Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Feature Selection
biblio
Wormhole attack detection in ad hoc network using machine learning technique
Submitted by aekwall on Mon, 08/03/2020 - 10:19am
machine learning algorithms
wormhole attack detection
wormhole attack
Training
telecommunication security
Task Analysis
stochastic gradient descent
security
Resiliency
Peer-to-peer computing
Naive Bayes
multiple wormhole tunnels
Metrics
machine learning technique
pubcrawl
machine learning
learning (artificial intelligence)
final task
Feature Selection
false alarm rate
detection rate
data generation
data collection operation
Compositionality
Ad hoc networks
Ad Hoc Network Security
ad hoc network environment
ad hoc network
biblio
K-Nearest Neighbors and Grid Search CV Based Real Time Fault Monitoring System for Industries
Submitted by grigby1 on Fri, 05/22/2020 - 2:23pm
model-based techniques
flask
graphical user interface (GUI)
grid search cross validation
grid search CV
induction machine
Induction machines
K-Nearest Neighbors (KNN)
KNN
knowledge-based approach
Feature Selection
Python
python web framework
real time fault monitoring
signature extraction-based approach
Statistics
time fault monitoring system
user friendly interface
nearest neighbor search
nearest neighbour methods
pubcrawl
Circuit faults
Data models
internet
Industries
production engineering computing
Classification algorithms
Metrics
Measurement
grid search
Prediction algorithms
k-nearest neighbors
user interfaces
condition monitoring (CM)
cross validation (CV)
fault detection
fault detection techniques
fault diagnosis
biblio
Research on Network Malicious Code Detection and Provenance Tracking in Future Network
Submitted by aekwall on Mon, 04/06/2020 - 9:56am
malicious code detection
classification algorithm
Predictive Metrics
cyber physical systems
network coding
Behavior features
detection method
feature selection methods
host node
software defined networking
malware detection system
matching classification method
Mobile communication
network controller
network malicious code detection
optimal feature subset
propagation model
switch node
Feature Selection
malware
security
invasive software
Classification algorithms
machine learning algorithms
SDN network
network security
feature extraction
computer network security
Resiliency
pubcrawl
composability
Computational modeling
pattern classification
Analytical models
mobile network
biblio
An Effective Android Ransomware Detection Through Multi-Factor Feature Filtration and Recurrent Neural Network
Submitted by aekwall on Mon, 03/23/2020 - 1:25pm
smart phones
multifactor feature filtration
majority voting process
Long short-term memory
filtration
feature selection algorithms
feature filtration techniques
deep learning-based malware detection model
Android ransomware detection
Android malware dataset
Android malware
Android environment
recurrent neural network
defense mechanisms
recurrent neural nets
forensic analysis
security
Malware Analysis
Digital Forensics
Metrics
deep learning
Ransomware
composability
pubcrawl
Resiliency
learning (artificial intelligence)
Feature Selection
feature extraction
mobile computing
invasive software
smart devices
biblio
Feature Extraction and Selection Method of Cyber-Attack and Threat Profiling in Cybersecurity Audit
Submitted by aekwall on Mon, 03/09/2020 - 11:05am
cyber threats
Security Audits
threat profiling
feature extraction and selection
cybersecurity audit execution
cybersecurity audit
complicated cyber landscapes
aggressive cyber landscape
auditing
security of data
Scalability
cyber-attacks
pubcrawl
Human behavior
Resiliency
Feature Selection
feature extraction
cyber-attack
biblio
Binarized Multi-Factor Cognitive Detection of Bio-Modality Spoofing in Fog Based Medical Cyber-Physical System
Submitted by aekwall on Mon, 02/10/2020 - 12:04pm
heavy-weight detection mechanisms
bio-modality detection sensors
bio-modality detection systems
bio-modality spoofing
Biomedical imaging
Feature Selection
fingerprint identification
fog based architectures
fog node
fog-based security application
binarized multifactor cognitive detection
image synthesis
Iris recognition
MCPS
resource-constrained sensors
secure user authentication
Sensor management
spoofing bio-identifiable property
spoofing detection
cyber-physical systems
telecommunication security
computer architecture
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
wireless sensor networks
Metrics
authentication
security of data
sensors
biometrics (access control)
Human Factors
face recognition
Fog computing
Ensemble Learning
medical cyber-physical systems
multifactor authentication
biblio
Content Adaptive Image Steganalysis in Spatial Domain Using Selected Co-Occurrence Features
Submitted by grigby1 on Mon, 02/10/2020 - 11:42am
primary content adaptive stego algorithms
image classification
Image edge detection
image steganalysis
LBP features
local co-occurrence features
local image region
Metrics
microsoft windows
Histograms
privacy
pubcrawl
selected co-occurrence features
Spatial domain
Steganography
steganography detection
weak classifier
boosted classifiers
Haar transforms
generalization power
general content adaptive image steganography detector
final detector
feature selection procedure
Feature Selection
feature extraction
Detectors
Databases
content adaptive image steganalysis
content adaptive
composability
co-occurrence feature
Classification algorithms
candidate features
biblio
Evaluating Features Selection on NSL-KDD Data-Set to Train a Support Vector Machine-Based Intrusion Detection System
Submitted by aekwall on Mon, 01/27/2020 - 10:20am
Measurement
support vector machine-based intrusion detection system
support vector machine model
NSL-KDD data-set
global information security
economic repercussions
DoS attacks
digital industry
data set
classification model
big companies
aforementioned data-set
Denial of Service attacks
Predictive Metrics
security of data
Intrusion Detection
Companies
cyber-attacks
support vector machine
machine learning
composability
pubcrawl
Resiliency
Feature Selection
feature extraction
Support vector machines
Data models
Kernel
biblio
Network Intrusion Detection using Supervised Machine Learning Technique with Feature Selection
Submitted by aekwall on Mon, 01/27/2020 - 10:20am
pattern classification
wrapper feature selection
supervised machine learning technique
supervised learning algorithm
intrusion detection success rate
artificial neural network based machine
intrusion
Predictive Metrics
Signal processing algorithms
Artificial Neural Networks
network traffic
neural network
machine learning techniques
network intrusion detection
security of data
neural nets
deep learning
composability
pubcrawl
Resiliency
machine learning
learning (artificial intelligence)
Feature Selection
feature extraction
support vector machine
Support vector machines
machine learning algorithms
Classification algorithms
biblio
Fuzzy Rough Set Feature Selection to Enhance Phishing Attack Detection
Submitted by grigby1 on Tue, 11/26/2019 - 3:47pm
random forests
pattern classification
personal information
Phishing
phishing attack detection
Phishing Detection
phishing Web sites
pubcrawl
random forest classification
machine learning-based strategies
rough set theory
Rough sets
Training
Uniform resource locators
universal feature set
Web pages
Web sites
Fuzzy Rough Set
Computer crime
confidential information
cybercrime activities
definitive features
Electronic mail
feature extraction
Feature Selection
FRS feature selection
classifiers
fuzzy rough set feature selection
fuzzy rough set theory
fuzzy set theory
generalizable phishing detection
Human behavior
human factor
legitimate Web site
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »