Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

detection problem

biblio

Visible to the public Node Copying for Protection Against Graph Neural Network Topology Attacks

Submitted by aekwall on Mon, 08/17/2020 - 11:18am
  • Topology
  • similarity structure
  • semi-supervised learning
  • prediction capability
  • node copying
  • graph topology
  • graph neural network topology attacks
  • graph convolutional networks
  • graph based machine
  • downstream learning task
  • detection problem
  • deep learning models
  • corruption
  • attack graphs
  • graph connectivity
  • Predictive Metrics
  • security of data
  • adversarial attacks
  • network topology
  • network theory (graphs)
  • Training
  • Prediction algorithms
  • Neural networks
  • neural nets
  • Computational modeling
  • graph theory
  • composability
  • pubcrawl
  • Resiliency
  • learning (artificial intelligence)
  • Task Analysis
biblio

Visible to the public Detection of Phishing Attacks

Submitted by grigby1 on Tue, 11/26/2019 - 3:48pm
  • Phishing
  • information security
  • Intrusion Detection
  • Intrusion Detection Systems
  • login credentials
  • mail contents
  • malicious links
  • money loss
  • official person
  • identity theft
  • phishing attacks
  • phishing emails
  • Postal services
  • pubcrawl
  • spam mails
  • spam words
  • Uniform resource locators
  • unsolicited e-mail
  • detection problem
  • attachments
  • attacker
  • Bayes methods
  • Bayesian algorithm
  • Classification algorithms
  • communication mediums
  • Computer crime
  • cyber attack
  • Anti Phishing Simulator
  • digital simulation
  • e-mail
  • e-mails harm victims
  • Electronic mail
  • Filtering
  • Human behavior
  • human factor

Terms of Use  |  ©2023. CPS-VO