Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Training
biblio
Physical security assessment with convolutional neural network transfer learning
Submitted by K_Hooper on Wed, 02/14/2018 - 11:59am
security of data
physical security
physical security assessment
physical security system
physical security video data
pubcrawl
Resiliency
Scalability
security
Periodic retraining
Support vector machines
target detection
Training
Training data
transfer learning
video signal processing
visible imager data
artificial intelligence security
object recognition tasks
Object recognition
object detection
Nuisance Alarms
neural nets
Metrics
machine learning
learning (artificial intelligence)
human in the loop ground truth data
Human behavior
feature extraction
deep learning techniques
convolutional neural network transfer learning
convolutional neural network
Artificial Neural Networks
biblio
Feature-based transfer learning for network security
Submitted by K_Hooper on Wed, 02/14/2018 - 11:59am
signature-based detection systems
network data
network security
nonlabeled testing sets
pattern classification
pubcrawl
Resiliency
Robustness
Scalability
security of data
network attack detection
supervised learning approaches
testing
testing datasets
Training
training dataset
transfer learning
unseen attacks
unseen network attacks
unseen variants
Knowledge engineering
artificial intelligence security
attack behaviors
common base classifier
computer security
different distribution
feature distribution
feature extraction
feature-based transfer learning technique
Human behavior
Analytical models
labeled datasets
labeled training sets
learned model
learned models
learning (artificial intelligence)
machine learning
machine learning-based approaches
Metrics
biblio
Large-Scale Classification of IPv6-IPv4 Siblings with Variable Clock Skew
Submitted by grigby1 on Tue, 02/06/2018 - 2:05pm
machine-learned decision tree
variable clock skew
transport protocols
Training
TCP timestamps
Servers
Resiliency
pubcrawl
pattern classification
Network reconnaissance
network characteristics
Clocks
learning (artificial intelligence)
large-scale classification
IPv6-IPv4 siblings
IPv6 addresses
IPv4 addresses
IP networks
internet
Hardware
feature extraction
Decision trees
biblio
Collaborative security attack detection in software-defined vehicular networks
Submitted by grigby1 on Fri, 02/02/2018 - 1:14pm
security attacks
wireless communication technologies
Wireless communication
vehicular environment
vehicular ad hoc networks
VANET
V2X communication
Training
Support vector machines
support vector machine
software-defined vehicular networks
Software-defined vehicular cloud
software defined networking
short connection time
security threats
security mechanism
Ad Hoc Network Security
security
safety services
Safety
Resiliency
pubcrawl
multiclass support vector machine
Human Factors
Human behavior
computer network security
composability
Communication system security
communication devices
collaborative security attack detection mechanism
collaboration
automotive industry
biblio
Melody: Synthesized datasets for evaluating intrusion detection systems for the smart grid
Submitted by grigby1 on Tue, 01/23/2018 - 3:45pm
emulation
Intrusion Detection
Power measurement
process control
pubcrawl
Scalability
scalable
Scalable Security
security
Smart Grids
Topology
Training
biblio
A novel SVD and online sequential extreme learning machine based watermark method for copyright protection
Submitted by grigby1 on Tue, 01/23/2018 - 3:21pm
learning (artificial intelligence)
watermarking scheme
Watermarking
watermarked image
Training
tools
SVD
singular value decomposition
Resiliency
pubcrawl
PSNR
policy-based governance
Policy
OSELM
original host image
online sequential extreme learning machine based watermark method
BER
IWT domain
IWT
ip protection
intellectual property
image watermarking
Image coding
Electronic mail
discrete wavelet transforms
copyright protection
copyright
computer science
composability
collaboration
blind digital watermark algorithm
Bit error rate
biblio
Mobile biometrics: Towards a comprehensive evaluation methodology
Submitted by grigby1 on Tue, 01/16/2018 - 6:34pm
Mobile communication
Training
testing
Smartphone Authentication
smart phones
Scalability
Resiliency
pubcrawl
Pervasive Computing Security
authentication
Mobile Biometrics
Metrics
Human-computer interaction
Human Factors
Guidelines
biometrics (access control)
biometrics
biblio
Development of a mathematical model of the control beginning of DDoS-attacks and malicious traffic
Submitted by grigby1 on Tue, 01/16/2018 - 6:25pm
internet
Training
telecommunication traffic
subsequent blocking
started attack
Servers
Resiliency
pubcrawl
Network Monitoring
mixed traffic
Metrics
Mathematical model
Malicious Traffic
Algorithm design and analysis
Human behavior
DDoS-attacks
DDoS-attack
DDoS attack detection
Data protection
Cybersecurity
control beginning
computer network security
Computer crime
composability
Clustering algorithms
Classification algorithms
biblio
Prioritized active learning for malicious URL detection using weighted text-based features
Submitted by K_Hooper on Wed, 01/10/2018 - 11:14am
Scalability
Mutual information
natural language processing
pattern classification
Phishing
phishing categorization
PhishMonger's Targeted Brand dataset
prioritized active learning
pubcrawl
Resiliency
Man-machine systems
security analytics
supervised security analytics task
text analysis
text analytics
Training
Uniform resource locators
unlabelled data
weighted text-based features
data-driven analytics
batch learning framework
classification performance
collaboration
Computer crime
computer security
Cyber-security
cyber-security scenario
Data Analytics
data annotations
active learning
feature weight update technique
ground-truth labels
Human behavior
human-machine collaborative approach
learning (artificial intelligence)
machine learning
Malicious threat detection
malicious URL detection
biblio
Intelligent system of knowledge control with the natural language user interface
Submitted by K_Hooper on Wed, 01/10/2018 - 11:14am
Semantics
natural language interfaces
natural language processing
Natural languages
natural language user interface
output machine
parallel computations
parallel method
pubcrawl
Resiliency
Scalability
semantic analysis
natural language interface methods
semantic structures
Skolem-transformation
specialized inference machines
specialized module
standard knowledge
syntactic analysis
testing
test systems
Training
training systems
user interfaces
knowledge base
control systems
deductive inference
first-order predicate calculus
Human behavior
human-computer dialogue capabilities
inference machine
inference mechanisms
intellectual subsystem
intelligence
intelligent interpreter
intelligent system
Computers
knowledge based systems
knowledge control
knowledge processing systems
Knowledge quality control
Knowledge representation
lexical processor
machine testing systems
modern control
morphological analysis
natural language interface
« first
‹ previous
…
68
69
70
71
72
73
74
75
76
…
next ›
last »