Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Support vector machines
biblio
Security Analysis of Private Intellectual Property
Submitted by grigby1 on Wed, 06/08/2022 - 10:18am
internet
Support vector machines
Resiliency
resilience
real-time systems
pubcrawl
private intellectual
policy-based governance
patents
ip protection
intellectual property security
Intellectual Property Rights (IPR)
Intellectual Property Protection
intellectual property
infringer
Economics
Data processing
composability
biblio
Image Forensics using Optimal Normalization in Challenging Environment
Submitted by grigby1 on Mon, 06/06/2022 - 12:13pm
tools
feature extraction
Support vector machines
pubcrawl
Human behavior
resilience
Scalability
Metrics
Image coding
Transform coding
digital images
Image forensics
Resiliency
Co-occurrence
image filtering
Image operations
biblio
An Experimental Analysis on Malware Detection in Executable Files using Machine Learning
Submitted by grigby1 on Thu, 05/19/2022 - 12:59pm
malware
trojan horse detection
trojan horse
Executable Files
Adware
Virus
computer viruses
spyware
Trojan horses
tools
composability
internet
Resiliency
resilience
pubcrawl
Support vector machines
machine learning algorithms
machine learning
biblio
Intrusion Representation and Classification using Learning Algorithm
Submitted by grigby1 on Thu, 05/19/2022 - 12:56pm
Training
security
Support vector machines
Intrusion Detection
pubcrawl
privacy
Classification algorithms
Metrics
Cybersecurity
testing
genetic algorithms
threat vectors
intrusion
decomposition
discriminatory
Fitness value
biblio
A Machine Learning Approach to Detection of Critical Alerts from Imbalanced Multi-Appliance Threat Alert Logs
Submitted by grigby1 on Thu, 05/19/2022 - 12:56pm
Noise measurement
Oversampling
data cleaning
class imbalance
alert screening
alert fatigue
threat vectors
cleaning
automation
Training
Metrics
Big Data
privacy
pubcrawl
Support vector machines
security
machine learning
biblio
Hybrid Evolutionary Approach in Feature Vector for Ransomware Detection
Submitted by grigby1 on Thu, 05/19/2022 - 12:56pm
Malware Analysis
threat vectors
Support vector machines
static analysis
ransomware detection
Radio frequency
pubcrawl
privacy
network security
Metrics
Ransomware
machine learning algorithms
machine learning
Internet of Things
Feature Selection
feature extraction
Cybersecurity
Cryptography
cyber-physical systems
Resiliency
biblio
Identification of Cyber Threats and Parsing of Data
Submitted by grigby1 on Thu, 05/19/2022 - 12:55pm
Organizations
Support vector machines
pubcrawl
Radio frequency
Correlation
privacy
Benchmark testing
Metrics
Market research
Technological innovation
threat vectors
biblio
Machine Learning for Threat Recognition in Critical Cyber-Physical Systems
Submitted by grigby1 on Thu, 05/19/2022 - 12:55pm
privacy
Trustworthy Artificial Intelligence
threat vectors
threat assessment
Support vector machines
Stress
risk management
Radio frequency
pubcrawl
Trustworthy Systems
Metrics
machine learning
information management
Healthcare
Cybersecurity
cyber-physical systems
critical infrastructures
Computer crime
biblio
A Mixed Method For Internal Threat Detection
Submitted by grigby1 on Thu, 05/19/2022 - 12:55pm
deep learning
feature extraction
Support vector machines
pubcrawl
Conferences
Heuristic algorithms
Data models
privacy
Metrics
automation
Internal Threat
threat vectors
fully connected neural network
mixed detection
support vector data description
Variational Auto-Encoders
biblio
User Behaviour based Insider Threat Detection in Critical Infrastructures
Submitted by grigby1 on Thu, 05/19/2022 - 12:54pm
privacy
User Behavior Analysis
Insider Threat Detection (ITD)
Bi-directional Long Short Term Memory (bi-LSTM)
threat vectors
statistical analysis
support vector machine (SVM)
Metrics
Computer crime
critical infrastructure
pubcrawl
Anomaly Detection
machine learning
cyber security
Support vector machines
Organizations
feature extraction
deep learning
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »