Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Feature Selection
biblio
Evaluating Social Spammer Detection Systems
Submitted by aekwall on Mon, 02/25/2019 - 11:42am
Scalability
Feature Selection
Human behavior
pubcrawl
Metrics
spam detection
evaluation workbench
social network
biblio
Authorship Attribution vs. Adversarial Authorship from a LIWC and Sentiment Analysis Perspective
Submitted by grigby1 on Fri, 02/22/2019 - 4:02pm
Metrics
Writing
stylometry
Steady-State Genetic Algorithm
Steady-state
sentiment analysis
Semantics
pubcrawl
psychology
Adversarial Authorship
LIWC
Human behavior
GEFeS
Feature Selection
feature extraction
computer science
authorship attribution
biblio
Feature Selection for Machine Learning-Based Early Detection of Distributed Cyber Attacks
Submitted by aekwall on Wed, 02/13/2019 - 12:02pm
learning (artificial intelligence)
Support vector machines
support vector machine
Servers
security of data
Scalability
Resiliency
Random Forest
pubcrawl
privacy leakage
principal component analysis
machine learning-based detection methods
machine learning algorithms
machine learning
Attack vectors
Human behavior
Feature Selection
feature extraction
Electronic mail
early detection
distributed cyber attacks
denial of services
DDoS Attacks
data privacy
cyberattack
cyber security community
Command & Control communication
C&C communication
biblio
Reducing Data Complexity in Feature Extraction and Feature Selection for Big Data Security Analytics
Submitted by grigby1 on Fri, 02/08/2019 - 4:15pm
pubcrawl
heterogeneous data
Human behavior
input logs preprocessing
learning (artificial intelligence)
machine learning
machine learning algorithms
Metrics
network sensors
Feature Selection
pyspark
Python
python API
Resiliency
security
security of data
Task Analysis
apache spark
feature extraction
data mining techniques
Data mining
data complexity
cybersecurity threats
cybersecurity attacks
cyber security
computational complexity
composability
Complexity theory
big data security analytics
Big Data
artificial intelligence security
Artificial Intelligence
application program interfaces
biblio
Adversarial mRMR against Evasion Attacks
Submitted by grigby1 on Mon, 01/21/2019 - 12:39pm
security
novel adversary-aware feature selection algorithm
pattern classification
Perfect Knowledge attack scenarios
popular filter algorithms
pubcrawl
Resiliency
robust feature selection algorithms
Scalability
mRMR
security of data
security sensitive applications
Time complexity
Traditional Wrapped Feature Selection algorithm
Training
TWFS
WAFS
wrapped adversarial feature selection algorithm
Feature Selection
adversarial mRMR
adversary attacks
Adversary Models
Classification algorithms
computational complexity
evasion attacks
FAFS
feature extraction
adversarial feature selection
feature selection process
filter model
filtering algorithms
Human behavior
learning (artificial intelligence)
machine learning
machine learning algorithms
Metrics
biblio
Object-Specific Style Transfer Based on Feature Map Selection Using CNNs
Submitted by grigby1 on Mon, 11/19/2018 - 12:29pm
Metrics
visualization
style transfer
Scalability
Resiliency
resilience
pubcrawl
Pattern recognition
object-specific style transfer
neural style transfer
Neural networks
neural nets
CNN
machine learning
image style
Image Processing
image content
Feature Selection
feature map selection
Dogs
convolutional neural networks
Conferences
computer vision
biblio
Towards Making Systems Forget with Machine Unlearning
Submitted by Katie Dey on Mon, 08/06/2018 - 1:24pm
learning (artificial intelligence)
usability perspective
Training data
summation form
statistical query learning
security perspective
security of data
recommender systems
recommendation engine
privacy risks
machine unlearning
machine learning algorithms
Learning systems
Adversarial Machine Learning
forgetting systems
Forgetting System
Feature Selection
feature modeling
feature extraction
Extraction
data privacy
Data models
data lineage
Computational modeling
complex data propagation network
Cognitive Security
Articles of Interest
Extraction
C3E 2019
biblio
A heuristic attack detection approach using the \#x201C;least weighted \#x201D; attributes for cyber security data
Submitted by K_Hooper on Wed, 05/09/2018 - 11:02am
learning (artificial intelligence)
telecommunication traffic
Support vector machines
Security Heuristics
Scalability
Resiliency
pubcrawl
pattern classification
network traffic data
network systems
network intrusion detection
machine-learning techniques
machine learning
least weighted attributes
Cloud Computing
Intrusion Detection
heuristic attack detection approach
Feature Selection
feature extraction
Entropy
dimensionality problem
dimensional reduction
Data mining
cyber security data
cyber security
computer network security
Computational modeling
cloud-based computer networks
biblio
Toward Accurate and Efficient Feature Selection for Speaker Recognition on Wearables
Submitted by grigby1 on Wed, 04/11/2018 - 2:53pm
audio signal processing
cyber physical systems
Feature Selection
Metrics
pubcrawl
resilience
Resiliency
Scalability
security
Time Frequency Analysis
biblio
A hybrid model for anomaly-based intrusion detection in SCADA networks
Submitted by K_Hooper on Wed, 04/04/2018 - 9:59am
learning (artificial intelligence)
Zero-day attacks
vulnerability detection
vulnerabilities
supervisory control and data acquisition systems
security of data
SCADA systems
SCADA networks
robust hybrid model
Resiliency
pubcrawl
Protocols
Metrics
machine learning approach
machine learning
anomaly-based Intrusion Detection Systems
Intrusion Detection
industrial control system dataset
industrial control system
industrial control
Human behavior
feature selection model
Feature Selection
feature extraction
fabrication
Distributed Analytics and Security Institute Mississippi State University Starkville
Cybersecurity
Computational modeling
Compositionality
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »