Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Training
biblio
A Methodology for Securities and Cryptocurrency Trading Using Exploratory Data Analysis and Artificial Intelligence
Submitted by grigby1 on Mon, 01/10/2022 - 4:57pm
Metrics
Training
stock market
securities
Resiliency
resilience
random forests
Radio frequency
pubcrawl
probabilistic modelling
Predictive models
Naive Bayes
Analytical models
machine learning
Human behavior
Data models
data analysis
cryptocurrency
composability
classification models
Artificial Neural Networks
artificial neural network
artificial intelligence security
Artificial Intelligence
biblio
A Network Asset Detection Scheme Based on Website Icon Intelligent Identification
Submitted by grigby1 on Mon, 01/10/2022 - 4:56pm
internet
website icon
Training
security
Resiliency
resilience
pubcrawl
network asset
Metrics
Manuals
Artificial Intelligence
Human behavior
detection
Cyberspace
cyber security
computer science
composability
Communications technology
artificial intelligence security
biblio
A Honeypot-based Attack Detection Method for Networked Inverted Pendulum System
Submitted by aekwall on Mon, 01/10/2022 - 12:54pm
simulation
Support vector machines
Data models
Training
pubcrawl
Scalability
Resiliency
Human behavior
cyberattack
Detectors
control systems
covert attacks
networked inverted pendulum system
NipsPot
supported vector machine
Attack vectors
biblio
A Distributed Denial of Service Attack Detection System using Long Short Term Memory with Singular Value Decomposition
Submitted by aekwall on Mon, 01/10/2022 - 12:53pm
machine learning
Attack vectors
SVD
Naive Bayes
distributed denial of service
denial-of-service attack
Decision trees
LSTM
telecommunication traffic
Support vector machines
Human behavior
Resiliency
Scalability
pubcrawl
feature extraction
Training
deep learning
biblio
Adversarial Attack and Defense on Graph-based IoT Botnet Detection Approach
Submitted by aekwall on Mon, 01/10/2022 - 12:49pm
Classification algorithms
Malware Analysis and Graph Theory
privacy
Predictive Metrics
Human behavior
Resiliency
adversarial attack
attack graphs
botnet
Training
composability
Computational modeling
graph analysis
IoT Botnet detection
malware
pubcrawl
Reinforcement learning
supervised learning
biblio
Security Threat Sounds Classification Using Neural Network
Submitted by grigby1 on Mon, 01/10/2022 - 12:30pm
Metrics
Neural Network Security
artificial neural network
Artificial Neural Networks
collaboration
convolutional neural network
convolutional neural networks
cyber physical systems
event detection
Mel frequency cepstral coefficient
Training data
Neural networks
policy-based governance
pubcrawl
resilience
Resiliency
security
Sound recognition and classification
surveillance
Training
biblio
Network Intrusion Detection Model Based on Convolutional Neural Network
Submitted by grigby1 on Mon, 01/10/2022 - 12:30pm
Metrics
Training
security
Resiliency
resilience
pubcrawl
policy-based governance
parameters
Neural networks
network intrusion detection
Neural Network Security
deep learning
cyber physical systems
convolutional neural networks
convolutional neural network
collaboration
Artificial Neural Networks
artificial neural network
Adaptation models
biblio
Symbolic AI for XAI: Evaluating LFIT Inductive Programming for Fair and Explainable Automatic Recruitment
Submitted by grigby1 on Wed, 12/22/2021 - 12:55pm
biometrics (access control)
Conferences
machine learning algorithms
Neural networks
pubcrawl
resilience
Resiliency
Resumes
Scalability
tools
Training
xai
biblio
OA-GAN: Overfitting Avoidance Method of GAN Oversampling Based on xAI
Submitted by grigby1 on Wed, 12/22/2021 - 12:53pm
deep learning
Discriminator
gan
generative adversarial networks
generator
Generators
Overfitting
pubcrawl
resilience
Resiliency
Scalability
simulation
Training
xai
biblio
A Novel Method for Malicious Implanted Computer Video Cable Detection via Electromagnetic Features
Submitted by grigby1 on Mon, 12/20/2021 - 1:19pm
Metrics
Training
Software
side-channel attacks
Safety
Resiliency
resilience
pubcrawl
Prediction algorithms
Air gaps
Human behavior
hardware Trojan detection
Hardware
feature extraction
EMD
Electromagnetic compromising emanation
composability
« first
‹ previous
…
27
28
29
30
31
32
33
34
35
…
next ›
last »