Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Feature Selection
biblio
Detection of DDoS Attack and Classification Using a Hybrid Approach
Submitted by grigby1 on Tue, 02/16/2021 - 12:58pm
hybrid feature selection method
Classifiers.
cross-validation
DDoS category
DDoS detection
DDoS detection rate
decision table
discretize dataset
Feature Selection
Bayes Net classifiers
J48 classifier
KDD DDoS dataset
Naive Bayes Classifiers
naive Bayes methods
NSL DDoS dataset
NSL KDD dataset
selected DDoS packets
weka tool
computer network security
security of data
Cloud Computing
machine learning
pubcrawl
Human behavior
Metrics
resilience
Resiliency
learning (artificial intelligence)
random forests
composability
pattern classification
Random Forest
Cloud Security
machine learning classifiers
DDoS Attack
DDoS attack detection
biblio
Effectiveness of Random Deep Feature Selection for Securing Image Manipulation Detectors Against Adversarial Examples
Submitted by grigby1 on Mon, 12/28/2020 - 12:49pm
image manipulation detectors
Support vector machines
security of data
secure classification
Scalability
Resiliency
resilience
randomization-based defences
random feature selection approach
random deep feature selection
pubcrawl
Metrics
linear SVM
learning (artificial intelligence)
adaptive filtering
image manipulation detection tasks
image manipulation detection
image classification
fully connected neural network
Feature Selection
feature randomization
feature extraction
deep learning for forensics
deep learning features
CNN image manipulation detector
adversarial multimedia forensics
Adversarial Machine Learning
biblio
Sparse Support Vector Machine for Network Behavior Anomaly Detection
Submitted by aekwall on Mon, 12/14/2020 - 12:30pm
Training
support vector machine approach
sparse SVM
sparse support vector machine
related weights matching
network behavior anomaly detection
NBAD features
general machine learning approach
adopted training weights
Training data
Predictive Metrics
Anomaly Detection
computer network security
SVM
pattern classification
optimization
composability
pubcrawl
Resiliency
learning (artificial intelligence)
Feature Selection
feature extraction
Support vector machines
Data models
biblio
Deep Android Malware Classification with API-Based Feature Graph
Submitted by grigby1 on Fri, 12/11/2020 - 2:33pm
invasive software
structure analysis
Silicon
security
Resiliency
resilience
pubcrawl
privacy
mobile computing
Metrics
Mathematical model
malware class
malware apps
Malware Analysis
malware
Analytical models
Human behavior
hand-refined API-based feature graph
graph theory
Feature Selection
feature extraction
deep learning
CNN-based classifier
application program interfaces
API-based feature graph classification
API features
Android malware classification
Android malware apps
Android malware
Android (operating system)
biblio
Flexible Selecting of Style to Content Ratio in Neural Style Transfer
Submitted by aekwall on Mon, 12/07/2020 - 12:09pm
learning (artificial intelligence)
weight ratio selection
user defined style weight ratio
texture synthesis
style transfer
style image selection
Scalability
Resiliency
Predictive Metrics
optimization
neural style transfer
Neural networks
pubcrawl
image texture
Image color analysis
Feature Selection
feature extraction
convolutional neural networks
convolutional neural nets
convolution neural networks
convolution
content ratio
Artificial Intelligence
ART
biblio
Radial Basis Function (RBF) Based on Multistage Autoencoders for Intrusion Detection system (IDS)
Submitted by grigby1 on Tue, 12/01/2020 - 1:47pm
pubcrawl
Training
testing
Support vector machines
security of data
Resiliency
resilience
RBF-based multistage autoencoders
RBF training
RBF
radial basis function networks
radial basis function
auto-encoders
MATLAB2018
MATLAB
Mathematical model
learning (artificial intelligence)
intrusion detection system
Intrusion Detection
IDS attacks
IDS
Feature Selection
feature extraction
composability
biblio
Web Service Selection with Correlations: A Feature-Based Abstraction Refinement Approach
Submitted by aekwall on Mon, 11/30/2020 - 12:03pm
Scalability
Internet-scale Computing Security
workflow
Web service selection problem
Web service benchmarks
Silicon compounds
service selection
ordered tasks
linear workflow
feature-based abstraction refinement technique
candidate services
policy governance
set theory
Task Analysis
Proposals
Correlation
optimisation
web services
optimization
Metrics
composability
pubcrawl
Human behavior
Resiliency
Feature Selection
biblio
Malware Classification System Based on Machine Learning
Submitted by grigby1 on Thu, 10/29/2020 - 11:11am
malware
static analysis
Resiliency
resilience
pubcrawl
privacy
pattern classification
multifeature selection fusion
Metrics
malware classification system
malware classification
Classification system
machine learning
Libraries
learning (artificial intelligence)
invasive software
Human behavior
high-efficiency automatic classification system
Feature Selection
feature extraction
Entropy
biblio
A Novel Machine Learning Based Malware Detection and Classification Framework
Submitted by aekwall on Mon, 10/26/2020 - 12:13pm
complex malware types
Predictive Metrics
computer systems
Feature Selection
dynamic analysis
feature selection algorithms
machine learning models
classification accuracy
accurate malware detection
analysis report
classification framework
malware samples
fine-grained classification
high detection
malware analysis framework
malware files
minimum computation cost
selection module
signature-based malware detection techniques
system activities
time progresses
Training
invasive software
machine learning algorithms
feature extraction
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
Metrics
pattern classification
malware
machine learning
testing
privacy
Virtual machining
Malware Analysis
cuckoo sandbox
malware classification
malware detection
static and dynamic analysis
biblio
Suspicious Network Event Recognition Using Modified Stacking Ensemble Machine Learning
Submitted by grigby1 on Fri, 08/28/2020 - 3:34pm
extremely randomised trees
artificial intelligence-oriented automatic services
big-data analytics
cyber-threats
Data preprocessing
data science
Ensemble Learning
ensemble learning.
exploratory data analysis
AdaBoost
feature creation
modified stacking ensemble machine learning
Network Event Log Analytics
network intrusions
network traffic alerts
suspicious network event recognition dataset
suspicious network events
big data security in the cloud
neural nets
machine learning
data analysis
pubcrawl
Resiliency
Conferences
random forests
Big Data
pattern classification
security of data
Neural networks
Metrics
Random Forest
resilience
Scalability
Feature Selection
2019 IEEE BigData Cup Challenge
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »