Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
GCN
biblio
Mal-Bert-GCN: Malware Detection by Combining Bert and GCN
Submitted by grigby1 on Mon, 09/18/2023 - 4:34pm
graph theory
Process grap
API Sequence
Resiliency Coordinator
GCN
BERT
Behavioral sciences
graph neural networks
Malware Analysis
malware detection
deep learning
Technological innovation
Semantics
malware
privacy
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Deep Learning Methods for Fake News Detection
Submitted by grigby1 on Thu, 06/29/2023 - 4:12pm
Prediction algorithms
Training
supervised learning
social networking (online)
Semisupervised learning
Scalability
Resiliency
resilience
pubcrawl
DeepFake
Neural networks
Metrics
Market research
Human behavior
GCN
fake news
deep learning
CNN
biblio
Graph Convolutional Network-based Scheduler for Distributing Computation in the Internet of Robotic Things
Submitted by grigby1 on Fri, 02/24/2023 - 4:46pm
Internet of Things
machine learning
machine learning algorithms
pubcrawl
Resiliency
Scalability
military communication
network topology
resilience
robotics
scheduling
iobt
Processor scheduling
Human Factors
GCN
graph convolutional network
biblio
Anomaly Detection with Graph Convolutional Networks for Insider Threat and Fraud Detection
Submitted by grigby1 on Fri, 06/26/2020 - 1:04pm
graph theory
security of data
security
Scalability
Resiliency
real-world insider threat data
pubcrawl
Organizations
Metrics
malicious threat groups
machine learning
learning (artificial intelligence)
Insider Threat Detection
Image edge detection
Anomaly Detection
graph convolutional networks
GCN
fraud detection
fraud
feature extraction
edge detection
Data models
convolutional neural nets
composability
associated threat groups
anomaly detection model
anomaly detection applications