Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

long-term memory shortage

biblio

Visible to the public Network Penetration Identification Method Based on Interactive Behavior Analysis

Submitted by grigby1 on Tue, 01/28/2020 - 2:36pm
  • penetration attacks
  • long-term memory shortage
  • LSTM
  • malicious attacks
  • Mathematical model
  • Metrics
  • national economy
  • Network penetration identification method
  • network penetration recognition technology
  • ordinary recurrent neural network
  • penetration attack
  • Long short-term memory
  • pubcrawl
  • recurrent neural nets
  • recurrent neural network
  • Recurrent neural networks
  • Sebek
  • Sebek technology
  • short-short time memory network
  • time series
  • time series modeling
  • Hidden Markov models
  • attack recognition method
  • attacker information collection
  • attacker keystroke record
  • Computer hacking
  • computer network security
  • Data models
  • feature extraction
  • gradient disappearance problem
  • gradient explosion
  • attack identification
  • honeynet
  • Human behavior
  • Human Factors
  • interaction behavior
  • interactive behavior analysis
  • internet
  • keystroke analysis
  • keystroke sequences
  • Logic gates

Terms of Use  |  ©2023. CPS-VO