Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
ML algorithms
biblio
An Analytical Framework for Security-Tuning of Artificial Intelligence Applications Under Attack
Submitted by grigby1 on Thu, 08/13/2020 - 5:07pm
artificial intelligence applications
artificial intelligence security
signal classification
security-tuning
perturbation attack
parameters tuning
ML parameters
ML experts
ML algorithms
medical signal processing
k-nearest neighbors algorithm
input data perturbation attack
electroencephalography
electroencephalogram signals
EEG dataset
data classification
learning (artificial intelligence)
analytical framework
AI application
classification accuracy
tuning
testing
Prediction algorithms
Perturbation methods
machine learning algorithms
optimization
pubcrawl
Artificial Intelligence
security
machine learning
security of data
biblio
Self-Healing Solutions for Wi-Fi Networks to Provide Seamless Handover
Submitted by grigby1 on Mon, 02/17/2020 - 5:12pm
quality of service
wireless LAN
wireless channels
wireless channel
Wi-Fi Networks
uniform seamless network quality of service
unexpected network faults
SON developments
self-organizing network paradigm
self-healing solutions
self-healing networks
seamless handover
Resiliency
resilience
Cellular networks
QoS
pubcrawl
Packet loss
mobility management (mobile radio)
ML algorithms
machine learning algorithms
learning (artificial intelligence)
IEEE 802.11 Standard
Handover
fault tolerant computing
fault diagnosis
composability
cellular radio
biblio
An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack
Submitted by grigby1 on Thu, 06/07/2018 - 3:13pm
SQL injection attack
pubcrawl
receiver operating characteristic curve
Resiliency
ROC curve
secure backend storage
security
security of data
smart devices
SQL
SQL injection
privacy
SQLIA
SQLIA big data
SQLIA Data analytics
SQLIA hashing
SQLIA Pattern-driven data set
Structured Query Language
structured query language injection attack
supervised learning
supervised learning model
Support vector machines
IoT
back-end database
Big Data
Cloud Computing
cloud-hosted Web applications
collaboration
confidential data
Data mining
Data models
Human behavior
Internet of Things
Artificial Intelligence
learning (artificial intelligence)
learning automata
Microsoft Azure Machine Learning
ML algorithms
pattern classification
pattern-driven corpus
Policy
policy-based governance
Policy-Governed Secure Collaboration
Predictive Analytics
biblio
Moving target defense for adaptive adversaries
Submitted by Heather Lucas on Wed, 09/17/2014 - 6:33pm
moving target defense
Unsolicited electronic mail
Training
Switches
standard static methods
security problems
security of data
security applications
security
reverse-engineer
reverse engineering
performance evaluation
adaptive adversaries
ML algorithms
malicious activities
machine learning
learning (artificial intelligence)
innocent activities
hybrid dynamical systems
Games
flexible MT defense strategy
cyber security
Biological system modeling
algorithm performance degradation