Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Support vector machines
biblio
Classification of Hyperspectral Images using Edge Preserving Filter and Nonlinear Support Vector Machine (SVM)
Submitted by aekwall on Mon, 03/01/2021 - 3:48pm
nonlinear SVM
work factor metrics
weight least square filter
Support vector machines
support vector machine
spectral bands
spectral
spatial information
spatial filter
spatial
Scalability
Resiliency
pubcrawl
denoising
nonlinear support vector machine
learning (artificial intelligence)
image classification
Hyperspectral imaging
hyperspectral image
geophysical image processing
feature extraction phase
feature extraction
factor analysis based dimensionality reduction technique
factor analysis
edge-preserving filter
edge preserving filter
biblio
Intellectual Priority-based Low Latency Data Delivery Scheme for Multi-interface and Multi-channel Devices in Multi-hop Wireless Mesh Networks
Submitted by aekwall on Mon, 03/01/2021 - 3:43pm
spread spectrum communication
Wireless Mesh Network Security
wireless-mesh-network
relaying hops
real-time-scheduling
multiinterface devices
multihop wireless mesh networks
multichannel devices
multi-interface
low-latency
intellectual priority-based packet transmission scheme
intellectual priority-based low latency data delivery scheme
end-to-end delay
telecommunication security
relay networks (telecommunication)
wireless mesh networks
delays
telecommunication network routing
machine learning
Metrics
Peer-to-peer computing
composability
pubcrawl
Resiliency
Support vector machines
real-time systems
biblio
Sagacious Intrusion Detection Strategy in Sensor Network
Submitted by grigby1 on Tue, 02/23/2021 - 1:47pm
smart appliances
Prediction algorithms
logistic regression
regression analysis
network intrusion detection
KNN
WSN
malicious attackers
support vector machine
neural nets
ANN
data corpus
external attacks
IDS methodology
Naive Bayes
sagacious intrusion detection strategy
time division multiple access
Support vector machines
Classification algorithms
service attacks
Floods
Denial of Service attacks
sensors
telecommunication computing
composability
wireless sensor networks
telecommunication security
computer network security
Resiliency
resilience
Metrics
pubcrawl
Intrusion Detection
biblio
A Hybrid Feature Extraction Network for Intrusion Detection Based on Global Attention Mechanism
Submitted by grigby1 on Tue, 02/23/2021 - 1:46pm
intrusion detection task
AI methods
false alarm rates
feature extraction layer
fully connected layer
Global Attention Mechanism
global attention mechanism layer
hybrid feature extraction network
hybrid network
temporal features
intrusion detection tasks
large-scale network traffic
low recognition performance
network monitoring system
network traffic attributes
Residual U Net
RULA-IDS
SVM classification layer
computer network security
feature extraction
machine learning
Support vector machines
Intrusion Detection
pubcrawl
Metrics
resilience
Resiliency
Training
telecommunication traffic
composability
pattern classification
neural nets
deep learning
testing
network intrusion detection
spatial features
biblio
Identifying Ubiquitious Third-Party Libraries in Compiled Executables Using Annotated and Translated Disassembled Code with Supervised Machine Learning
Submitted by aekwall on Mon, 02/22/2021 - 12:44pm
Databases
vector
Matrices
k-nearest neighbor search
clustering methods
Bayes method
nearest neighbor search
supervised learning
Classification algorithms
Microprogramming
Predictive Metrics
reverse engineering
Software
Measurement
neural network
supply chain management
Libraries
tools
internet
graph theory
pubcrawl
machine learning
Support vector machines
Task Analysis
biblio
DDoS Attacks Detection by Using Machine Learning Methods on Online Systems
Submitted by grigby1 on Tue, 02/16/2021 - 11:59am
DDOS attacks detection
Handheld computers
denial-of-service attack
distributed denial of service attacks
multilayer perceptrons
Cyber Attacks
hypermedia
DDoS attack detection
C-support vector machine
Global Positioning System
detection accuracy rates
Hafnium compounds
HTTP flood
hypertext transfer protocol
k-nearest neighbor
multi layer perceptron
online systems
TCP SYN flood
computer network security
machine learning
cyber security
Intrusion Detection
pubcrawl
Human behavior
Metrics
resilience
Resiliency
learning (artificial intelligence)
Topology
random forests
Support vector machines
Computer crime
composability
nearest neighbour methods
DDoS
Random Forest
biblio
Fake Generated Painting Detection Via Frequency Analysis
Submitted by aekwall on Mon, 02/01/2021 - 10:43am
Forgery
Paintings
image forgery detection
frequency analysis
Fourier transform
style transfer
neural style transfer
frequency-domain analysis
Painting
Scalability
Predictive Metrics
testing
Databases
pubcrawl
Resiliency
feature extraction
Support vector machines
biblio
Machine and Deep Learning Based Comparative Analysis Using Hybrid Approaches for Intrusion Detection System
Submitted by grigby1 on Wed, 01/20/2021 - 3:22pm
performance indicator metrics
learning (artificial intelligence)
machine learning
Naive Bayes Classifiers
nearest neighbour methods
network security threats
neural nets
NSL-KDD dataset
pattern classification
K-NN
pubcrawl
resilience
Resiliency
security of data
self-learning-based classification algorithms
Support vector machines
vulnerable source code
hybrid feature selection
APIs
application programming interface
Bayes methods
CIDDS-001 dataset
Compositionality
cyber security
cybersecurity organizations
deep learning
API
IDS
internet
intranet
intranets
Intrusion Detection
intrusion detection system
Intrusion Detection System (IDS)
biblio
Ultra-wideband Fingerprinting Positioning Based on Convolutional Neural Network
Submitted by grigby1 on Wed, 01/20/2021 - 3:08pm
precise positioning
Wireless fidelity
underwater acoustic communication
ultra-wideband fingerprinting positioning method
ultra-wideband
Ultra wideband technology
ultra wideband communication
Training
telecommunication computing
Support vector machines
satellite signals
Robustness
Resiliency
resilience
pubcrawl
Acoustic Fingerprints
precise position
indoor radio
indoor positioning system
Human behavior
GPS
Global Positioning System
fingerprinting positioning
Fingerprint recognition
fingerprint positioning methods
convolutional neural networks
convolutional neural network
convolutional neural nets
composability
biblio
Detecting GAN-Generated Imagery Using Saturation Cues
Submitted by grigby1 on Fri, 01/15/2021 - 11:14am
social networking (online)
synthetic imagery
saturation cues
online disinformation campaigns
generating network
GAN-generated imagery
camera imagery
DeepFake
generative adversarial networks
Image forensics
GANs
Cameras
social media
Training
Gallium nitride
Forensics
Metrics
Scalability
Generators
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
convolutional neural nets
Support vector machines
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
…
next ›
last »