence
synthetic graph generation models
tensor algebra
tensor kruskal decomposition
tensor representation
Tucker tensor decomposition
Twitter subgraph
unofficial form
unsupervised discovery
tensors
graph theory
social networking (online)
Twitter
Metrics
social network
network theory (graphs)
cyber physical systems
Unsupervised Learning
Semantics
Compositionality
Periodic structures
singular value decomposition
SVD
pubcrawl
Tucker decomposition
decomposition
analytical methodologies
Blogs
clustered graph spectrum
Community discovery
community structure discovery
compact community size distribution
digital marketing
Facebook groups
fact checking
followfollower relationships
biblio
Pattern Extraction for Behaviours of Multi-Stage Threats via Unsupervised Learning
Submitted by grigby1 on Fri, 01/22/2021 - 1:39pm
Training data
pattern extraction
multistage threats
Multi-stage threats
malicious behaviour
Log-files Analysis
heterogeneous log-files
Cyber Threats Intelligence
Behaviour Analysis
advanced persistent threats
pattern clustering
Clustering algorithms
APT
advanced persistent threat
security of data
Cybersecurity
Scalability
Correlation
Resiliency
resilience
Metrics
Human behavior
pubcrawl
IP networks
Unsupervised Learning
data analysis
Anomaly Detection
feature extraction
biblio
Adversarial Perturbations Fool Deepfake Detectors
Submitted by grigby1 on Fri, 01/15/2021 - 12:02pm
adversarial perturbations
Lipschitz regularization
image restoration
generative convolutional neural networks
fast gradient sign method
Deepfakes
deepfake image enhancement
deepfake detectors
Deep Image Prior
faces
DeepFake
image enhancement
generative adversarial networks
Detectors
feature extraction
Training
gradient methods
resilience
Electronics packaging
Perturbation methods
Scalability
Resiliency
Metrics
Human Factors
Human behavior
pubcrawl
Neural networks
convolutional neural nets
Unsupervised Learning
biblio
Network Anomaly Detection Based on Deep Support Vector Data Description
Submitted by aekwall on Mon, 12/14/2020 - 12:30pm
network anomaly detection
Unsupervised Learning
Training
telecommunication traffic
Support vector machines
support data vector description
security of data
Resiliency
representation learning
pubcrawl
Predictive Metrics
normal traffic features
Neural networks
network traffic anomaly detection
False Data Detection
malicious traffic detection system
KDD CUP99 dataset
intrusion detection system
feature extraction
Deep-SVDD
deep support vector data description
Deep Neural Network
Data models
convolutional neural network
convolutional neural nets
composability
Big Data
Anomaly Detection
biblio
Graph Embedding Based Familial Analysis of Android Malware using Unsupervised Learning
Submitted by grigby1 on Fri, 12/11/2020 - 2:32pm
Malware Analysis
Unsupervised Learning
supervised learning
SRA
smart phones
similarity relationships
Semantics
security
Resiliency
resilience
pubcrawl
privacy
pattern clustering
pattern classification
Metrics
malware link network
analytical workload
malware
learning (artificial intelligence)
invasive software
Human behavior
graph theory
graph embedding techniques
graph embedding
GefDroid
feature extraction
familial analysis
Face
detection algorithms
application program interfaces
Android malware
biblio
A Security System Using Deep Learning Approach for Internet of Vehicles (IoV)
Submitted by grigby1 on Mon, 11/02/2020 - 12:09pm
pubcrawl
Unsupervised Learning
supervised learning
spectrum utilization
Smart Spectrum Utilization
smart offices
Smart Environments
smart cities
security threats
security of data
secure applications
Resiliency
resilience
reliable services
reliable communication services
connected vehicles
neural nets
mobile computing
Metrics
learning (artificial intelligence)
IoV security system
IoT
Internet of Vehicles
Internet of Things
Human Factors
deep learning methodology
deep learning approach
deep learning
critical V2X infrastructures deployment
connected vehicles communication
biblio
Industrial Control Intrusion Detection Model Based on S7 Protocol
Submitted by grigby1 on Fri, 10/16/2020 - 11:32am
S7 protocol
private industrial control protocols
production engineering computing
protocol analysis
protocol parsing technology
Protocols
pubcrawl
resilience
Resiliency
S7 data packet analysis
power systems
Scalability
Siemens Company
static white list configuration complexity
static white list configuration portability
tradtonal protocol parsing technology
Unsupervised Learning
white list detection
white list self-learning
white list self-learning algorithm
industrial control
abnormal S7 protocol packet detection
Anomaly Detection
communication process
Companies
composite intrusion detection method
computer network security
deep analysis algorithm
Heuristic algorithms
ICs
abnormal behavior detection
industrial control intrusion detection model
industrial control network security
industrial control system
Industrial Control Systems
internet
internet technology
Intrusion Detection
national Industrial 4.0 strategy
networked control systems
biblio
Framework for Data Driven Health Monitoring of Cyber-Physical Systems
Submitted by grigby1 on Tue, 10/06/2020 - 2:11pm
real-time systems
feature extraction method
health monitoring
heterogeneous data streams
interconnected computational resources
Monitoring
Neurons
physical resources
power engineering computing
pubcrawl
feature extraction
resilience
Resiliency
Self-organizing feature maps
state estimation
state identification
time state estimation
Unsupervised Learning
visualization technique
data acquisition
building management systems
condition monitoring
continuous monitoring
CPS operational health
CPS resilience
CPS testbed
cyber physical systems
cyber-network
cyber-physical systems
Anomaly Detection
data driven health monitoring
data driven methodology
data driven techniques
data features
Data mining
Degradation
distributed power generation
explainable AI
« first
‹ previous
1
2
3
4
5
next ›
last »