Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Support vector machines
biblio
SoundAuth: Secure Zero-Effort Two-Factor Authentication Based on Audio Signals
Submitted by grigby1 on Fri, 02/08/2019 - 4:34pm
password
zero-effort two-factor authentication
zero-effort 2FA mechanism
user-friendliness
user experience
two factor authentication
time synchronization
Support vector machines
support vector machine
SoundAuth
smart phones
smart phone
Servers
pubcrawl
ambient audio signals
online front-ends
machine learning
learning (artificial intelligence)
Human Factors
Human behavior
co-presence detection
challenge-response protocol
Browsers
browser
authorisation
authentication
audio signals
ambient sound
biblio
LipPass: Lip Reading-based User Authentication on Smartphones Leveraging Acoustic Signals
Submitted by grigby1 on Mon, 01/21/2019 - 12:28pm
privacy protection
learning (artificial intelligence)
lip movement patterns
lip reading-based user authentication system
LipPass
Lips
message authentication
mobile computing
pattern classification
Human behavior
pubcrawl
replay attacks
Resiliency
smart phones
Smartphones
spoofer detectors
support vector machine
Support vector machines
biometric-based authentication
Acoustic signal processing
acoustic signals
Acoustics
audio signal processing
authentication
authorisation
binary classifiers
binary tree-based authentication
Acoustic Fingerprints
build-in audio devices
composability
Data protection
deep learning-based method
Doppler effect
Doppler profiles
feature extraction
biblio
A Machine Learning Approach to Malicious JavaScript Detection using Fixed Length Vector Representation
Submitted by grigby1 on Mon, 12/10/2018 - 11:38am
pubcrawl
malicious JavaScript detection
malicious JS code detection
malicious JS codes
Metrics
neural nets
neural network model
Neural networks
pattern classification
plugin software
Predictive models
machine learning
resilience
Resiliency
Support vector machines
Vectors
web applications
Web site
Web sites
Zero day attacks
Zero-day attacks
drive-by-download attacks
Browsers
classifier model
composability
Context modeling
cyberattacks
Cybersecurity
D3M Dataset
defense
Doc2Vec
Doc2Vec features
authoring languages
Drive-by-Download Data
feature extraction
feature learning
features extraction
fixed length vector representation
invasive software
Java
JavaScript
learning (artificial intelligence)
biblio
An Adaptive Real-Time Architecture for Zero-Day Threat Detection
Submitted by grigby1 on Mon, 12/10/2018 - 11:38am
online trained supervised classification schemes
zero-day threats learning
zero-day threat detection
Zero-day attacks
Zero day attacks
Training
Support vector machines
stream processing technology
security systems
security of data
security
Resiliency
resilience
real-time systems
pubcrawl
online trained unsupervised anomaly detection schemes
Adaptation models
network operator
Metrics
legitimate user behavior
learning (artificial intelligence)
honeypots
Distributed databases
detection models training
defense
composability
attacker behavior
Anomaly Detection
adaptive threat detection architecture
adaptive real-time architecture
adaptive detection schemes
biblio
A Zero-Day Resistant Malware Detection Method for Securing Cloud Using SVM and Sandboxing Techniques
Submitted by grigby1 on Mon, 12/10/2018 - 11:38am
OS images
zero-day resistant malware detection method
Zero-day resistance
Zero-day attacks
Zero day attacks
user machine
tools
SVM
Support vector machines
security of data
sandboxing techniques
Resiliency
resilience
pubcrawl
phase exhaustive technique
Cloud Computing
operating systems (computers)
networking schemes
n-class SVM
Metrics
malware
machine learning
IT infrastructure
feature extraction
defense
Conferences
computer security
composability
clouds
biblio
A Comparison of Facial Feature Representation Methods for Automatic Facial Expression Recognition
Submitted by grigby1 on Mon, 12/03/2018 - 1:48pm
compound local binary patterns
Face detection
facial expression recognition
facial recognition
feature extraction
histogram of orientated gradients
Human behavior
local binary patterns
Metrics
pubcrawl
resilience
Resiliency
sign language
Support vector machines
biblio
Machine Learning Based Human Activity Detection in a Privacy-Aware Compliance Tracking System
Submitted by grigby1 on Wed, 11/14/2018 - 1:18pm
local nursing home
Support vector machines
Skeleton
Scalability
real-time systems
pubcrawl
privacy-aware compliance tracking system
privacy
patient care
PACTS
object detection
nursing staffs baseline
neural network
Microsoft Kinect
machine learning techniques
machine learning
Back
lifting-pulling tasks
learning (artificial intelligence)
Injuries
human skeleton data
Human Factors
Human activity prediction
human activity detection
high-level bending activities
field data acquisition
expert systems
expert rules
data privacy
data acquisition
body mechanics
back-bending activities detection
biblio
Quantifying the impact of adversarial evasion attacks on machine learning based android malware classifiers
Submitted by Katie Dey on Mon, 08/06/2018 - 1:24pm
malicious apps
user devices
Training data
Training
Support vector machines
statistical analysis
smart phones
regression analysis
Random Forest
nonlinear classifiers
neural network
neural nets
malware
adversarial evasion attacks
machine learning
logistic regression
linear classifiers
learning (artificial intelligence)
invasive software
Humanoid robots
feature extraction
Androids
Android-based devices
Android Malware Detection
android malware classifiers
Extraction
biblio
Anomaly Detection System Based on Classifier Fusion in ICS Environment
Submitted by grigby1 on Wed, 07/18/2018 - 10:06am
classifier
Anomaly Detection
anomaly detection system
Classification algorithms
Support vector machines
Training
Decision trees
demanding tasks
ICS Anomaly Detection
pattern classification
production engineering computing
pubcrawl
ICS cyber defense
ICS environment
reliable ICS cyber defense
resilience
supervised anomaly detection
classifier fusion
classifiers algorithms
computer security
industrial control
industrial control system
Resiliency
Scalability
critical information infrastructure
cyber security
Industrial Control Systems
integrated circuits
security of data
sensor fusion
cyber-attacks
Intrusion Detection
biblio
Cyber-Attack Detection for Industrial Control System Monitoring with Support Vector Machine Based on Communication Profile
Submitted by grigby1 on Wed, 07/18/2018 - 10:05am
IDS
penetration tests
privacy
production engineering computing
Support vector machines
Training
cyber-attack detection
Europe
ICS Anomaly Detection
pubcrawl
resilience
ICS communication profile
support vector machine
industrial control
industrial control system monitoring
Resiliency
Scalability
security
security of data
integrated circuits
Intrusion Detection Systems
cyber security test
Monitoring
« first
‹ previous
…
25
26
27
28
29
30
31
32
33
…
next ›
last »