Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Support vector machines
biblio
Password authentication using Keystroke Biometrics
Submitted by grigby1 on Wed, 03/08/2017 - 2:47pm
password
user verification mechanism
user natural typing pattern
User behavior
typing pattern matching
Text recognition
Support vector machines
security
robust security technique
pubcrawl170115
pattern matching
password security
Password authentication
artificial neural network
neural nets
Monitoring
keystroke biometrics
Hardware
Europe
error rates
Error analysis
Classification algorithms
biometrics (access control)
authorisation
authentication
Artificial Neural Networks
biblio
Keystroke dynamics performance enhancement with soft biometrics
Submitted by grigby1 on Wed, 03/08/2017 - 2:47pm
authentication
behavioural biometric modality
behavioural sciences computing
biometric characteristics
biometrics (access control)
classification approach
combination approach
Databases
feature extraction
keystroke dynamics performance enhancement
pubcrawl170115
soft biometrics
Support vector machines
timing
biblio
On Accuracy of Keystroke Authentications Based on Commonly Used English Words
Submitted by grigby1 on Wed, 03/08/2017 - 2:45pm
learning (artificial intelligence)
word total time duration feature
user active authentication
two-class support vector machine SVM
Support vector machines
pubcrawl170115
pattern classification
one-class support vector machine SVM
natural language processing
naïve Bayes classifier
machine learning techniques
commonly used English words
keystroke features
keystroke dynamics authentication systems
keystroke authentications
key duration feature
K-NN
k-nearest neighbor classifier
flight time latency feature
digraph time latency feature
Cryptography
biblio
On Accuracy of Classification-Based Keystroke Dynamics for Continuous User Authentication
Submitted by grigby1 on Wed, 03/08/2017 - 2:45pm
learning (artificial intelligence)
word total time duration
user active authentication
Training data
Training
timing
SVM
Support vector machines
support vector machine
security
pubcrawl170115
Performance
pattern classification
natural language processing
message authentication
machine learning techniques
authentication
keystroke features
keystroke dynamics authentication systems
keystroke dynamics
key duration
Kernel
K-NN
k-nearest neighbor classifier
flight time latency
feature extraction
English words
directed graphs
diagraph time latency
continuous user authentication
classification-based keystroke dynamics
biblio
Shot Boundary Detection with Graph Theory Using Keypoint Features and Color Histograms
Submitted by grigby1 on Wed, 03/08/2017 - 2:06pm
image segmentation
video signal processing
video shot boundary detection
Vectors
temporal feature vectors
SVM
Support vector machines
Segmentation
pubcrawl170111
Measurement
key point feature matching
Color
image matching
image colour analysis
Image color analysis
Histograms
graph theory
graph cuts
feature extraction
edge detection
comprehensive frame information
color histograms
biblio
Perceptual blur detection and assessment in the DCT domain
Submitted by grigby1 on Wed, 03/08/2017 - 2:04pm
just noticeable blur concept
Support vector machines
subjective scores
statistical modelling
statistical features
statistical analysis
quality score
pubcrawl170111
perceptual blur detection
perceptual blur degradation
perceptual blur assessment
Measurement
machine learning system
learning (artificial intelligence)
BBQM metric
JNB concept
image restoration
Image resolution
Image edge detection
feature extraction
discrete cosine transforms
discrete cosine transform
DCT domain
Databases
Correlation
Blurring
blind quality metric
blind blur quality metric
biblio
Multi-scale wavelet kernel extreme learning machine for EEG feature classification
Submitted by grigby1 on Tue, 03/07/2017 - 1:42pm
learning (artificial intelligence)
wavelet transforms
Training
Support vector machines
signal classification
pubcrawl170109
multiscale wavelet kernel extreme learning machine classifier
multi-scale wavelet kernel
medical signal processing
Accuracy
Kernel
feature extraction
ELM
electroencephalography
electroencephalographic signal feature classification
EEG feature classification
EEG classification
Classification algorithms
biblio
Cyber-deception and attribution in capture-the-flag exercises
Submitted by grigby1 on Tue, 03/07/2017 - 1:35pm
DEFCON CTF exercise data
Training
Support vector machines
Social network services
security of data
pubcrawl170109
Payloads
pattern classification
Logistics
capture-the-flag exercises
DEFCON capture-the-flag exercise data
Decision trees
Cyber-security
cyber-deception
cyber-attack
culprit attribution
Computer crime
classification techniques
biblio
Incipient Fault Diagnosis Using Support Vector Machines Based on Monitoring Continuous Decision Functions
Submitted by BrandonB on Wed, 05/06/2015 - 2:36pm
Binary mixture distillation column
Continuous decision function
Incipient fault diagnosis
Pattern recognition
Support vector machines
biblio
Distinguishing between Web Attacks and Vulnerability Scans Based on Behavioral Characteristics
Submitted by BrandonB on Wed, 05/06/2015 - 1:56pm
honeypots
Web systems
Web attacks
web applications
Web 2.0
vulnerability scans
Support vector machines
radio access networks
malicious cyber activities
internet
attacks
high-interaction honey pots
feature selection method
feature extraction
Encyclopedias
computer network security
classification of malicious cyber activities
Blogs
behavioral clustering analysis
behavioral characteristics
« first
‹ previous
…
29
30
31
32
33
34
35
36
37
next ›
last »