Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Home
Registration
Program Agenda
Suggested Reading
Venue / Travel
Challenge Problems
Workshop Archives
Files
CPS-VO
»
Computational Cybersecurity in Compromised Environments (C3E)
» ARTICLES OF INTEREST
Articles of Interest
biblio
Deepfakes Are Getting Better, But They're Still Easy to Spot
Submitted by willirn1 on Tue, 09/10/2019 - 10:29am
Articles of Interest
C3E 2019
Cognitive Security
Cognitive Security in Cyber
Deepfakes
Cognitive Security
Articles of Interest
C3E 2019
biblio
Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users
Submitted by Katie Dey on Mon, 09/09/2019 - 10:39pm
Articles of Interest
behavioral simulations
C3E 2019
cognitive modeling
Cognitive Security
Cyber-security
embedded cognition
Human Factors
model tracing
network simulations
training effectiveness
Cognitive Security
Articles of Interest
C3E 2019
biblio
Dagger: Modeling and visualization for mission impact situation awareness
Submitted by Katie Dey on Mon, 09/09/2019 - 2:14pm
HMT
visualization framework
visualization
security
network security data context
network security
modeling framework
modeling
mission impact situation awareness
mission impact assessment
Knowledge representation
Interactions
Human Machine Teaming
C3E 2019
decision-making
Data visualization
data visualisation
Data models
Dagger framework
Cyberspace
cyber situation awareness
Context modeling
Context
computer network security
Computational modeling
Communication networks
Cognitive Security
Articles of Interest
Human Machine Teaming
Interactions
C3E 2019
biblio
Deepfakes Are Getting Better, But They're Still Easy to Spot
Submitted by willirn1 on Fri, 09/06/2019 - 4:06pm
Science of Security
C3E 2019
Cognitive Security
Cognitive Security in Cyber
Deepfakes
Science of Security
Cognitive Security
Articles of Interest
C3E 2019
biblio
To Fight Deepfakes, Researchers Built a Smarter Camera
Submitted by willirn1 on Fri, 09/06/2019 - 4:00pm
CPS Technologies
C3E 2019
Cognitive Security
Cognitive Security in Cyber
CPS Technologies
Deepfakes
smart technology
Cognitive Security
Articles of Interest
C3E 2019
biblio
Facebook Removes a Fresh Batch of Innovative, Iran-Linked Fake Accounts
Submitted by willirn1 on Fri, 09/06/2019 - 2:39pm
Science of Security
C3E 2019
Cognitive Security
Cognitive Security in Cyber
Facebook
FireEye
Science of Security
Cognitive Security
Articles of Interest
C3E 2019
biblio
Outsmarting deep fakes: AI-driven imaging system protects authenticity
Submitted by willirn1 on Fri, 09/06/2019 - 2:28pm
CPS Technologies
AI
C3E 2019
Cognitive Security
Cognitive Security in Cyber
CPS Technologies
Deep Fakes
Digital Watermarks
Cognitive Security
Articles of Interest
C3E 2019
biblio
Adversarial Biometric Recognition : A review on biometric system security from the adversarial machine-learning perspective
Submitted by Katie Dey on Mon, 08/06/2018 - 1:27pm
face spoofing attack
Signal processing algorithms
security
Pattern recognition
machine-learning
machine learning algorithms
machine learning
learning (artificial intelligence)
image recognition
feature extraction
adaptive face-recognition system
Extraction
biometrics (access control)
biometric systems
biometric system security
biometric security
biometric recognition systems
Behavioral science
adversarial biometric recognition
Cognitive Security
Articles of Interest
Extraction
C3E 2019
biblio
Towards Making Systems Forget with Machine Unlearning
Submitted by Katie Dey on Mon, 08/06/2018 - 1:24pm
learning (artificial intelligence)
usability perspective
Training data
summation form
statistical query learning
security perspective
security of data
recommender systems
recommendation engine
privacy risks
machine unlearning
machine learning algorithms
Learning systems
Adversarial Machine Learning
forgetting systems
Forgetting System
Feature Selection
feature modeling
feature extraction
Extraction
data privacy
Data models
data lineage
Computational modeling
complex data propagation network
Cognitive Security
Articles of Interest
Extraction
C3E 2019
biblio
Adversarial Machine Learning in Malware Detection: Arms Race between Evasion Attack and Defense
Submitted by Katie Dey on Mon, 08/06/2018 - 1:23pm
feature manipulations
Windows application programming interface calls
Windows API calls
security regularization term
secure-learning paradigm
SecDefender
portable executable files
PE files
pattern classification
malware detection
malware
learning-based classifier
learning (artificial intelligence)
invasive software
Adversarial Machine Learning
feature extraction
Extraction
EvnAttack
evasion cost
evasion attack model
Evasion Attack and Defense
Data models
Data mining
computer security
Comodo cloud security center
classifier retraining technique
application program interfaces
Cognitive Security
Articles of Interest
Extraction
C3E 2019
« first
‹ previous
1
2
3
4
5
6