Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Support vector machines
biblio
Handling Non-linear Relations in Support Vector Machines through Hyperplane Folding
Submitted by aekwall on Mon, 01/27/2020 - 9:18am
Support vector machines
Resiliency
pubcrawl
composability
Predictive Metrics
hyperplane folding
hyperplane hinging
non-linear relations
piecewise linear classification
biblio
A Trust Aware Unsupervised Learning Approach for Insider Threat Detection
Submitted by grigby1 on Tue, 01/21/2020 - 10:22am
machine learning
Unsupervised Learning
trust aware unsupervised learning
trust
system logs
Support vector machines
Resiliency
resilience
pubcrawl
policy-based governance
Organizations
one-class SVM
Metrics
machine learning algorithms
threat mitigation
isolation forest
insiders
insider threat detection systems
insider threat
Human behavior
Forestry
feature extraction
Data mining
data analysis
collaboration
CERT insider threat dataset
Anomaly Detection
biblio
Hybrid Intrusion Detection System Using Machine Learning Techniques in Cloud Computing Environments
Submitted by grigby1 on Tue, 01/21/2020 - 10:20am
Resiliency
learning (artificial intelligence)
machine learning
machine learning techniques
network activities
network anomalous event
pattern clustering
pubcrawl
resilience
intrusion event
secure Cloud computing environment
security issues
service consolidations
signature-based detection schemes
Support vector machines
trustworthy Cloud computing environment
ubiquitous presence
computer network security
anomaly detection system
Cloud Computing
Cloud Computing networks
cloud environments
Cloud Hypervisor level
Cloud Intrusion Detection
Clustering algorithms
composability
Anomaly Detection
Cyber Attacks
dynamic provisioning
feature extraction
hybrid detection mechanism
hybrid Intrusion Detection System
Intrusion Detection
Intrusion Detection Systems
biblio
Applying Machine Learning to Anomaly-Based Intrusion Detection Systems
Submitted by aekwall on Mon, 01/20/2020 - 10:56am
NSL-KDD dataset
unsupervised anomaly traffic detection techniques
telecommunication traffic
Support vector machines
support vector machine
stochastic gradient decent
sequential model
security of data
Resiliency
regression analysis
random forests
random forest classifier
pubcrawl
anomaly-based Intrusion Detection Systems
NSL-KDD
Malicious Traffic
machine learning techniques
machine learning
logistic regression
intrusive traffics
Intrusion Detection systems (IDSs)
Intrusion Detection Systems
Internet-based traffic
internet
gradient methods
composability
biblio
Machine Learning Based Intrusion Detection System
Submitted by aekwall on Mon, 01/20/2020 - 10:55am
malicious activity
well-organized classification methodology
Training
Support vector machines
Support Vector Machine Naive Bayes
support vector machine
statistical methodologies
security of data
Resiliency
pubcrawl
Predictive Metrics
pattern classification
NSL- KDD knowledge discovery dataset
network traffic data
Naive Bayes
Market research
Bayes methods
machine learning based intrusion detection system
machine learning
learning (artificial intelligence)
Intrusion Detection Systems
Intrusion Detection
Informatics
false alarms
distrustful activity
detection rate
Data mining
Conferences
computer network security
composability
Comparative Analysis
biblio
Uncertainty-Aware Authentication Model for Fog Computing in IoT
Submitted by aekwall on Mon, 12/30/2019 - 11:16am
Naive Bayes
uncertainty-aware authentication model
uncertainty handling
uncertainty
Support vector machines
support vector machine
supervised learning
supervised classification algorithms
security issues
Scalability
Resiliency
regression analysis
pubcrawl
privacy issues
prediction model
pattern classification
Fog computing
Mobile Edge Computing
logistic regression
IoT
Internet of Things
Fog Computing and Security
Decision trees
Decision Tree
Cloud Computing
Cisco Systems
Bayes methods
authorisation
authentication
attribute based access control model
ABAC model
security
biblio
Emotion Recognition from 2D Facial Expressions
Submitted by aekwall on Mon, 12/30/2019 - 11:12am
CNN model
facial recognition
SVM classifier
span texture
shape features
overfitting problem
informative representations
image texture
handcrafted features
gray-level images
facial expression recognition application
Face
2d facial expressions
facial expression recognition
face recognition
Support vector machines
emotion recognition
deep learning
image classification
convolutional neural network
convolutional neural nets
Training
Databases
Metrics
Computational modeling
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
feature extraction
biblio
An Efficient system to stumble on and Mitigate DDoS attack in cloud Environment
Submitted by aekwall on Wed, 12/18/2019 - 1:23pm
mitigation
mitigation method
killer software
facts generation
dynamic asset allocation
distributed denial of carrier
DDoS attack mitigation
cloud networks
DDoS Attack
resilience
microsoft windows
Computer crime
Metrics
composability
pubcrawl
Human behavior
network security
Support vector machines
Conferences
Servers
Cloud Computing
computer network security
biblio
Challenging Machine Learning Algorithms in Predicting Vulnerable JavaScript Functions
Submitted by grigby1 on Tue, 11/12/2019 - 3:25pm
Snyk platform
pattern classification
performing algorithm
performing models
Prediction algorithms
prediction models
Predictive models
predictive security metrics
pubcrawl
public databases
re-sampling strategies
security
security vulnerabilities
node security project
software metrics
software security issues
static source code metrics
Support vector machines
SVM
viable practical approach
Vulnerability
vulnerability information
vulnerable components
vulnerable functions
vulnerable javascript functions
Java
code fixing patches
code metrics
Computer crime
cyber-crime activities
Databases
dataset
deep learnin
deep learning
extensive grid-search algorithm
F-measure
forest based classifiers
GitHub
challenging machine
JavaScript
JavaScript programs
learning (artificial intelligence)
machie learning
machine learning
machine learning algorithms
Measurement
Metrics
mitigation techniques
natural language processing
nearest neighbour methods
biblio
Anomaly Detection in Role Administered Relational Databases — A Novel Method
Submitted by aekwall on Mon, 11/04/2019 - 10:23am
relational databases
User profile
security feature
Role-Based Access Control database
Role administered relational databases
Quiplet
database management systems
database management system
database access control
common security measures
anomaly detection technique
anomaly detection system
access control measures
relational database security
authorisation
Intrusion Detection
Anomaly Detection
Training
Databases
Metrics
composability
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
Support vector machines
support vector machine
Access Control
« first
‹ previous
…
21
22
23
24
25
26
27
28
29
…
next ›
last »