Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Forestry
biblio
Intrusion Detection Mechanisms: SVM, random forest, and extreme learning machine (ELM)
Submitted by aekwall on Wed, 03/23/2022 - 9:21am
composability
extreme learning machine
Extreme learning machines
Forestry
Indexes
Intrusion Detection
long term short memory
multilayer perceptrons
Predictive Metrics
pubcrawl
Radio frequency
Random Forest
Resiliency
support vector machine
Support vector machines
biblio
URL Phishing Detection using Machine Learning Techniques based on URLs Lexical Analysis
Submitted by grigby1 on Fri, 02/25/2022 - 1:35pm
composability
URL analysis
Phishing Detection
GBC
Random Forest
neural network
middleware security
Uniform resource locators
Phishing
Robustness
Organizations
SVM
collaboration
policy-based governance
pubcrawl
Neural networks
machine learning
Support vector machines
Forestry
biblio
Impact of Bushfire Dynamics on the Performance of MANETs
Submitted by grigby1 on Tue, 02/08/2022 - 11:48am
Handover
MANET security
Bushfire Communications
Unmanned Aerial Vehicles
QoI
Degradation
MANETs
simulation
Compositionality
Forestry
Ad hoc networks
composability
Wireless communication
Resiliency
resilience
Metrics
pubcrawl
biblio
Anomaly Detection using Machine Learning to Discover Sensor Tampering in IoT Systems
Submitted by grigby1 on Mon, 02/07/2022 - 4:47pm
real-time systems
traffic control
Traffic analysis
Smart City
sensor tampering
Sensor Systems
security
Resiliency
resilience
Pervasive Computing Security
pubcrawl
privacy
machine learning
Internet of Things
Forestry
composability
Anomaly Detection
biblio
Analysis of Algorithms for User Authentication using Keystroke Dynamics
Submitted by grigby1 on Tue, 08/17/2021 - 4:17pm
authentication
Forestry
Heuristic algorithms
Human behavior
keystroke analysis
keystroke dynamics
machine learning
Metrics
password
pubcrawl
tuning
User Authentication and XGBoost
Vegetation
biblio
Hybrid Attack Detection Framework for Industrial Control Systems using 1D-Convolutional Neural Network and Isolation Forest
Submitted by grigby1 on Tue, 03/30/2021 - 11:53am
Industrial Control System (ICS)
SWaT testbed
sensors
secure water treatment
Scalability
Resiliency
resilience
pubcrawl
production engineering computing
process control
neural nets
learning (artificial intelligence)
isolation forest-based detection model
Isolation Forest (IF)
industrial plants
1D-CNN model
industrial control system
industrial control
ICS Anomaly Detection
ICs
Forestry
feature extraction model
feature extraction
Data models
Convolutional Neural Network models
convolutional neural network (CNN)
control engineering computing
Auto-Encoder (AE)
Anomaly Detection
actuators
biblio
Mobile Botnet Detection: A Deep Learning Approach Using Convolutional Neural Networks
Submitted by grigby1 on Tue, 03/09/2021 - 2:22pm
mobile devices
ISCX botnet dataset
learning (artificial intelligence)
machine learning
machine learning classifiers
malicious apps
Metrics
mobile botnet detection
mobile computing
invasive software
mobile operating systems
pattern classification
program diagnostics
pubcrawl
resilience
Resiliency
smart phones
static app features
CNN-based approach
Android botnet detection
Android Botnets
Android platform
Androids
botnet
botnet apps
Botnet detection
botnets
Android (operating system)
CNN-based model
composability
convolutional neural nets
convolutional neural networks
deep learning
feature extraction
Forestry
Humanoid robots
biblio
Practical and White-Box Anomaly Detection through Unsupervised and Active Learning
Submitted by grigby1 on Thu, 03/04/2021 - 2:35pm
pubcrawl
white-box anomaly detection
user experience
Unsupervised Learning
Unsupervised Anomaly Detection
Time series analysis
time series
supervised learning
security of data
RRCF algorithm
RRCF
robust random cut forest
Resiliency
resilience
random forests
White Box Security
Neural networks
Monitoring
Metrics
Labeling
KPI anomaly detection framework
key performance indicators
iRRCF
Forestry
composability
Anomaly Detection
active learning
security
white box
biblio
SEADer++ v2: Detecting Social Engineering Attacks using Natural Language Processing and Machine Learning
Submitted by aekwall on Mon, 02/22/2021 - 1:38pm
natural language processing
social networks potential hackers
social engineering attacks detection
social attacks
SEADer++ v2
potential attacks
natural language processing steps
future attacks
Forestry
blacklisting
social engineering
Attack detection
cyber security
security of data
Mathematical model
Libraries
internet
social networking (online)
machine learning
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
Classification algorithms
Scalability
biblio
Safety and Damage Assessment Method of Transmission Line Tower in Goaf Based on Artificial Intelligence
Submitted by grigby1 on Tue, 02/16/2021 - 1:41pm
structural engineering computing
damage identification
finite element simulation model
foundations
geometric model
Goaf
mining industry
operation safety
random forest algorithm
damage assessment method
structural reliability model
surface subsidence
tower collapse
tower foundation interaction
transmission line tower
transmission line tower safety
Damage Assessment
Forestry
coal seam
coal mine goaf
coal
Transmission line measurements
mining
Poles and towers
power transmission lines
finite element analysis
Reliability
random forests
Safety
Resiliency
resilience
pubcrawl
Artificial Intelligence
« first
‹ previous
1
2
3
4
5
next ›
last »