Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Support vector machines
biblio
Slow Hypertext Transfer Protocol Mitigation Model in Software Defined Networks
Submitted by grigby1 on Tue, 09/07/2021 - 2:21pm
Protocols
Web servers
Support vector machines
support vector machine
Software Defined Network
slow distributed denial of service
slow DDoS mitigation
Resiliency
resilience
pubcrawl
composability
Metrics
IP networks
Human behavior
genetic algorithms
genetic algorithm
denial-of-service attack
DDOS attacks detection
DDoS attack mitigation
Computer crime
biblio
An Overview of Machine Learning Based Approaches in DDoS Detection
Submitted by grigby1 on Tue, 09/07/2021 - 12:59pm
composability
Computer crime
DDoS attack detection
DDoS detection
denial-of-service attack
distributed denial of service
feature extraction
Human behavior
machine learning
Metrics
pubcrawl
Reactive power
resilience
Resiliency
supervised learning
Support vector machines
biblio
Classification of Misbehaving nodes in MANETS using Machine Learning Techniques
Submitted by aekwall on Mon, 08/02/2021 - 2:12pm
Neural networks
Support vector machines
Analytical models
pubcrawl
Metrics
Resiliency
machine learning
Compositionality
Throughput
Ad hoc networks
mobile computing
BPNN
malicious node
Mobile Ad-Hoc Network (MANET)
SVM
MANET security
biblio
Hand Motion with Eyes-free Interaction for Authentication in Virtual Reality
Submitted by grigby1 on Thu, 07/08/2021 - 1:27pm
virtual reality
virtual machine security
social interaction
J.8 [Applied Computing]
Interaction Paradigms
Hand motion recognition
H.1.2 [Human-centered Computing]
Eyes-free interaction
virtual machine
Cyber Physical System
Trajectory
Cryptography
Task Analysis
composability
authentication
Resiliency
resilience
pubcrawl
Support vector machines
security
feature extraction
biblio
Novel Design of Hardware Trojan: A Generic Approach for Defeating Testability Based Detection
Submitted by aekwall on Mon, 06/28/2021 - 11:41am
Hardware
Support vector machines
Resiliency
pubcrawl
composability
policy-based governance
Trojan horses
timing
Hardware Security
hardware trojan
Controllability
intellectual property
Observability
Stealthy Design.
intellectual property security
biblio
Early Detection of Vulnerabilities from News Websites using Machine Learning Models
Submitted by aekwall on Tue, 05/18/2021 - 2:19pm
computer security
BERT language model
OSINT
natural language processing
Compositionality
cybernetics
vulnerability detection
Bit error rate
Data mining
Task Analysis
Metrics
pubcrawl
Human behavior
Resiliency
early detection
Support vector machines
Data models
biblio
Cache side-channel attacks detection based on machine learning
Submitted by grigby1 on Thu, 05/13/2021 - 11:23am
Scalability
Cache side-channel attack
random forests
Attack vectors
detection
Probes
side-channel attacks
Hardware performance counters
privacy
computer architecture
Resiliency
resilience
Human behavior
pubcrawl
Support vector machines
machine learning
Cloud Computing
biblio
Detection of False Data Injection Attack in Automatic Generation Control System with Wind Energy based on Fuzzy Support Vector Machine
Submitted by grigby1 on Thu, 05/13/2021 - 11:22am
Power system dynamics
wind turbines
Wind Storage System
Wind speed
Support vector machines
support vector machine
Scalability
Resiliency
resilience
pubcrawl
False Data Detection
Mathematical model
Human behavior
fuzzy theory
false data injection attack
Data models
Automatic Generation Control System
automatic generation control
Attack vectors
biblio
Multi-stage Jamming Attacks Detection using Deep Learning Combined with Kernelized Support Vector Machine in 5G Cloud Radio Access Networks
Submitted by grigby1 on Thu, 05/13/2021 - 11:21am
Multilayer Perceptron
Wireless Sensor Networks DataSet
wireless sensor networks
Support vector machines
support vector machine
security
Scalability
Resiliency
resilience
pubcrawl
Attack vectors
Machine Learning-based Intrusion Detection System
jamming attacks
Jamming
Intrusion Detection
Human behavior
Communication system security
cloud radio access networks
Cloud Radio Access Network
biblio
Identification of Smart Grid Attacks via State Vector Estimator and Support Vector Machine Methods
Submitted by grigby1 on Thu, 05/13/2021 - 11:20am
Attack vectors
Cyber Attacks
Human behavior
machine learning
power systems
pubcrawl
Reliability
resilience
Resiliency
Scalability
Smart Grid
Smart Grids
state estimator
Support vector machines
Topology
Training
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
…
next ›
last »