Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
deep learning model
biblio
Forecasting Crude Oil Prices Using Improved Deep Belief Network (IDBN) and Long-Term Short-Term Memory Network (LSTM)
Submitted by grigby1 on Fri, 03/31/2023 - 8:27am
belief networks
Predictive models
pubcrawl
Metrics
Protocols
energy resources
Fluctuations
Oils
Economics
Electrical Engineering
Crude oil price forecast
deep learning model
Improved Deep Belief Network (IDBN)
Long-Term Short Shor-Term Memory Network (LSTM)
Return Nervous Network (RNN)
biblio
Intelligent SDN Traffic Classification Using Deep Learning: Deep-SDN
Submitted by aekwall on Mon, 01/11/2021 - 1:36pm
deep packet inspection approaches
network architecture
Internet traffic
data plane
control plane
exponential growth
high computational cost
deep learning model
deep packet inspection
accurate traffic classification
centralised network controller
Software-Defined Networks
deep-SDN
fine-grained network management
intelligent SDN traffic classification
network activities
port-based approaches
resource utilisation
Traffic analysis
traffic applications
Traffic classification
pubcrawl
Scalability
telecommunication traffic
Protocols
computer architecture
computer network management
software defined networking
feature extraction
learning (artificial intelligence)
machine learning
Resiliency
Inspection
deep learning
pattern classification
Big Data
internet
Training
software-defined networking
network traffic
SDN
network management
biblio
ScriptNet: Neural Static Analysis for Malicious JavaScript Detection
Submitted by aekwall on Mon, 11/30/2020 - 12:03pm
LSTM
Internet-scale Computing Security
sequential processing layers
ScriptNet system
Privacy-invasive software
preinformant learning
PIL model
neural static analysis
Neural models
neural malicious JavaScript detection
JavaScript files
Internet-scale processing
discriminative training
computer infection threat vector
policy governance
deep learning model
malware
deep learning
program diagnostics
Java
Vectors
machine learning
Neural networks
neural nets
Metrics
malware detection
composability
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
invasive software
biblio
Poisoning Attack in Federated Learning using Generative Adversarial Nets
Submitted by grigby1 on Wed, 11/04/2020 - 2:14pm
learning (artificial intelligence)
Training data
Training
Task Analysis
Servers
security
Scalability
Resiliency
resilience
pubcrawl
private training data
privacy
poisoning attack
AI Poisoning
Human behavior
Generative Adversarial Nets
gan
Gallium nitride
federated learning system
federated learning architecture
federated learning
deep learning model
Data models
convolutional neural nets
Computational modeling
biblio
Recognition of Visually Perceived Compositional Human Actions by Multiple Spatio-Temporal Scales Recurrent Neural Networks
Submitted by grigby1 on Mon, 10/05/2020 - 2:01pm
RGB input data
MSTRNN model aid
multiple spatio-temporal scales recurrent neural network model
multiple timescale recurrent dynamics
neural activities
pubcrawl
recurrent neural nets
recurrent neural network
Recurrent neural networks
learning (artificial intelligence)
spatio-temporal constraints
spatio-temporal information extraction
Spatiotemporal phenomena
symbol grounding
Training
visualization
visually perceived compositional human action recognition
different compositionality levels
Biological neural networks
Compositionality
conventional convolutional neural network model
convolution
Convolutional codes
convolutional neural network (CNN)
critical spatio-temporal information
deep learning model
action recognition
dynamic vision processing
feature extraction
feedforward neural nets
gesture recognition
human action datasets
image motion analysis
image representation
biblio
Learning-Based Time Delay Attack Characterization for Cyber-Physical Systems
Submitted by grigby1 on Fri, 08/07/2020 - 3:39pm
power plants
Logic gates
long time-sequence data
LSTM-based deep learning approach
Metrics
power engineering computing
power generation
power generation control
power plant control system
learning-based time delay attack characterization
pubcrawl
recurrent neural nets
resilience
Resiliency
security of data
Smart Grids
system control commands
Air gaps
learning (artificial intelligence)
Human Factors
Human behavior
delays
delay systems
Delay effects
deep learning model
Data models
cyber-physical systems
cyber-attacks
control systems
control engineering computing
composability
built-in attack characterization scheme
bidirectional long short-term memory units
biblio
SeqFuzzer: An Industrial Protocol Fuzzing Framework from a Deep Learning Perspective
Submitted by grigby1 on Fri, 04/03/2020 - 12:43pm
Protocols
learning (artificial intelligence)
Local area networks
modern industrial control systems
Policy Based Governance
policy-based governance
privacy
protocol frame structures
protocol frames
protocol verification
Industrial Safety
pubcrawl
security
security checks
security vulnerabilities
self learning
SeqFuzzer
stateful protocols
target protocol
vulnerability mining
deep learning perspective
composability
Compositionality
computer architecture
computer network security
Control Automation Technology devices
Data models
Decoding
deep learning
deep learning model
collaboration
EtherCAT
Fuzz Testing
fuzzing
fuzzing framework
industrial communication processes
industrial communication protocols
industrial network
industrial protocol fuzzing framework
biblio
Insider Threat Detection Based on Adaptive Optimization DBN by Grid Search
Submitted by grigby1 on Tue, 01/21/2020 - 11:25am
learning rate
two-dimensional grid
Training
threat detection rate
security of data
search problems
Resiliency
resilience
pubcrawl
policy-based governance
optimization parameters
Optimization methods
one-dimensional parameter optimization
network structure
Metrics
insider threat
learning (artificial intelligence)
insider threat detection method
Human behavior
grid search
deep learning model
deep learning
deep belief net
composability
collaboration
belief networks
adaptive systems
adaptive optimization DBN
adaptive optimization
Adaptation models
biblio
A Study of Network Covert Channel Detection Based on Deep Learning
Submitted by grigby1 on Thu, 09/05/2019 - 11:25am
detection model
Training
security
Scalability
resilience
network covert channel detection
network covert channel
machine learning algorithms
machine learning
learning (artificial intelligence)
information security
feature extraction
algorithmic model
detection algorithms
deep learning model
deep learning algorithm
deep learning
Data models
covert channels
covert channel detection
computer network security
computer covert channel
Compositionality
complex covert channels