Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Forestry
biblio
A Novel Jamming Attacks Detection Approach Based on Machine Learning for Wireless Communication
Submitted by aekwall on Mon, 12/14/2020 - 11:32am
channel surfing
5G
time series
Transmitters
Wireless communication
random forests
Jamming
wireless network
Forestry
random forest algorithm
wireless channels
detection probability
false alarm probability
jamming attacks
jamming attacks detection
jamming signal detection
millimeter wave bands
Random Fores
smart jammers
pubcrawl
telecommunication security
game theory
machine learning algorithms
Support vector machines
support vector machine
learning (artificial intelligence)
machine learning
Resiliency
Receivers
composability
Vegetation
neural network
Fuzzy logic
probability
telecommunication computing
signal detection
Predictive Metrics
biblio
Comparing Explanations between Random Forests and Artificial Neural Networks
Submitted by grigby1 on Tue, 12/01/2020 - 1:02pm
learning algorithm
Vegetation
transparent structure
random forests
Radio frequency
pubcrawl
predictive performance
predictive accuracy
Prediction algorithms
neural nets
Artificial Intelligence
human trust
Human behavior
heuristic explanation method
Forestry
decision making processes
Decision Making
black boxes
Artificial Neural Networks
biblio
Towards Efficient Malware Detection and Classification using Multilayered Random Forest Ensemble Technique
Submitted by grigby1 on Thu, 10/29/2020 - 10:12am
malware authors
Vision-based malware analysis
traditional malware
Resiliency
resilience
pubcrawl
privacy
pattern classification
multilayered random forest ensemble technique
microsoft windows
Metrics
malware patterns
malware images
malware detection
malware classification
Adaptation models
malware
learning (artificial intelligence)
invasive software
hybrid model
Human behavior
Gray-scale
Forestry
feature extraction
Ensemble forest
deep neural networks
deep learning models
cyber security
Computational modeling
biblio
Isolation Forest based Detection for False Data Attacks in Power Systems
Submitted by grigby1 on Wed, 10/14/2020 - 11:40am
Vegetation
real-time data
outlier detection
isolation forest based detection algorithm
isolation forest
integrated communication networks
IF based detection method
entire power grid
bad data detection
false data attack
False Data Detection
Transmission line measurements
cyber physical systems
network information
cyberattack
Forestry
fault diagnosis
false data injection attacks
Smart Grids
power systems
IEEE 118-bus system
state estimation
Cyber Attacks
real-time systems
composability
power system security
Resiliency
resilience
Human behavior
pubcrawl
biblio
Fraud Detection using Machine Learning and Deep Learning
Submitted by aekwall on Mon, 08/24/2020 - 12:37pm
credit card
Europe
Forestry
Credit cards
area under the ROC curve
Australian dataset
autoencoder
benchmark multiple machine learning methods
Boltzmann machines
cost of failure
financial data processing
data mining techniques
Deep belief networks
EU
European dataset
German dataset
k nearest neighbor
Matthews correlation coefficient
restricted boltzmann machine
security checks
pattern classification
Support vector machines
support vector machine
learning (artificial intelligence)
machine learning
Random Forest
Resiliency
pubcrawl
composability
deep learning
Data models
convolutional neural nets
deep learning methods
Data mining
convolutional neural networks
Artificial Neural Networks
belief networks
fraud
fraud detection
biblio
Same App, Different Countries: A Preliminary User Reviews Study on Most Downloaded iOS Apps
Submitted by grigby1 on Thu, 07/30/2020 - 1:33pm
iOS Security
User Reviews Analysis
US App Store
Text Mining
software maintenance
software evolution
requirement engineering
preliminary user reviews study on most downloaded iOS apps
mobile app reviews
mining
differentiate reviews
App Store Analytics
analyzing user reviews
643 user reviews
300 user reviews
15 most downloaded iOS apps
security
Google
Software algorithms
operating systems (computers)
Compositionality
Metrics
mobile computing
software quality
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
Forestry
Data mining
biblio
PGSM-DPI: Precisely Guided Signature Matching of Deep Packet Inspection for Traffic Analysis
Submitted by grigby1 on Fri, 07/03/2020 - 12:26pm
deep packet inspection
feature extraction
Forestry
Inspection
Mathematical model
optimization
Protocols
pubcrawl
resilience
Resiliency
Scalability
supervised learning
biblio
A Differential Privacy Random Forest Method of Privacy Protection in Cloud
Submitted by aekwall on Mon, 06/22/2020 - 10:19am
Decision trees
random forest classification algorithm
random forest algorithm
hybrid decision tree algorithm
high privacy protection
high classification performance
differential privacy random forest method
differential privacy protection
Forestry
classification accuracy
privacy protection
differential privacy
Cloud Computing
Prediction algorithms
pattern classification
privacy
composability
pubcrawl
Human behavior
Resiliency
Random Forest
Classification algorithms
data privacy
Scalability
biblio
K-nearest Neighbor Search by Random Projection Forests
Submitted by grigby1 on Fri, 05/22/2020 - 1:38pm
Clustering algorithms
Vegetation
tree-based methodology
rpForests
random projection forests
multicore computers
kNN search
kNN distances
exponential decay
ensemble size
ensemble random projection trees
ensemble methods
Ensemble
clustered computers
nearest neighbor search
k-nearest neighbor search
learning (artificial intelligence)
search problems
computational complexity
k-nearest neighbors
nearest neighbour methods
Measurement
Metrics
Big Data
random forests
pubcrawl
Unsupervised Learning
Forestry
Data mining
machine learning algorithms
machine learning
biblio
Network Intrusion Detection Mechanisms Using Outlier Detection
Submitted by aekwall on Mon, 05/11/2020 - 10:13am
Intrusion Detection Subsystem
extensive network databases
Forestry
framework conduct
human blunder
information control
information mining
instrument mistake
intrusion
accessible information
network clients
network database framework
network intrusion
network intrusion detection mechanisms
network operations
network route
outlier detection
network intrusion detection
security of data
computer network security
authorisation
Conferences
Resiliency
pubcrawl
composability
Metrics
security
Databases
Vegetation
Data mining
Intrusion Detection
database management systems
XML
network information
« first
‹ previous
1
2
3
4
5
next ›
last »