Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Intrusion Detection
biblio
Intrusion detection on robot cameras using spatio-temporal autoencoders: A self-driving car application
Submitted by grigby1 on Thu, 12/17/2020 - 1:54pm
security
resilience
Resiliency
robot cameras
Robot Operating System
robot operating systems
Robot vision systems
robust solutions
ROS
pubcrawl
security of data
self-driving cars industry
spatio-temporal autoencoders
suspicious frames
telecommunication security
Training
unsupervised anomaly detection tool
existing security breaches
camera frames
camera vulnerabilities
Cameras
car application
Decision Making
decision-making process
embedded cameras
environment discovery
Autonomous automobiles
Human behavior
Human Factors
Image reconstruction
important fields
Intrusion Detection
mobile robots
policy-based governance
biblio
A Deep Learning Based Intrusion Detection System on GPUs
Submitted by grigby1 on Tue, 12/01/2020 - 1:47pm
information security market
security breaches
Resiliency
resilience
real-world operations
pubcrawl
password protections mechanisms
parallel computing
optimization functions
neural network approach
neural nets
modern learning mechanism
market computers
learning (artificial intelligence)
intrusion detection system
Intrusion Detection
Access controls
IDS system
IDS on GPU
IDS
graphics processing units
GPUs
firewalls
encryption mechanisms
dynamic intrusion detection mechanism
deep learning based intrusion detection system
deep learning algorithms
deep learning
cyber world
composability
Big Data
authorisation
biblio
Radial Basis Function (RBF) Based on Multistage Autoencoders for Intrusion Detection system (IDS)
Submitted by grigby1 on Tue, 12/01/2020 - 1:47pm
pubcrawl
Training
testing
Support vector machines
security of data
Resiliency
resilience
RBF-based multistage autoencoders
RBF training
RBF
radial basis function networks
radial basis function
auto-encoders
MATLAB2018
MATLAB
Mathematical model
learning (artificial intelligence)
intrusion detection system
Intrusion Detection
IDS attacks
IDS
Feature Selection
feature extraction
composability
biblio
Proposed security by IDS-AM in Android system
Submitted by grigby1 on Tue, 12/01/2020 - 1:45pm
intrusion detection system
smart phones
security of data
Resiliency
resilience
Monitoring
mobile systems
mobile environment
mobile computing
mobile agents
malware
malicious behavior
pubcrawl
Intrusion Detection
IDS-AM
IDS
feature extraction
Data mining
composability
attacks
Android system
Android OS
android
biblio
Dynamic security management driven by situations: An exploratory analysis of logs for the identification of security situations
Submitted by grigby1 on Fri, 11/20/2020 - 2:27pm
NotPetya
WannaCry
SoC
situation-driven framework
SIEM
security situation
Security Policies Analysis
security operation centers
security incident
security administrators
Radar
pubcrawl
policy-based governance
APT
networks security experts
machine learning based approaches
loC
learning (artificial intelligence)
Intrusion Detection
event management solutions
dynSMAUG
dynamic security management
cyberattacks
computer network security
CEP
biblio
Machine Learning Based Physical-Layer Intrusion Detection and Location for the Smart Grid
Submitted by grigby1 on Fri, 11/20/2020 - 2:05pm
security of data
Power cables
power engineering computing
power system security
privacy
pubcrawl
radio networks
resilience
Resiliency
Scalability
policy-based governance
smart grid communication data
smart grid consumer privacy
smart grid data security
Smart Grids
smart power grids
stand-alone solution
Task Analysis
upper layer techniques
Intrusion Detection
carrier transmission on power lines
collaboration
communication purposes
composability
continuous bidirectional information exchange
cryptographic techniques
Human behavior
ideal intruder detection rates
Impedance
active intruder
learning (artificial intelligence)
machine learning
Metrics
modems
network stack
PHY design
physical layer methods
physical-layer intrusion detection
biblio
Network Intrusion Detection in Smart Grids for Imbalanced Attack Types Using Machine Learning Models
Submitted by grigby1 on Fri, 11/20/2020 - 2:05pm
imbalanced attack types
network intrusion detection
advanced metering infrastructure
imbalanced data
privacy concerns
machine learning models
smart meter
automatic meter reading
boosting
critical security service
generation power grid paradigm
Smart Grids
legacy information
low detection rates
ongoing attacks
smart grid systems
smart information
system operator
time information
time-of-use pricing
smart grid consumer privacy
policy-based governance
learning (artificial intelligence)
security of data
Training
machine learning
machine learning algorithms
Intrusion Detection
pubcrawl
Human behavior
Metrics
privacy
collaboration
resilience
Resiliency
security
Scalability
power engineering computing
Smart Grid
smart power grids
composability
biblio
Compositional Data Analysis with PLS-DA and Security Applications
Submitted by aekwall on Mon, 11/09/2020 - 1:13pm
Euclidean distance
Information Reuse and Security
spam filters
PLS-DA algorithm
partial least squares discriminant analysis
Least squares approximations
isometric log ratio transformation
information system security applications
ILR
data-based power transformation
data science models
compositional vectors
compositional data analysis
Compositional data
Aitchison transformation
Intrusion Detection
Loading
Compositionality
statistical analysis
data analysis
Mathematical model
spam filtering
unsolicited e-mail
standards
pubcrawl
Resiliency
Electronic mail
Data models
security of data
biblio
Addressing Adversarial Attacks Against Security Systems Based on Machine Learning
Submitted by grigby1 on Wed, 11/04/2020 - 2:16pm
machine learning
spam
Scalability
Resiliency
resilience
pubcrawl
poisoning attacks
poisoning attack
pattern classification
Organizations
network intrusion detection
malware
machine-learning classifiers
adversarial attacks
learning (artificial intelligence)
invasive software
Intrusion Detection
Human behavior
evasion attacks
Detectors
deep learning
cyber security platforms
cyber detector
Computer crime
AI Poisoning
biblio
SoCINT: Resilient System-on-Chip via Dynamic Intrusion Detection
Submitted by grigby1 on Mon, 11/02/2020 - 12:29pm
Monitoring
Trojan horses
system-on-chip
software tools
SoCs
SoCINT
security
Runtime system
Resiliency
resilience
Registers
pubcrawl
policy-based governance
open source processor
composability
IP networks
Intrusion Detection
intellectual property security
intellectual properties
industrial property
Hardware Trojans
hardware tracing
Hardware Security
Hardware
FPGA platform
field programmable gate arrays
dynamic intrusion detection approach
« first
‹ previous
…
22
23
24
25
26
27
28
29
30
…
next ›
last »