Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Long short-term memory
biblio
Improving DGA-Based Malicious Domain Classifiers for Malware Defense with Adversarial Machine Learning
Submitted by aekwall on Mon, 11/29/2021 - 1:59pm
Computational modeling
Data models
Perturbation methods
Training
Servers
Containers
pubcrawl
Scalability
Resiliency
Adversarial Machine Learning
data privacy
blacklisting
domain generation algorithms
Long short-term memory
signature based defense
biblio
Deep Learning Enabled Intrusion Detection and Prevention System over SDN Networks
Submitted by grigby1 on Tue, 03/09/2021 - 2:38pm
SAE
malicious packets
MLP
Multilayer Perceptron
multilayer perceptrons
network configuration
packet length
Payloads
policy-based governance
prevention system
pubcrawl
machine learning
SDN networks
SDN switch
secure shell brute-force attacks
Software Defined Network
software defined networking
Software Defined Networks
SSH Brute-force
SSH brute-force attack
stacked auto-encoder
Switches
deep learning models
brute force attacks
centralized management approach
Computer crime
computer network security
convolutional neural nets
convolutional neural network
data planes
DDoS Attack
DDoS Attacks
deep learning
anomalous packets
denial-of-service attacks
DL-IDPS
Force
Human behavior
Human Factors
Intrusion Detection
learning (artificial intelligence)
Long short-term memory
LSTM
biblio
Performance Evaluation of Botnet Detection using Deep Learning Techniques
Submitted by grigby1 on Thu, 03/04/2021 - 2:57pm
Reliability
malicious activities
Metrics
Multilayer Perception
multilayer perceptrons
neural nets
neural network
performance evaluation
Performance Metrics
pubcrawl
Long short-term memory
reliable botnet detection
resilience
Resiliency
security
Sensitivity
traffic control
unknown botnet traffic
Zero day attacks
zero-day attack
Data models
botnet
botnet traffic detection
botnet traffic patterns
botnets
composability
computer network security
convolutional neural network
CTU-13 botnet traffic dataset
CTU-13 Dataset
basic network security goals
deep learning
deep learning-based approaches
defense
different deep learning models
hybrid CNN-LSTM
internet
invasive software
known botnet traffic
learning (artificial intelligence)
biblio
DeCrypto Pro: Deep Learning Based Cryptomining Malware Detection Using Performance Counters
Submitted by grigby1 on Fri, 01/22/2021 - 2:38pm
DeCrypto Pro
LSTM
defense mechanisms
advanced persistent threats
antivirus applications
APTs
behavior profiling
benign compression
classification model
collaborative attacks
computational resources
cryptographic operations
cryptojacking
cryptomining
Long short-term memory
DeCrypto Profiler framework
deep cryptomining profiler
mission-critical cybersystems
model selection
operating context profiling system
performance counters
Ransomware
system features
system functionalities
Trojan Laziok
utility function
Windows performance counters
cyberattacks
Predictive models
machine learning
Data mining
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Data models
Computational modeling
random forests
recurrent neural nets
Cryptography
deep learning
pattern classification
malware
invasive software
malware detection
nearest neighbour methods
k-nearest neighbors
Random Forest
advanced persistent threat
APT
deep neural networks
encoding
biblio
Detecting Cyber Threats in Non-English Hacker Forums: An Adversarial Cross-Lingual Knowledge Transfer Approach
Submitted by grigby1 on Fri, 01/15/2021 - 12:24pm
hacker forums
Semantics
pubcrawl
privacy
machine learning algorithms
Long short-term memory
knowledge transfer
Knowledge engineering
Human Factors
Human behavior
Generative Adversarial Learning
generative adversarial networks
dark web
cross-lingual knowledge transfer
Computer hacking
adversarial learning
Scalability
Predictive Metrics
Resiliency
biblio
STDeepGraph: Spatial-Temporal Deep Learning on Communication Graphs for Long-Term Network Attack Detection
Submitted by aekwall on Mon, 08/17/2020 - 11:18am
hybrid deep neural network design
graph Laplacian matrix
attack graphs
dimensionality reduction
graph characterization vectors
graph kernel matrices
graph signal processing
graph similarity measures
graph structures
high-dimensional intrinsic representation
high-dimensional representations
hybrid deep learning models
Matrix converters
kernel-based similarity embedding vector
long-term information learning
long-term network attack detection
network communication data
real-world network attack datasets
spatial-temporal deep learning
spatiotemporal deep learning
structural similarity information
supervised classification task
temporal communication graph
traffic analysis methods
CNN
IP networks
telecommunication traffic
Kernel
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
composability
graph theory
matrix algebra
pattern classification
computer network security
convolutional neural nets
convolutional neural network
network traffic
deep learning
signal processing
LSTM
Predictive Metrics
Laplace equations
Long short-term memory
Graph Kernel
network flows
biblio
LSTM for Anomaly-Based Network Intrusion Detection
Submitted by aekwall on Mon, 05/11/2020 - 11:12am
network traffic
network system
Long-Short-Term Memory
CIDDS dataset
anomaly-based network intrusion detection
Long short-term memory
LSTM
computer science
deep learning
Recurrent neural networks
recurrent neural nets
Intrusion Detection
security of data
Anomaly Detection
testing
Training
network intrusion detection
Metrics
composability
pubcrawl
Resiliency
learning (artificial intelligence)
intrusion detection system
computer network security
biblio
An Effective Android Ransomware Detection Through Multi-Factor Feature Filtration and Recurrent Neural Network
Submitted by aekwall on Mon, 03/23/2020 - 1:25pm
smart phones
multifactor feature filtration
majority voting process
Long short-term memory
filtration
feature selection algorithms
feature filtration techniques
deep learning-based malware detection model
Android ransomware detection
Android malware dataset
Android malware
Android environment
recurrent neural network
defense mechanisms
recurrent neural nets
forensic analysis
security
Malware Analysis
Digital Forensics
Metrics
deep learning
Ransomware
composability
pubcrawl
Resiliency
learning (artificial intelligence)
Feature Selection
feature extraction
mobile computing
invasive software
smart devices
biblio
Network Penetration Identification Method Based on Interactive Behavior Analysis
Submitted by grigby1 on Tue, 01/28/2020 - 2:36pm
penetration attacks
long-term memory shortage
LSTM
malicious attacks
Mathematical model
Metrics
national economy
Network penetration identification method
network penetration recognition technology
ordinary recurrent neural network
penetration attack
Long short-term memory
pubcrawl
recurrent neural nets
recurrent neural network
Recurrent neural networks
Sebek
Sebek technology
short-short time memory network
time series
time series modeling
Hidden Markov models
attack recognition method
attacker information collection
attacker keystroke record
Computer hacking
computer network security
Data models
feature extraction
gradient disappearance problem
gradient explosion
attack identification
honeynet
Human behavior
Human Factors
interaction behavior
interactive behavior analysis
internet
keystroke analysis
keystroke sequences
Logic gates
biblio
Attention in Recurrent Neural Networks for Ransomware Detection
Submitted by aekwall on Mon, 10/07/2019 - 11:42am
Metrics
Windows environment
user access
Scalability
Resiliency
Recurrent neural networks
recurrent neural nets
ransomware sequences
ransomware executables
ransomware detection
ransomware attacks
Ransomware
pubcrawl
pattern locks
organizational level
Microprocessors
attention mechanisms
malware detection
malicious software
LSTM models
LSTM
Long short-term memory
Logic gates
learning (artificial intelligence)
invasive software
Human behavior
deep learning methods
deep learning
computer security
computer architecture
composability
1
2
next ›
last »