Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Support vector machines
biblio
RansHunt: A Support Vector Machines Based Ransomware Analysis Framework with Integrated Feature Set
Submitted by grigby1 on Wed, 05/09/2018 - 2:53pm
ransomware families
malwares
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
pubcrawl
RansHunt
Ransomware
ransomware analysis framework
malware
ransomware samples
ransomware variants
sandboxing
static analysis
static code features
static features
Support vector machines
Algorithm design and analysis
machine learning
learning (artificial intelligence)
invasive software
integrated feature set
individual analysis approach
hybrid cryptosystem
Heuristic algorithms
feature extraction
Electronic mail
dynamic analysis
cyber-crime
Cryptography
crypto-ransomwares
composability
collaboration
biblio
A heuristic attack detection approach using the \#x201C;least weighted \#x201D; attributes for cyber security data
Submitted by K_Hooper on Wed, 05/09/2018 - 11:02am
learning (artificial intelligence)
telecommunication traffic
Support vector machines
Security Heuristics
Scalability
Resiliency
pubcrawl
pattern classification
network traffic data
network systems
network intrusion detection
machine-learning techniques
machine learning
least weighted attributes
Cloud Computing
Intrusion Detection
heuristic attack detection approach
Feature Selection
feature extraction
Entropy
dimensionality problem
dimensional reduction
Data mining
cyber security data
cyber security
computer network security
Computational modeling
cloud-based computer networks
biblio
Support Vector Machine (SVM) Based Sybil Attack Detection in Vehicular Networks
Submitted by K_Hooper on Wed, 05/02/2018 - 10:42am
Safety
vehicular networks
vehicular ad hoc networks
Vehicle driving
sybil attacks
SVM kernel functions based classifiers
Support vector machines
support vector machine based Sybil attack detection method
SUMO simulator
security of data
security
Ad hoc networks
Resiliency
pubcrawl
Peer-to-peer computing
Metrics
learning (artificial intelligence)
Eigenvalues and eigenfunctions
driving pattern matrices
DPM
composability
biblio
CVSSA: Cross-Architecture Vulnerability Search in Firmware Based on Support Vector Machine and Attributed Control Flow Graph
Submitted by grigby1 on Tue, 05/01/2018 - 11:38am
function level features
vulnerability function
Training
third-party code bases
SVM
suspicious functions
Support vector machines
support vector machine
Software
security of data
Resiliency
resilience
real-world firmware images
pubcrawl
Microprogramming
Metrics
ACFG
flow graphs
firmware security
firmware
feature extraction
CVSSA
cross-architecture vulnerability search methods
cross-architecture
computer architecture
Computational modeling
composability
bipartite matching
binary firmware
basic-block level features
attributed control flow graph
biblio
A Sequential Multi-Objective Robust Optimization Approach under Interval Uncertainty Based on Support Vector Machines
Submitted by grigby1 on Tue, 05/01/2018 - 11:38am
pattern classification
uncertainty
SVM
Support vector machines
sequential optimization approach
sequential multiobjective robust optimization
sequential MORO
Robustness
Resiliency
resilience
pubcrawl
composability
optimization
optimisation
multi-objective robust optimization
Metrics
mathematics computing
interval uncertainty
genetic algorithms
design alternative classification model
convergence
Computational modeling
biblio
Accelerated Stochastic Gradient Method for Support Vector Machines Classification with Additive Kernel
Submitted by grigby1 on Tue, 05/01/2018 - 11:38am
machine learning
Training
testing
SVM classification
support vector machines classification
Support vector machines (SVMs)
Support vector machines
Stochastic processes
Resiliency
resilience
pubcrawl
polynomials
pattern classification
Nesterov's acceleration strategy
mini-batch stochastic gradient descent
Metrics
accelerated mini-batch stochastic gradient descent algorithm
linear classifier
learning (artificial intelligence)
Kernel
gradient methods
gradient approximation
Data mining
composability
Classification algorithms
Additives
additive kernel version
additive kernel
acceleration strategy
Acceleration
accelerated stochastic gradient method
biblio
Sample-Based Regularization for Support Vector Machine Classification
Submitted by grigby1 on Tue, 05/01/2018 - 11:38am
regularization scheme
training sample selection
training sample level
Training data
Training
SVM
Support vector machines
support vector machine classification
support vector machine
selected training data
sample-based regularization
Resiliency
resilience
composability
Regularization
pubcrawl
optimization
Metrics
maximum margin-based classification
linear combination
kernel methods
Kernel
image classification
human action recognition tasks
Fasteners
Dropout
biblio
A Support Vector Machine Based Approach for Code Smell Detection
Submitted by grigby1 on Tue, 05/01/2018 - 11:38am
resilience
Training
SVMCSD
Support vector machines
support vector machine
Software systems
software quality
software metrics
software maintenance
software developers
Resiliency
Anti-patterns
public domain software
pubcrawl
Metrics
Measurement
learning (artificial intelligence)
DETEX
computer science
composability
code smells
code smell detection
biblio
Identification of Abnormal Network Traffic Using Support Vector Machine
Submitted by grigby1 on Tue, 05/01/2018 - 11:38am
composability
feature extraction
Kernel
machine learning
machine learning algorithms
Metrics
pubcrawl
resilience
Resiliency
Support vector machines
SVM
Traffic identification
Training
Training data
biblio
On the Detection of Adversarial Attacks Against Deep Neural Networks
Submitted by grigby1 on Tue, 05/01/2018 - 11:37am
active learning
Adversarial Machine Learning
composability
Deep Neural Network
machine learning security
Metrics
pubcrawl
resilience
Resiliency
support vector machine
Support vector machines
« first
‹ previous
…
27
28
29
30
31
32
33
34
35
…
next ›
last »