Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
deep learning
biblio
Research of Classical Machine Learning Methods and Deep Learning Models Effectiveness in Detecting Anomalies of Industrial Control System
Submitted by grigby1 on Mon, 06/10/2019 - 1:56pm
resilience
machine learning algorithms
machine learning methods
modern industrial control systems
neural nets
Neural networks
privacy
production engineering computing
pubcrawl
machine learning
Resiliency
security
security of data
signal correlations
Support vector machines
Tennessee Eastman process simulation data
Training
Anomaly Detection
linear algorithms
learning (artificial intelligence)
industrial process anomaly detection task
industrial control
ICS security
ICs
Feeds
deep learning models
deep learning
Decision trees
Data processing
Cyber Attacks
control engineering computing
composability
anomaly detection evaluation dataset
biblio
Optimal Machine Learning Algorithms for Cyber Threat Detection
Submitted by grigby1 on Mon, 06/10/2019 - 1:56pm
Regression
Logistics
machine learning
machine learning algorithms
minimisation
ML-based analytics
Numerical Clustering
optimal machine learning algorithm
prediction
privacy
pubcrawl
learning (artificial intelligence)
resilience
Resiliency
security
security data
security log analytics
security logs
security machine data
security of data
SoC
Decision trees
Anomaly Detection
automated cyber threat detection
classification
Classification algorithms
Clustering algorithms
composability
cyber security
cyber threat detection model
Data mining
data science
advanced targeted cyber threats
deep learning
Dimensionality
efficient machine
Ensemble Learning
exponential hike
false detection rates
false-positive detections
global Security Operations Center environments
Kernel
biblio
Deep Learning Based Attribute Classification Insider Threat Detection for Data Security
Submitted by aekwall on Wed, 05/08/2019 - 9:49am
long short term memory recurrent neural networks
threat detection recall
security of data
resilience
Recurrent neural networks
recurrent neural nets
pubcrawl
Principal Component Analysis based threat detection methods
principal component analysis
pattern classification
network threat
Metrics
malicious insiders
machine learning
Anomaly Detection
Logic gates
learning (artificial intelligence)
Kernel
insider threat
Human behavior
high detection rate
feature extraction
end-to-end detection framework
deep learning
Data Security
CERT insider threat dataset
attribute classifiers
attribute classification insider threat detection method
biblio
Role-based Log Analysis Applying Deep Learning for Insider Threat Detection
Submitted by aekwall on Wed, 05/08/2019 - 9:46am
log data analysis
resilience
insider threat
Metrics
deep learning
pubcrawl
Human behavior
biblio
Hybrid Approach for Intrusion Detection Using Fuzzy Association Rules
Submitted by grigby1 on Wed, 05/01/2019 - 11:29am
reduced dataset
Intrusion Detection
intrusion detection system
Metrics
misuse detection
network technologies
pattern clustering
pubcrawl
rapid development
Internet rapid development
resilience
Resiliency
security
security of data
Time complexity
Training
weighted fuzzy C-mean clustering algorithm
Anomaly Detection
input data space
hybrid approach
Fuzzy sets
fuzzy set theory
fuzzy logic scheme
Fuzzy logic
fuzzy association rules
feature extraction
deep learning
decrease resource utilization
Decision Making
considerable increase
computer networks
Clustering algorithms
anomaly intrusions
biblio
Cross Domain Regularization for Neural Ranking Models Using Adversarial Learning
Submitted by grigby1 on Wed, 05/01/2019 - 11:27am
adversarial learning
deep learning
Generative Adversarial Learning
information retrieval
Metrics
pubcrawl
Resiliency
Scalability
biblio
Multi-View Image Generation from a Single-View
Submitted by grigby1 on Wed, 05/01/2019 - 11:27am
deep learning
Generative Adversarial Learning
generative adversarial networks
image generation
Metrics
pubcrawl
Resiliency
Scalability
biblio
Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach
Submitted by aekwall on Mon, 04/01/2019 - 10:08am
Human behavior
pubcrawl
composability
deep learning
captchas
CAPTCHA
generative adversarial networks
text-based captchas
transfer learning
biblio
A CAPTCHA recognition technology based on deep learning
Submitted by aekwall on Mon, 04/01/2019 - 10:07am
feedforward neural nets
Training
Task Analysis
security of data
security breaches
pubcrawl
multitask joint training model
Multi task joint training
model recognition
license plate recognition
learning (artificial intelligence)
image recognition
human-machine distinction technology
Human behavior
handwriting recognition
Adaptation models
feature extraction
deep learning
convolutional neural network model
convolutional neural network
convolution
composability
Completely Automated Public Turing Test to Tell Computers and Humans Apart
character recognition
captchas
CAPTCHA recognition technology
CAPTCHA
automatic malicious program attack
adaptive learning rate
biblio
Verification CAPTCHA Based on Deep Learning
Submitted by aekwall on Mon, 04/01/2019 - 10:07am
CAPTCHA recognition
VGGNet model
verification captcha
Pattern recognition
network structure
image segmentation
image recognition
feedforward neural nets
end-to-end
convolution neural network model
convolution
captchas
captcha segmentation
security of data
CAPTCHA
Biological neural networks
convolutional neural networks
Training
internet
Neurons
deep learning
composability
pubcrawl
Human behavior
learning (artificial intelligence)
feature extraction
« first
‹ previous
…
52
53
54
55
56
57
58
59
60
…
next ›
last »