Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Training
biblio
Comparison of Different Machine Learning Algorithms Based on Intrusion Detection System
Submitted by grigby1 on Wed, 09/20/2023 - 1:07pm
privacy
KDD99
Random Forest
support vector machine
Decision Tree
parallel processing
programming
composability
intrusion detection system
Training
Radio frequency
Resiliency
resilience
pubcrawl
Intrusion Detection
Support vector machines
machine learning algorithms
machine learning
biblio
Malware analysis and multi-label category detection issues: Ensemble-based approaches
Submitted by grigby1 on Wed, 09/20/2023 - 9:52am
deep learning
Human behavior
malware
Malware Analysis
malware category detection
malware scanners
Metrics
Prediction methods
privacy
pubcrawl
resilience
Resiliency
security
spyware
Task Analysis
Training
biblio
Disparity Analysis Between the Assembly and Byte Malware Samples with Deep Autoencoders
Submitted by grigby1 on Wed, 09/20/2023 - 9:51am
Media
Training
Resiliency
resilience
raw binary files
pubcrawl
privacy
noise reduction
Metrics
Assembly file
Malware Analysis
malware
information processing
Human behavior
deep autoencoder
Data models
codes
biblio
Representation Learning with Function Call Graph Transformations for Malware Open Set Recognition
Submitted by grigby1 on Mon, 09/18/2023 - 3:34pm
malware
self-supervised learning
open set recognition
Resiliency Coordinator
representation learning
Costs
Malware Analysis
malware classification
graph theory
Task Analysis
Training
privacy
Resiliency
resilience
Metrics
Human behavior
pubcrawl
Neural networks
security
biblio
Current Trends in Internet of Things Forensics
Submitted by grigby1 on Fri, 09/01/2023 - 2:20pm
Internet of Things
digital forensic DF
Human Factors
blockchains
Regulation
information forensics
digital evidence
Market research
Digital Forensics
Switches
Training
data acquisition
Protocols
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Networked Control System Information Security Platform
Submitted by grigby1 on Thu, 08/24/2023 - 1:59pm
Training
information security
pubcrawl
resilience
Resiliency
Safety
Scalability
industrial control
Industries
industrial control system
Production
networked control systems
Industrial Control Systems
industrial internet
Networked Control System
biblio
VR, Deepfakes and Epistemic Security
Submitted by grigby1 on Thu, 08/24/2023 - 1:50pm
cyber physical systems
Epistemic Security
AIVR Ethics
Threat Modeling
Human Factors
Cyber Physical System
Veins
VR
Deepfakes
ethics
Training
immersive systems
virtual reality
composability
privacy
Safety
Resiliency
resilience
Human behavior
pubcrawl
biblio
Cybersecurity Education in the Age of Artificial Intelligence: A Novel Proactive and Collaborative Learning Paradigm
Submitted by grigby1 on Thu, 08/24/2023 - 1:49pm
Artificial Intelligence
Human Factors
Cyber Physical System
Learning systems
federated learning
cyber physical systems
education
Context modeling
immersive systems
virtual reality
best practices
Training
computer security
composability
privacy
Resiliency
resilience
Human behavior
pubcrawl
machine learning
Cyber-security
biblio
Multiuser, multimodal sensemaking cognitive immersive environment with a task-oriented dialog system
Submitted by grigby1 on Thu, 08/24/2023 - 1:49pm
immersive systems
sensemaking
immersive interactive systems progressive dialog agent
US Department of Homeland Security
Behavioral sciences
interactive systems
Human Factors
Cyber Physical System
particle swarm optimization
cyber physical systems
Training
composability
privacy
Heuristic algorithms
Resiliency
resilience
Human behavior
pubcrawl
collaboration
biblio
Method for Determining the Optimal Number of Clusters for ICS Information Processes Analysis During Cyberattacks Based on Hierarchical Clustering
Submitted by grigby1 on Fri, 08/18/2023 - 3:13pm
cyberattack
cyberattack classification
hierarchical clustering
Production management
Resiliency
ICS Anomaly Detection
Labeling
Measurement
Computer crime
Training
integrated circuits
industrial control system
industrial control
Scalability
resilience
pubcrawl
Anomaly Detection
1
2
3
4
5
6
7
8
9
…
next ›
last »