Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Training
biblio
Autoencoder-Based Feature Learning for Cyber Security Applications
Submitted by grigby1 on Mon, 04/02/2018 - 12:40pm
invasive software
Vectors
Training
Resiliency
resilience
pubcrawl
policy-based governance
pattern classification
Metrics
malware classication
malware
machine learning
learning (artificial intelligence)
AE
Intrusion Detection
feature vector
feature learning
feature extraction
encoding
cyber security
computer security
computer network security
autoencoder
Artificial Neural Networks
anomaly intrusion detection
biblio
Network Intrusion Detection for Cyber Security on Neuromorphic Computing System
Submitted by grigby1 on Mon, 04/02/2018 - 12:40pm
policy-based governance
network security
neural chips
Neural networks
neuromorphic cognitive computing
neuromorphic computing
neuromorphic computing system
Neuromorphics
Neurons
NSCS
physical neuromorphic chip
network intrusion detection
power efficient neuromorphic processors
pubcrawl
resilience
Resiliency
security of data
synaptic weights
Training
TrueNorth System
unsupervised deep learning
DVF
auto encoder
Biological neural networks
Cognitive Computing
computer security
crossbar weight
cyber security
Deep Neural Network
discrete values
discrete vector factorization
Artificial Neural Networks
hybrid encoding
IBM neurosynaptic core simulator
IBM TrueNorth neurosynaptic chip
IDS
Intrusion Detection
learning (artificial intelligence)
machine learning
Matrix decomposition
Metrics
biblio
Zero-Day Attack Identification in Streaming Data Using Semantics and Spark
Submitted by grigby1 on Mon, 03/26/2018 - 1:13pm
semantic reasoning
MRMR feature selection algorithm
parallel detection
pattern classification
pubcrawl
Resiliency
security of data
semantic learning
Semantic learning and reasoning
semantic link networks
minimum redundancy maximum relevance feature selection algorithm
Semantics
SLN
Spark Streaming
Spark streaming platform
Sparks
Training
Zero day attacks
zero-day attack identification
feature extraction
cognition
collaborative classification methods
Collaborative mining
composability
Computer hacking
Data Streaming
defense
dynamic semantic graph generation
Anomaly Detection
Feature Selection
Flow Creation
graph theory
groupware
IDS
Intrusion Detection Systems
learning (artificial intelligence)
Metrics
biblio
Fine Tuning Lasso in an Adversarial Environment against Gradient Attacks
Submitted by grigby1 on Mon, 03/19/2018 - 1:59pm
robust classifier
known weaknesses
labeled training data
learning (artificial intelligence)
Metrics
optimization
pattern classification
probability
pubcrawl
resilience
Resiliency
Input variables
Scalability
security of data
single convex optimization
source domain
supervised learning
Synthetic Data
Task Analysis
testing
Toxicology
Training
data set testing
adversarial data
adversarial environment
adversarial learning research
adversarial learning setting
Adversarial Machine Learning
Adversary Models
convex programming
data analysis
Data mining
data mining algorithms
adversarial component
data testing
domain adaptation
domain adaption
feature extraction
Feature Selection
fine tuning lasso
fixed probability distribution
gradient attacks
Human behavior
biblio
On Sequential Selection of Attributes to Be Discretized for Authorship Attribution
Submitted by grigby1 on Mon, 03/19/2018 - 1:38pm
Indexes
Training
stylometry
sequential selection
pubcrawl
pattern classification
naïve Bayes classifier
Naive Bayes
Metrics
merging
authorship attribution
Human behavior
forward sequential selection
Entropy
Electronic mail
discretization
data mining techniques
Data mining
computer science
Bayes methods
biblio
Misclassifications: The Missing Link
Submitted by grigby1 on Mon, 03/19/2018 - 1:37pm
missing link
writing style moulds
Writing
Training
text analysis
Syntactics
Support vector machines
stylometry
stylometric cues
statistical methods
statistical analysis
recommender systems
recommendation system
pubcrawl
proximity
author attribution problem
misclassified books
misclassifications
Metrics
literary style
Length measurement
learning (artificial intelligence)
Human behavior
feature extraction
Electronic mail
domain experts
classification
book similarity
authors
biblio
A New Reliability-Driven Intelligent System for Power System Dynamic Security Assessment
Submitted by grigby1 on Mon, 03/05/2018 - 1:11pm
composability
dynamic networks
feature extraction
Metrics
neural networks security
power system stability
Power system transients
Prediction algorithms
pubcrawl
resilience
Resiliency
security
Stability analysis
Training
biblio
A New Reliability-Driven Intelligent System for Power System Dynamic Security Assessment
Submitted by grigby1 on Mon, 03/05/2018 - 1:10pm
Artificial Neural Networks
composability
dynamic networks
feature extraction
Metrics
neural networks security
power system stability
Power system transients
Prediction algorithms
pubcrawl
resilience
Resiliency
security
Stability analysis
Training
biblio
High-Level Online User Attribution Model Based on Human Polychronic-Monochronic Tendency
Submitted by grigby1 on Mon, 03/05/2018 - 1:03pm
logistic model tree
user interfaces
user identification process
user attribution model
UML behavioral modeling style
Training
temporal model
social network profiling process
Servers
Sea measurements
Scalability
pubcrawl
Polyphasia tendency
policy-based governance
online user attribution process
online profiling process
1-to-N User identification
internet
human preference
human polyphasia tendency
human polychronic-monochronic tendency
human inherent dynamics
Human Factors
Human behavior
forensic identification and profiling process
feature extraction
e-learning profiling process
computer science
collaboration
biometrics (access control)
Behavioral biometrics
attribute-based encryption
biblio
Moving Target Defense Intrusion Detection System for IPv6 based smart grid advanced metering infrastructure
Submitted by K_Hooper on Wed, 02/28/2018 - 11:39am
Ports (Computers)
Training
static based attack detection techniques
smart power grids
smart meters
Smart Grids
smart grid IPv6 based advanced metering infrastructure
smart grid communications
smart grid advanced metering infrastructure
Smart Grid
security of data
Routing
Resiliency
pubcrawl
power system measurement
collaboration
Planar Key
object detection
network traffic
moving target defense intrusion detection system
moving target defense
Metrics
MATLAB
ipv6 security
IP networks
Intrusion Detection Systems
Intrusion Detection
Difference Plane
composability
« first
‹ previous
…
66
67
68
69
70
71
72
73
74
…
next ›
last »