Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Support vector machines
biblio
Intrusion Detection For Controller Area Network Using Support Vector Machines
Submitted by aekwall on Mon, 07/20/2020 - 9:43am
Internet of Things
Support vector machines
support vector machine based intrusion detection system
support vector machine
security countermeasures
Resiliency
pubcrawl
Protocols
process secure communication
parameter selection
machine learning
light-weight nature
Intrusion Detection
automobile communications
feature vector selection
feature extraction
ECU
delays
cyber-physical systems
controller area networks
controller area network security
controller area network
computer network security
communication standard
CAN protocol
automobiles
biblio
A Protocol Independent Approach in Network Covert Channel Detection
Submitted by grigby1 on Thu, 07/16/2020 - 11:18am
supervised learning
network traffic dataset
protocol independent approach
protocol-independent approach
Protocols
pubcrawl
resilience
Resiliency
Scalability
stealth tunnels
network storage covert channel detection
supervised machine learning technique
support vector machine (SVM)
Support vector machines
TCP
TCP protocols
telecommunication computing
telecommunication traffic
wireless channels
IP networks
Compositionality
covert channel communication
covert channels
Decision Tree
DNS
DNS protocols
feature extraction
generic detection model
composability
IP protocols
IPv4
k-nearest neighbors
Kernel
logistic regression
Logistics
machine learning
network covert channel
biblio
Predicting and Preventing Malware in Machine Learning Model
Submitted by grigby1 on Thu, 07/09/2020 - 12:57pm
Random Forest
machine learning model
malware prediction
malware prevention
pattern classification
Predictive models
privacy
privacy preserving technique
pubcrawl
machine learning algorithms
random forests
resilience
Resiliency
Scalability
security
support vector machine
Support vector machines
Training
Decision Tree
Algorithm robustness enhancement
Causative attack
Classification algorithms
Compositionality
data deletion
Data models
data privacy
Data Sanitization
AdaBoost
Decision trees
exploratory attack
Human behavior
Human Factors
invasive software
K-nearest-neighbors classifier
KNN classifier
machine learning
biblio
Adversarial Machine Learning Attack on Modulation Classification
Submitted by grigby1 on Fri, 07/03/2020 - 4:05pm
modulation
Task Analysis
Support vector machines
Signal to noise ratio
security of data
Scalability
Robustness
Resiliency
resilience
pubcrawl
Perturbation methods
pattern classification
Modulation classification
Adversarial Machine Learning
ML-based modulation classifiers
ML-based modulation classification methods
ML models
Mathematical model
learning (artificial intelligence)
Human behavior
Deterrence
cognitive self-driving networks
Carlini & Wagner attack
adversarial ML examples
adversarial machine learning attack
biblio
Decision Fusion Based on Joint Low Rank and Sparse Component for Hyperspectral Image Classification
Submitted by grigby1 on Fri, 07/03/2020 - 3:54pm
Hyperspectral imaging
SVM classifier
Support vector machines
Sparse matrices
Sparse and low rank matrix decomposition
rank component
pubcrawl
principal component analysis
pattern classification
Metrics
Matrix decomposition
low rank matrix decomposition
image fusion
Compositionality
hyperspectral imagery
hyperspectral image classification
hyperspectral data
feature extraction
discriminative information
DFJLRS
decomposition
decision fusion based on joint low rank and sparse component method
decision fusion
data structures
cyber physical systems
biblio
DDoS Intrusion Detection Through Machine Learning Ensemble
Submitted by aekwall on Mon, 06/29/2020 - 11:46am
Human behavior
Support vector machines
robust defense mechanism
Resiliency
reduced feature set
pubcrawl
prominent attacks
NSL-KDD dataset
NIDS approach
network intrusion detection system
Metrics
machine learning ensemble
machine learning
learning (artificial intelligence)
intrusion detection system
Intrusion Detection
Artificial Neural Networks
feature extraction
ensemble models
Ensemble Machine Learning
emerging DDoS attack patterns
domain-knowledge
distributed denial of service attacks
DDoS Intrusion Detection
DDoS Attacks
DDoS attack detection
DDoS
Data models
computer network security
Computer crime
composability
biblio
A Survey on Machine Learning Based Detection on DDoS Attacks for IoT Systems
Submitted by aekwall on Mon, 06/29/2020 - 11:46am
Metrics
DDoS attack detection
resource IoT devices
machine learning based detection
machine learning (ML)
distributed denial of service attacks
Distributed Denial of Service (DDoS) attack
denial of service (dos)
comprehensive detection method
common malicious attacks
IoT networks
DDoS Defense
Object recognition
machine learning
Computer crime
composability
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
feature extraction
DDoS Attacks
Support vector machines
performance evaluation
Internet of Things (IoT)
Internet of Things
computer network security
biblio
Machine Learning Security Allocation in IoT
Submitted by grigby1 on Fri, 06/26/2020 - 12:04pm
pubcrawl
IoT situation
IoT-helped vitality obliged stages
learning (artificial intelligence)
light-weighted profound learning base framework
Metrics
mobile phones
nearby facial pictures dataset
numerous asset compelled gadgets mobile phones
ongoing facial picture recovery frameworks
picture utilizing Viola-Jones calculation
proficiency
IoT condition
question
Raspberry Pi
Resiliency
Scalability
security
security allocation
Shape
Support vector machines
utilizes convolutional framework layers
Viola-Jones calculation
vitality obliged gadgets
extra face classifier
cell phones
Cellular phones
characterized highlights
CNN
composability
computational abilities
computational intricacy
constant recovery
convolutional neural nets
crop face areas
edge detection
archive pictures
Face
face pictures
face recognition
feature extraction
financially savvy pre-prepared CNN
huge information vault
Image edge detection
Internet of Things
IoT
IoT applications
biblio
Emotion Recognition Using Feature-level Fusion of Facial Expressions and Body Gestures
Submitted by grigby1 on Fri, 06/19/2020 - 11:02am
pubcrawl
Human behavior
human emotional behaviour
Human Factors
Human Robot Interaction
image fusion
Metrics
psychological research findings
psychology
hog feature
real-world applications
resilience
Resiliency
sign language recognition
Support vector machines
SVM
upper body pose
virtual reality
face recognition
bimodal emotion recognition
body gestures
collective visual conduits
computer vision
Conferences
EEG signals
emotion recognition
Face
automatic emotion recognition
facial emotion recognition
facial expressions
facial recognition
feature extraction
feature-level
Feature-level fusion
gesture recognition
biblio
Word Embedding Method of SMS Messages for Spam Message Filtering
Submitted by aekwall on Mon, 05/18/2020 - 9:55am
SMS Filtering
machine learning method
classification methods
binary classification
CBOW
deep learning method
feedforward neural network
Feedforward neural networks
popular machine learning method
deep learning
SMS messages
spam message filtering
SVM light
word embedding
word embedding method
word embedding technique
Word Vector
security of data
feedforward neural nets
natural language processing
information filtering
Filtering
electronic messaging
SVM
unsolicited e-mail
pattern classification
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
feature extraction
Support vector machines
Scalability
« first
‹ previous
…
17
18
19
20
21
22
23
24
25
…
next ›
last »