Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Neural Network Security
biblio
Neural Network Model for Information Security Incident Forecasting
Submitted by grigby1 on Fri, 05/08/2020 - 1:54pm
neural network model
Time Series Prediction
Time series analysis
time series
security of data
Resiliency
resilience
pubcrawl
Predictive models
policy-based governance
neural network structure
Neural Network Security
artificial neural network
neural network application
neural nets
Metrics
intelligent forecasting system
information security incidents forecasting
information security incident
information security
forecasting
collaboration
Biological neural networks
Artificial Neural Networks
biblio
Network Security Situation Prediction Model Based on Multi-Swarm Chaotic Particle Optimization and Optimized Grey Neural Network
Submitted by grigby1 on Fri, 05/08/2020 - 1:54pm
particle swarm optimisation
Neural Network Security
prediction model
optimized grey neural network
nonlinear mapping
network situation value
network situation
network security situation prediction model
network security protection
network security incidents
multiswarm chaotic particle optimization
MSCPO
mathematical expressions
grey systems
grey neural network
convergence speed
collaboration
Metrics
neural nets
Communication networks
cyber security
Data models
Mathematical model
optimization
computer network security
Resiliency
resilience
policy-based governance
pubcrawl
Neural networks
security
Predictive models
biblio
Real-Time Early Warning of Network Security Threats Based on Improved Ant Colony Algorithm
Submitted by grigby1 on Fri, 05/08/2020 - 1:44pm
energy consumption
Neural Network Security
Threat early warning
optimized algorithm
network security threat real-time early warning
network security threat perception algorithm
network security threat detection process
Improved ant colony algorithm
ant colony optimisation
ant colony algorithm
Alarm systems
neural network
security
Metrics
Artificial Intelligence
stability
network security
real-time systems
Big Data
Communication networks
computer network security
collaboration
policy-based governance
pubcrawl
biblio
ECU Fingerprinting through Parametric Signal Modeling and Artificial Neural Networks for In-vehicle Security against Spoofing Attacks
Submitted by grigby1 on Fri, 05/08/2020 - 1:44pm
parametric signal modeling
ECU fingerprinting
eight-channel lengths
electronic control unit (ECU)
feature-set
Image edge detection
in-vehicle control networks
in-vehicle security
Intrusion Detection System (IDS)
lumped element model
Lumped element model (LEM)
machine learning (ML)
modern electric vehicles
on-board communications
data theft
performance matrix (PM)
Physical layer
received signal
receiver operating characteristic (ROC)
spoofing attacks
traditional cybersecurity methods
Transfer functions
transmitted messages
transmitter
Transmitters
transmitting electronic control unit
unique transfer function
Neural Network Security
artificial neural network (ANN)
pubcrawl
policy-based governance
collaboration
computer network security
message authentication
telecommunication security
Cryptographic Protocols
Protocols
neural nets
Metrics
confidentiality
neural network
Artificial Neural Networks
Neural networks
autonomous vehicles
basic security features
CAN messages
CAN network
channel imperfections
channel-specific step response
communication system
Connected autonomous vehicles
control system parameters
Controller area network (CAN)
controller area network protocol
controller area networks
biblio
Using GRU neural network for cyber-attack detection in automated process control systems
Submitted by grigby1 on Fri, 05/08/2020 - 1:44pm
neural nets
Neural Network Security
operating parameters
multivariate time series
information security breaches
GRU-neural network training
forecasting theory
forecasting multivariate time series
end system devices
cyber-attack detection
automated process control systems
APCS
Time series analysis
forecasting
Metrics
security of data
deep learning
production engineering computing
process control
water treatment
control engineering computing
collaboration
policy-based governance
pubcrawl
time series
Neural networks
Anomaly Detection
security
Training
biblio
Cyberthreat Detection from Twitter using Deep Neural Networks
Submitted by grigby1 on Fri, 05/08/2020 - 1:43pm
security alert
Neural Network Security
Neural networks
open source intelligence platforms
OSINT
pipeline processing
policy-based governance
pubcrawl
public domain software
recurrent neural nets
Resiliency
named entity recognition task
security information
security of data
security-related information
social media networks
social networking (online)
Task Analysis
threat detection
tools
Twitter
cyberthreat detection
bidirectional long short-term memory network
classification task
collaboration
computer security
convolutional neural nets
convolutional neural network
cyber physical systems
cybersecurity information
cybersecurity-related sources
Artificial Neural Networks
cyberthreat intelligence
deep learning
deep neural networks
event management systems
indicators of compromise
information streams
IT infrastructure
learning (artificial intelligence)
Metrics
biblio
LuNet: A Deep Neural Network for Network Intrusion Detection
Submitted by grigby1 on Fri, 05/08/2020 - 1:43pm
recurrent neural nets
Metrics
network attack
network intrusion detection
network intrusion detection techniques
network traffic data
network traffic datasets
network users
Neural Network Security
policy-based governance
pubcrawl
machine learning
recurrent neural network
Recurrent neural networks
Resiliency
security issue
signature-based approach
spatial features
telecommunication traffic
temporal features
Training
feature extraction
AI-based solutions
Artificial Neural Networks
collaboration
computer network security
convolutional neural nets
convolutional neural network
cyber physical systems
Deep Neural Network
detection capability
advanced network attacks
hierarchical CNN+RNN neural network
input traffic data learning
intelligent capability
Intrusion Detection
intrusion detection system
Kernel
large scale network
learning (artificial intelligence)
LuNet
biblio
Encryption Algorithm Based on Neural Network
Submitted by grigby1 on Fri, 05/08/2020 - 1:43pm
decryption
Neural Network Security
unsecure network
unauthenticated users
Soft Computing
public key cryptography
network communication
Encryption technique
encryption algorithm
decryption techniques
confidential data
Communication Network
auto associative neural network
Biological neural networks
Ciphers
Receivers
Metrics
neural nets
network security
sensitive data
security
computer network security
collaboration
policy-based governance
pubcrawl
encryption
Cryptography
biblio
Anomaly Detection using Graph Neural Networks
Submitted by grigby1 on Fri, 05/08/2020 - 1:43pm
security of data
Neural networks
pattern classification
pattern clustering
Peer-to-peer computing
policy-based governance
pubcrawl
Resiliency
security
Neural Network Security
social connection graphs
social network
social network statistical measures
social networking (online)
statistical analysis
Twitter
Twitter dataset
Twitter network
email network
Artificial Neural Networks
classification
clustering
Clustering algorithms
collaboration
cyber physical systems
deep learning
deep neural networks
Anomaly Detection
Enron dataset
Graph Neural Network
graph neural networks
graph structure
graph theory
learning (artificial intelligence)
Metrics
neural nets
biblio
APT Attack Situation Assessment Model Based on optimized BP Neural Network
Submitted by grigby1 on Fri, 05/08/2020 - 1:42pm
APT
Neural Network Security
Training samples
timing
Situation Prediction
security situation
neural network
genetic algorithms
attack situation assessment model
Attack Path
adaptive genetic algorithm
BP Neural Network
Backpropagation
security of data
advanced persistent threat
Metrics
neural nets
Trojan horses
network security
collaboration
policy-based governance
pubcrawl
Neural networks
security
Predictive models
Training
« first
‹ previous
1
2
3
4
5
next ›
last »