Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Support vector machines
biblio
Data Analysis for Anomaly Detection to Secure Rail Network
Submitted by aekwall on Mon, 11/23/2020 - 10:24am
Bidirectional control
Intelligent Data and Security
Intelligent Data Security
Wireshark detection
timely detection
secure rail network
railway communication
rail systems
rail network traffic data
Rail Network Security
packet analysis system
network flow
network features
IP networks
alert function
Rails
Compositionality
data analysis
Anomaly Detection
pubcrawl
Resiliency
Support vector machines
Protocols
telecommunication security
telecommunication traffic
Scalability
biblio
Load Forecasting of Privacy-Aware Consumers
Submitted by grigby1 on Fri, 11/20/2020 - 1:03pm
Resiliency
polling frequency constraints
power engineering computing
predictive control
Predictive models
privacy
privacy protection schemes
privacy-aware consumers
pubcrawl
regression analysis
report consumption data
resilience
policy-based governance
Scalability
short-term load forecasts
SM data
smaller consumer aggregations
smart grid consumer privacy
smart meter
smart meters
STLF accuracy
Support vector machines
support vector regression
temporal resolutions
high spatial resolutions
composability
consumer aggregation levels
consumer privacy
consumer privacy risks
data privacy
data-driven grid management
Electric Grid
energy consumption
forecast accuracy
forecasting
grid visible consumer load profile
collaboration
higher aggregation levels
Human behavior
load forecasting
Load modeling
load profiles
load-forecasting
load-levelling scheme
Metrics
model-distribution predictive control
Mutual information
planning techniques
biblio
Preventing Poisoning Attacks On AI Based Threat Intelligence Systems
Submitted by grigby1 on Wed, 11/04/2020 - 1:13pm
poisoning attacks prevention
Web sites
Twitter
threat intelligence systems
Support vector machines
social networking (online)
security of data
security analysts
Scalability
Resiliency
resilience
pubcrawl
AI Poisoning
online social media
malicious information
learning (artificial intelligence)
Human behavior
ensembled semi-supervised approach
Engines
cybersecurity domain
computer security
Artificial Intelligence
AI systems
biblio
Convolutional Neural Networks as Classification Tools and Feature Extractors for Distinguishing Malware Programs
Submitted by grigby1 on Thu, 10/29/2020 - 10:11am
malware detection
visualization
Training
testing
SVM
Support vector machines
support vector machine
Resiliency
resilience
pubcrawl
privacy
pattern classification
nearest neighbour methods
microsoft malware classification challenge
Metrics
malware programs
anti-malware industry
malware classification
malware
learning (artificial intelligence)
KNN
k-nearest neighbors
invasive software
Human behavior
feature extractors
feature extraction
convolutional neural networks
convolutional neural nets
computer architecture
computationally efficient CNN-based architecture
CNN based algorithms
classification tools
biblio
Malware Classification Using Machine Learning Algorithms and Tools
Submitted by grigby1 on Thu, 10/29/2020 - 10:10am
malware
tools
Support vector machines
Resiliency
resilience
Random Forest
pubcrawl
privacy
pattern classification
Metrics
matrix algebra
malware samples
malware classification
Classification algorithms
machine learning algorithms
machine learning
learning (artificial intelligence)
invasive software
Human behavior
feature extraction
family classification
emerging malwares
confusion matrix
comparative classification
comparable features
Cohen's Kappa
biblio
An Xception Convolutional Neural Network for Malware Classification with Transfer Learning
Submitted by grigby1 on Thu, 10/29/2020 - 10:10am
Microsoft malware dataset
Xception model
Xception convolutional neural network
Xception
VGG16 model
transfer learning
Training
testing
Support vector machines
special CNN architecture
Resiliency
resilience
pubcrawl
privacy
Predictive models
pattern classification
CNN models
Metrics
malware image classification
malware classification problem
malware classification
malware
learning (artificial intelligence)
invasive software
image-based malware classification
image classification
Human behavior
Gray-scale
feature extraction
ensemble model
convolutional neural network (CNN)
convolutional neural nets
biblio
Intrusion Detection Method of Industrial Control System Based on RIPCA-OCSVM
Submitted by grigby1 on Fri, 10/16/2020 - 10:32am
particle swarm optimisation
Support vector machines
single classification problem
security of data
Scalability
Robust Incremental Principal Component Analysis
RIPCA-OCSVM
RIPCA algorithm
RIPCA
Resiliency
resilience
pubcrawl
Protocols
principal component analysis
pattern classification
Anomaly Detection
outlier
one-class support vector machine
OCSVM
learning (artificial intelligence)
Intrusion Detection
integrated circuits
industrial data sets
Industrial Control Systems
industrial control system
industrial control
ICs
feature extraction
anomaly intrusion detection algorithm
anomaly detection model
biblio
Intrusion Detection of Industrial Control System Based on Stacked Auto-Encoder
Submitted by grigby1 on Fri, 10/16/2020 - 10:31am
multiclassification support vector machine
Training
Support vector machines
stacked auto-encoder
security of data
Scalability
Resiliency
resilience
pubcrawl
production engineering computing
pattern classification
neural nets
network data feature extraction
Analytical models
Multi-classification support vector machine
intrusion detection model
Intrusion Detection
Internet technologies
industrial production
Industrial Control Systems
industrial control system
industrial control
ICs
feature extraction
Data models
Anomaly Detection
biblio
Automatic XSS Detection and Automatic Anti-Anti-Virus Payload Generation
Submitted by aekwall on Mon, 09/28/2020 - 11:35am
parameter characteristics
SVM algorithm
XSS vulnerability
automatic anti-anti-virus payload generation tool
automatic bypassing
automatic detection
automatic XSS detection tool
DQN algorithm
malicious XSS attacks
malicious XSS parameters
Web application
RNN LSTM algorithm
rule-based WAF
user input parameters
user interaction
Web 2.0 era
XSS attack
XSS attack codes
Cross Site Scripting
internet
Support vector machines
feature extraction
learning (artificial intelligence)
machine learning
Resiliency
Human behavior
pubcrawl
Reinforcement learning
Scalability
tools
cross-site scripting
Training
recurrent neural nets
automatic generation
computer viruses
Payloads
Browsers
biblio
Classification of XSS Attacks by Machine Learning with Frequency of Appearance and Co-occurrence
Submitted by aekwall on Mon, 09/28/2020 - 11:35am
pattern classification
XSS attack scripts
Word2Vec
vectorization
Uniform resource locators
Training
SVM
Support vector machines
SCW
Scalability
Resiliency
Random Forest
Radio frequency
pubcrawl
preprocessing method
Phishing
attack detection filter
machine learning algorithms
machine learning
learning (artificial intelligence)
Kernel
internet
information collection
hypermedia markup languages
Human behavior
HTTP cookies
fake HTML input form
dummy sites
Cross Site Scripting
cross site
Computer crime
« first
‹ previous
…
15
16
17
18
19
20
21
22
23
…
next ›
last »