Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security of data
biblio
Black Box Attacks on Explainable Artificial Intelligence(XAI) methods in Cyber Security
Submitted by aekwall on Mon, 03/01/2021 - 3:59pm
security
gradient-based XAI
learning (artificial intelligence)
Metrics
ML models
Predictive models
privacy
pubcrawl
Resiliency
Robustness
Scalability
explainable artificial intelligence methods
security domain
security of data
security-relevant data-sets
threat models
white box
White Box Security
white box setting
xai
XAI methods
composability
adversarial attack
Analytical models
Artificial Intelligence
artificial intelligence security
binary output
black box attack
Black Box Attacks
black box encryption
black box settings
black-box models
predictive security metrics
computer security
cyber security
cybersecurity domain
data analysis
Data models
deep learning
domain experts
exact properties
explainable artificial intelligence
biblio
Clustering Based Incident Handling For Anomaly Detection in Cloud Infrastructures
Submitted by aekwall on Mon, 03/01/2021 - 3:48pm
NSL-KDD
work factor metrics
run time metrics
nonclustering based algorithm
local outlier factor(LOF)
Kmeans
Isolation Forest algorithm
isolation forest
incident handling model
f-score
decision based approach
DBSCAN
clustering based algorithm
cloud infrastructures
anomaly detection mechanisms
Anomaly
security of data
cloud
Cloud Security
pattern clustering
Data mining
Anomaly Detection
Clustering algorithms
Prediction algorithms
pubcrawl
Resiliency
Protocols
Servers
Scalability
Cloud Computing
Monitoring
biblio
Flow Table Security in SDN: Adversarial Reconnaissance and Intelligent Attacks
Submitted by grigby1 on Tue, 02/23/2021 - 1:55pm
security of data
performance-driven design
power consumption
Probes
pubcrawl
Reconnaissance
resilience
Resiliency
Scalability
SDN architectures
Network reconnaissance
security vulnerabilities
simplistic attack models
software defined networking
specific cache-like behaviors
Switches
target flow table
telecommunication security
underlying storage medium
data privacy
attack parameters
cache inference
cache storage
caching flow rules
communication bottleneck
computer network security
computer networks
control systems
adversarial reconnaissance
denial of service attack
distributed processing
easy target
flow table security
Government
intelligent attacks
Interference
IP networks
biblio
RNN-based Prediction for Network Intrusion Detection
Submitted by grigby1 on Tue, 02/23/2021 - 1:47pm
prediction model
sliding window
scoring function
RNN-based prediction
LSTM model
industrial IoT environments
data mining regression techniques
cosine similarity
anomaly detection methods
RNN
N-gram
LSTM
IDS
Euclidean distance
network intrusion detection
Internet of Things
regression analysis
composability
production engineering computing
recurrent neural nets
Data models
Resiliency
resilience
Metrics
pubcrawl
Intrusion Detection
Data mining
Anomaly Detection
Predictive models
security of data
biblio
Network Intrusion Detection Method Based on GAN Model
Submitted by grigby1 on Tue, 02/23/2021 - 1:45pm
performance indicators
Metrics
multi-classification model
network intrusion detection
network intrusion detection method
neural nets
original classification model
parameter setting
pattern classification
loss function
pubcrawl
resilience
security of data
supervised learning
supervised learning multiclassification model
Training
training method
Transforms
Gallium nitride
Resiliency
Predictive Metrics
Scalability
adversarial idea
binary classification model
composability
Computational modeling
detection accuracy
Generative Adversarial Learning
gan
GAN model
generated adversarial network
generative adversarial networks
label sample set
label samples
learning (artificial intelligence)
biblio
Adversarial multiple access channels and a new model of multimedia fingerprinting coding
Submitted by grigby1 on Tue, 02/23/2021 - 1:35pm
noise-like signals
linear combinations
malicious multiple access channels
Mathematical model
multi-access systems
Multimedia communication
multimedia computing
multimedia fingerprinting code
multiple access channel
network coding
Information systems
privacy
pubcrawl
Receivers
resilience
security
security of data
Watermarking
zero-error probability
broadcast channels
Metrics
Resiliency
composability
A-channel
adders
adversarial multiple access channels
arbitrary coefficients
binary adder channel
Binary codes
channel coding
collusion attack
compressed sensing
Conferences
digital fingerprint
digital fingerprinting code
digital fingerprinting coding problems
encoding
error statistics
biblio
Liability-Aware Security Management for 5G
Submitted by grigby1 on Tue, 02/23/2021 - 1:25pm
proof of transit
Trust models
trust and reputation models
transaction processing
telecommunication computing
security-by-contract
Security SLAs (SSLAs)
security of data
Root cause analysis
Resiliency
resilience
reputation models
Remote Attestation
pubcrawl
5G
orchestration decisions
network slicing
network accountability
multiple entities
Metrics
liability-aware security management
Liability
LASM
inherent distribution
composability
accountability mechanism
5G networks
5G mobile communication
biblio
Self-organization of Network Communities via Blockchain Technology: Reputation Systems and Limits of Digital Democracy
Submitted by grigby1 on Tue, 02/23/2021 - 1:23pm
reputation systems
network members reputation
Oracle
organisational aspects
political institutionalization
politics
pubcrawl
public accountability
reputation assessment system
reputation system
network communities reputation
resilience
Resiliency
security of data
self-organization
social networking (online)
tools
traditional reputation systems
virtual network communities
Economics
blockchain technology
blockchain-based reputation system
blockchain-oracles
civil society
composability
data privacy
digital democracy
digital technologies
blockchain
Games
Government
government control
government data processing
internet
Metrics
multi-agent systems
network accountability
biblio
HAC-T and Fast Search for Similarity in Security
Submitted by aekwall on Mon, 02/22/2021 - 12:43pm
nearest neighbor search
Trend Locality Sensitive Hashing (TLSH)
tree-based index
tools
threshold based hierarchical agglomerative clustering algorithm
standards
similarity digests
security operations center operators
security of data
security analysts
security
search problems
pubcrawl
Predictive Metrics
nearest neighbour methods
Approximate Nearest Neighbour
Measurement
malware
Indexes
Hierarchical Agglomerative Clustering (HAC)
HAC-T
Fuzzy Hashing
fast nearest neighbor search techniques
Cryptography
computer viruses
clustering technique
Clustering algorithms
clustering
cluster quality
cluster malware
biblio
Anomalous IP Address Detection on Traffic Logs Using Novel Word Embedding
Submitted by aekwall on Mon, 02/22/2021 - 12:41pm
natural language processing
word embedding-based feature extraction
word embedding techniques
word embedding
vanilla word embeddings
telecommunication traffic
security of data
security
Scalability
Resiliency
representative features
pubcrawl
network traffic logs
anomalous IP address detection algorithm
machine learning-based anomaly detection
Log Mining
Linear programming
learning (artificial intelligence)
IP networks
IP addresses
Human behavior
feature extraction
detection performance
Clustering algorithms
Anomaly Detection
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »