Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Neural Network Security
biblio
Application of the Neural Networks for Cryptographic Information Security
Submitted by aekwall on Thu, 05/13/2021 - 10:30am
cyber physical systems
training set
Training
Switches
Secret key
pubcrawl
Neurons
information technology
information security
Neural Network Security
Cryptography
block ciphering
Biological neural networks
Artificial Neural Networks
Metrics
policy-based governance
Resiliency
cyber-physical systems
biblio
Network Security Situation Prediction in Software Defined Networking Data Plane
Submitted by aekwall on Thu, 05/13/2021 - 10:30am
cyber physical systems
time series classification
Switches
software-defined network
security
pubcrawl
Predictive models
Prediction algorithms
Neural networks
network security
Neural Network Security
computer science
Communication networks
bidirectional long short-term memory network
Artificial Neural Networks
Metrics
policy-based governance
Resiliency
cyber-physical systems
biblio
MLTracer: Malicious Logins Detection System via Graph Neural Network
Submitted by grigby1 on Mon, 03/29/2021 - 12:15pm
Graph Neural Network
security
Scalability
real-time systems
pubcrawl
privacy
malicious logins detection
lateral movement
Human Factors
graph neural networks
Neural Network Security
expert systems
Data mining
convolutional neural networks
Conferences
co-attention mechanism
Metrics
policy-based governance
Resiliency
cyber-physical systems
biblio
Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Security
Submitted by grigby1 on Fri, 05/08/2020 - 2:02pm
computer security
Neural Network Security
network intrusion detection system
N-IDS
ICT system
DNN
cyber safety
classical machine learning algorithms
advanced cyber attacks
Biological neural networks
deep neural networks
Metrics
neural nets
learning (artificial intelligence)
deep learning
cyber security
Resiliency
resilience
policy-based governance
pubcrawl
Intrusion Detection
machine learning algorithms
machine learning
collaboration
Training
security of data
biblio
A Temporal Recurrent Neural Network Approach to Detecting Market Anomaly Attacks
Submitted by grigby1 on Fri, 05/08/2020 - 2:02pm
recurrent neural nets
U.S. technology companies
Twitter
TRNN
text sequence dependency
temporal recurrent neural network approach
stock markets
social networking (online)
Social network services
social media
Sequence Prediction
security of data
Resiliency
resilience
Recurrent neural networks
recurrent neural network
Anomaly Detection
pubcrawl
policy-based governance
Neural Network Security
Metrics
market anomaly attacks detection
learning (artificial intelligence)
financial stocks markets
financial social media messages
financial market security
feature extraction
deep learning approaches
commodities markets
collaboration
Cognitive Hacking
Artificial Neural Networks
biblio
Node Identification in Wireless Network Based on Convolutional Neural Network
Submitted by grigby1 on Fri, 05/08/2020 - 2:01pm
wireless network
Neural Network Security
stochastic gradient descent method
softmax model
principal component analysis
node identification
local feature extraction
convolutional neural networks
convolutional neural network
Ad-Hoc Network
gradient methods
wireless networks
computational complexity
Metrics
learning (artificial intelligence)
Ad hoc networks
deep learning
wireless sensor networks
Resiliency
resilience
policy-based governance
pubcrawl
convolutional neural nets
convolution
feature extraction
collaboration
Training
biblio
Security Verification of Artificial Neural Networks Used to Error Correction in Quantum Cryptography
Submitted by grigby1 on Fri, 05/08/2020 - 2:01pm
partially synchronized neural networks
telecommunication security
Synchronization
synchronisation
security verification
Resiliency
resilience
quantum cryptography
pubcrawl
policy-based governance
passive attacks
Artificial Neural Networks
Neurons
Neural Network Security
neural nets
Metrics
machine learning
error rates
error correction codes
error correction
collaboration
biblio
Neural Network Spam Filtering Technology
Submitted by grigby1 on Fri, 05/08/2020 - 2:01pm
neural nets
unsolicited e-mail
Training
spam filtering
security of data
Resiliency
resilience
pubcrawl
policy-based governance
pattern classification
neural network technology development
neural network spam filtering technology
Neural Network Security
neural network
artificial neural network model
Metrics
information security
information filtering
Filtering
e-mail spam filtering
e-mail messages filtration
e-mail messages classification
databases knowledge discovery technology
Data mining
collaboration
Biological neural networks
Artificial Neural Networks
biblio
Information Network Risk Assessment Based on AHP and Neural Network
Submitted by grigby1 on Fri, 05/08/2020 - 1:54pm
Metrics
Neural Network Security
system risk value
security risk assessment
risk judgment matrix consistency
neural network technology
neural network
information network security risk assessment application
information network risk assessment
automatic assessment
asset risk value
analytic hierarchy process
AHP method
AHP
information network
risk analysis
security of data
neural nets
information networks
Communication networks
Object recognition
matrix algebra
Resiliency
resilience
policy-based governance
pubcrawl
Neural networks
security
risk management
collaboration
Training
biblio
Security Situation Prediction based on Hybrid Rice Optimization Algorithm and Back Propagation Neural Network
Submitted by grigby1 on Fri, 05/08/2020 - 1:54pm
evolutionary computation
Neural Network Security
security situation prediction
Neurons
network security situation awareness
hybrid rice optimization algorithm
HRO
Evolutionary algorithms
BP Neural Network
BP network security posture prediction method
backpropagation neural network
Backpropagation
Biological neural networks
security of data
Prediction algorithms
optimisation
Metrics
neural nets
Communication networks
optimization
Resiliency
resilience
policy-based governance
pubcrawl
security
collaboration
« first
‹ previous
1
2
3
4
5
next ›
last »