Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
machine learning method
biblio
Research on Network Traffic Identification based on Machine Learning and Deep Packet Inspection
Submitted by grigby1 on Fri, 07/03/2020 - 1:26pm
machine learning method
Training
telecommunication traffic
Scalability
Resiliency
resilience
quality of user service
pubcrawl
probability
Peer-to-peer computing
pattern matching
network traffic monitoring
network traffic identification method
network traffic identification
application traffic
machine learning algorithms
machine learning
learning (artificial intelligence)
Inspection
encryption
dpi
deep packet inspection technology
deep packet inspection
data analysis
Cryptography
computer network security
computer network management
biblio
Word Embedding Method of SMS Messages for Spam Message Filtering
Submitted by aekwall on Mon, 05/18/2020 - 10:55am
SMS Filtering
machine learning method
classification methods
binary classification
CBOW
deep learning method
feedforward neural network
Feedforward neural networks
popular machine learning method
deep learning
SMS messages
spam message filtering
SVM light
word embedding
word embedding method
word embedding technique
Word Vector
security of data
feedforward neural nets
natural language processing
information filtering
Filtering
electronic messaging
SVM
unsolicited e-mail
pattern classification
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
feature extraction
Support vector machines
Scalability
biblio
A New Information Extractor for Profiled DPA and Implementation of High Order Masking Circuit
Submitted by aekwall on Mon, 02/10/2020 - 11:44am
extracting information
Microelectronics Security
time reduction
space reduction
side channel attack
security circuit implementation
profiled stage
profiled DPA
new information extractor
machine learning method
information retrieval
high order masking scheme
high order masking circuit
high order masking
Cryptography
explained local variance
ELV
CHES 2015
Predictive Metrics
computer science
principal component analysis
microsoft windows
Data mining
composability
pubcrawl
Resiliency
learning (artificial intelligence)
Hardware
biblio
Automated Generation and Selection of Interpretable Features for Enterprise Security
Submitted by grigby1 on Fri, 03/22/2019 - 1:00pm
machine learning method
Training data
security of data
security
Scalability
Resiliency
resilience
pubcrawl
pattern clustering
Metrics
malware
malicious activity detection
big data security
learning (artificial intelligence)
Fourier transforms
fourier analysis
feature extraction
enterprise security logs
DNF formulas
cyber security
Clustering algorithms
classifiers
Boolean functions