Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Support vector machines
biblio
Securing the Internet of Things and Wireless Sensor Networks via Machine Learning: A Survey
Submitted by aekwall on Mon, 03/25/2019 - 8:56am
physical devices
WSN security
wireless sensor networks
Support vector machines
sensor security
security threats
security of data
security
Resiliency
pubcrawl
Artificial Neural Networks
Neural networks
Metrics
machine learning algorithms
machine learning
learning (artificial intelligence)
IoT security
Internet of Things
Human behavior
composability
biblio
Unauthorized Access Point Detection Using Machine Learning Algorithms for Information Protection
Submitted by grigby1 on Fri, 03/15/2019 - 10:53am
pubcrawl
wireless LAN
wireless Internet environment
wireless integrated environment
Wireless fidelity
Wireless communication
wireless AP security
Wi-Fi
unauthorized AP
unauthorized Access Point detection
threat vectors
Support vector machines
support vector machine
security
RTT value data
Classification algorithms
protection
privacy
Prediction algorithms
multilayer perceptrons
military facilities
Metrics
machine learning algorithms
machine learning
learning (artificial intelligence)
information protection
hacking attacks
detection
computer network security
biblio
Using Convolutional Neural Networks to Network Intrusion Detection for Cyber Threats
Submitted by grigby1 on Fri, 03/15/2019 - 10:53am
Metrics
Training
threat vectors
threat detection classification
Support vector machines
security of data
Resiliency
pubcrawl
privacy
pattern classification
network threat classification
network intrusion detection
network behavioural features
Behavior features
LeNet-5
learning (artificial intelligence)
Intrusion Detection
feedforward neural nets
feature extraction
deep learning
cyber threats
convolutional neural networks
convolution
Conferences
composability
biblio
Collecting Cyber Threat Intelligence from Hacker Forums via a Two-Stage, Hybrid Process Using Support Vector Machines and Latent Dirichlet Allocation
Submitted by grigby1 on Fri, 03/15/2019 - 10:52am
security controls
machine learning algorithms
malicious proxy servers
malware
Metrics
nontraditional information sources
privacy
pubcrawl
resource management
machine learning
Support vector machines
SVM
text classification
threat vectors
topic modeling
two-stage hybrid process
Vocabulary
AV detection
learning (artificial intelligence)
leaked credentials
LDA
latent Dirichlet allocation
internet
hybrid machine learning model
hacker forums
hacker forum posts
cyber threat landscape
Cyber Threat Intelligence (CTI)
cyber threat intelligence
cyber security
CTI
Computer hacking
Computer crime
biblio
Analysis of Radiation Effects for Monitoring Circuit Based on Deep Belief Network and Support Vector Method
Submitted by grigby1 on Wed, 03/06/2019 - 3:30pm
Monitoring
Training
total ionizing dose
support vector regression
Support vector machines
support vector machine
Scalability
Resiliency
resilience
remaining useful life
remaining life assessment
regression analysis
radiation effects
pubcrawl
policy-based governance
monitoring circuit
belief networks
Metrics
intelligent analysis method
integrated circuit reliability
Human behavior
feature extraction
deep belief network model
Deep Belief Network
DBN-SVM
composability
collaboration
circuit signal
circuit reliability
circuit degradation trend
circuit analysis computing
biblio
Convolutional Neural Network Based SMS Spam Detection
Submitted by aekwall on Mon, 02/25/2019 - 10:42am
spam messages
undesired text message
Tiago dataset
text categorization
SMS Spam
Imbalanced dataset
Data preprocessing
Cost-sensitive classification
convolutional neural networks
convolutional neural network
convolutional neural nets
CNN
anti-spam filters
text analysis
Scalability
SMS spam detection
electronic messaging
Unsolicited electronic mail
spam detection
unsolicited e-mail
Metrics
machine learning
pubcrawl
Human behavior
learning (artificial intelligence)
feature extraction
Support vector machines
Classification algorithms
biblio
An Improved Spam Detection Method with Weighted Support Vector Machine
Submitted by aekwall on Mon, 02/25/2019 - 10:40am
KFCM
WSVM
weighted SVM
weighted support vector machine
weight variables
Unsolicited electronic mail
Training
SVM
spam filtering
spam detection method
spam detection
Prediction algorithms
KPCM
KFCM algorithm
Scalability
email users
unsolicited e-mail
internet
pattern classification
Metrics
pubcrawl
Human behavior
learning (artificial intelligence)
feature extraction
Support vector machines
machine learning algorithms
Kernel
biblio
Challenges in Classifying Privacy Policies by Machine Learning with Word-based Features
Submitted by aekwall on Mon, 02/18/2019 - 11:56am
analysis
Bag-of-Words Model
composability
Metrics
Naive Bayes Classifiers
policy-based governance
Privacy Labels
pubcrawl
random forests
Resiliency
Security Policies Analysis
Support vector machines
TF-IDF
biblio
New Incremental Learning Algorithm for Semi-Supervised Support Vector Machine
Submitted by aekwall on Mon, 02/18/2019 - 11:56am
Support vector machines
Resiliency
pubcrawl
composability
difference of convex programming
incremental learning
path following algorithm
semi-supervised support vector machine
Metrics
biblio
Application of Machine Learning to Identify Counterfeit Website
Submitted by aekwall on Mon, 02/18/2019 - 11:56am
Support vector machines
support vector machine
Resiliency
pubcrawl
composability
counterfeit website
Decision Tree
fraudulent website
logistic regression
Metrics
« first
‹ previous
…
23
24
25
26
27
28
29
30
31
…
next ›
last »