Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Support vector machines
biblio
Is Predicting Software Security Bugs Using Deep Learning Better Than the Traditional Machine Learning Algorithms?
Submitted by aekwall on Mon, 07/01/2019 - 9:14am
Predictive models
Support vector machines
software security bugs
software quality metrics
software quality
software metrics
software insecurity
Software
security-related bugs
security of data
Security Metrics
security breaches
security
Random Forest
pubcrawl
program debugging
predictive security metrics
Naive Bayes
multilayer deep feedforward network
Metrics
machine learning
learning (artificial intelligence)
feedforward neural nets
Feedforward Artificial Network
deep learning technique
deep learning
Decision trees
Decision Tree
Computer bugs
Bug Propensity Correlational Analysis
Bayes methods
biblio
Machine Learning for Reliable Network Attack Detection in SCADA Systems
Submitted by aekwall on Mon, 07/01/2019 - 9:10am
open SCADA protocols
Training
SVM
Support vector machines
support vector machine
supervisory control and data acquisition systems
security of data
SCADA Systems Security
SCADA systems
SCADA
Resiliency
Random Forest
pubcrawl
Protocols
Pipelines
Payloads
Anomaly Detection
network attacks
network attack detection
missing data estimation
malicious intrusions
machine learning
learning (artificial intelligence)
Intrusion Detection Systems
Human behavior
gas pipeline system
F1 score
data normalization
critical infrastructures
control engineering computing
composability
biblio
Intelligent Malware Detection Using Oblique Random Forest Paradigm
Submitted by grigby1 on Mon, 06/10/2019 - 1:02pm
resilience
malware classification datasets
Metrics
Oblique Random Forest
oblique random forest ensemble learning technique
oblique random forest paradigm
pattern classification
privacy
pubcrawl
malware classification
Resiliency
security community
signature-based detection techniques
stealthy malware
Support vector machines
Trojan horses
unknown malware
behavior-based detection techniques
malware behavior
machine learning solutions
machine learning
learning (artificial intelligence)
invasive software
intelligent malware detection
Human behavior
Forestry
feature extraction
false positive rate
Decision trees
decision tree learning models
computerized online applications
comprehensive malware detection
classification accuracy
biblio
Malware Classification Using Machine Learning Algorithms
Submitted by grigby1 on Mon, 06/10/2019 - 1:02pm
malicious software
Support vector machines
stealing deleting sensitive data
scripts
Resiliency
resilience
pubcrawl
privacy
pattern classification
Metrics
Malware crisis
malware classification
malware
computer architecture
malicious programs
machine learning algorithms
learning (artificial intelligence)
invasive software
internet
Human behavior
huge virtual world
encrypting deleting sensitive data
Decision trees
Correlation
core computing functions
Conferences
biblio
Malware Classification with Deep Convolutional Neural Networks
Submitted by grigby1 on Mon, 06/10/2019 - 1:01pm
learning (artificial intelligence)
Support vector machines
Resiliency
resilience
pubcrawl
privacy
Microsoft malware
Metrics
malware classification
malware binaries
malware
Malimg malware
machine learning approaches
machine learning
Learning systems
challenging malware classification datasets
invasive software
image classification
Human behavior
grayscale images
Gray-scale
feedforward neural nets
deep learning framework
deep learning approach
deep learning
deep convolutional neural networks
convolutional neural networks
convolution
computer architecture
CNN
biblio
Malware Classification Using Deep Convolutional Neural Networks
Submitted by grigby1 on Mon, 06/10/2019 - 1:01pm
privacy
learning models
machine learning
malware
malware binaries
malware classification
malware images
Metrics
neural network
object detection
Pattern recognition
learning (artificial intelligence)
pubcrawl
resilience
Resiliency
support vector machine
support vector machine classifier training
Support vector machines
transfer learning
visual patterns
visualization
feature extraction
classification
classifier
convolutional neural nets
convolutional neural network
convolutional neural networks
Correlation
DCNN classification
deep convolutional neural networks
deep learning techniques
accuracy levels
Gray-scale
Hamming distance
Human behavior
image classification
image features
image representation
image type
improved image representation
invasive software
biblio
Research of Classical Machine Learning Methods and Deep Learning Models Effectiveness in Detecting Anomalies of Industrial Control System
Submitted by grigby1 on Mon, 06/10/2019 - 12:56pm
resilience
machine learning algorithms
machine learning methods
modern industrial control systems
neural nets
Neural networks
privacy
production engineering computing
pubcrawl
machine learning
Resiliency
security
security of data
signal correlations
Support vector machines
Tennessee Eastman process simulation data
Training
Anomaly Detection
linear algorithms
learning (artificial intelligence)
industrial process anomaly detection task
industrial control
ICS security
ICs
Feeds
deep learning models
deep learning
Decision trees
Data processing
Cyber Attacks
control engineering computing
composability
anomaly detection evaluation dataset
biblio
Machine Learning-Based Recommendation Trust Model for Machine-to-Machine Communication
Submitted by grigby1 on Mon, 06/10/2019 - 12:56pm
resilience
Naive Bayes
pattern classification
Peer-to-peer computing
privacy
pubcrawl
radial support vector machine
Random Forest
receiver operating characteristics
Reliability
Mathematical model
Resiliency
security
security issues
security threats
Supervisory Control and Data Supervisory Acquisition(SCADA)
Support vector machines
telecommunication computing
trust computation measures
Trusted Computing
k nearest neighbor
composability
Computational modeling
computer network security
Decision Tree
Decision trees
internet
Internet of Things(IoTs)
Internet of Vehicles(IoVs)
Internet Protocol
Bayes methods
learning (artificial intelligence)
machine learning
machine learning trust evaluation
Machine learning-based recommendation trust model
Machine Type Communication Devices
Machine-to-Machine communication nodes
machine-to-machine communications
Machine-to-Machine(M2M)
malicious data
biblio
Route Cache Based SVM Classifier for Intrusion Detection of Control Packet Attacks in Mobile Ad-Hoc Networks
Submitted by aekwall on Mon, 06/10/2019 - 9:16am
Ad hoc networks
composability
Data models
IDS
MANET
MANET Attack Detection
Metrics
mobile computing
pubcrawl
Resiliency
Route cache
Routing
Routing protocols
Support vector machines
SVM
biblio
Intrusion Detection in Smart Grid Using Data Mining Techniques
Submitted by grigby1 on Thu, 03/28/2019 - 2:17pm
power meters
Training
Support vector machines
smart power grids
smart meters
Smart Grids
Smart Grid Privacy
smart grid environment
Smart Grid
Smart Environments
Smart City
smart appliances
security devices
pubcrawl
Artificial Neural Networks
power engineering computing
Metrics
IoT
invasive software
intrusion detection system
Intrusion Detection
Internet of Things (IoT)
Internet of Things
Human behavior
Data Mining Techniques.
Data mining
Cybersecurity
composability
« first
‹ previous
…
22
23
24
25
26
27
28
29
30
…
next ›
last »