Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Weapons
biblio
A comparitative study of machine learning models for the detection of Phishing Websites
Submitted by grigby1 on Fri, 02/03/2023 - 5:23pm
Training
Predictive models
machine learning
pubcrawl
Human behavior
Phishing
Web pages
Uniform resource locators
detection
Weapons
Terrorism
phishing Websites
biblio
When Deep Learning Meets Steganography: Protecting Inference Privacy in the Dark
Submitted by grigby1 on Fri, 02/03/2023 - 4:58pm
deep learning
pubcrawl
Metrics
privacy
data privacy
Cloud Computing
composability
Perturbation methods
edge computing
Image edge detection
Weapons
adversarial attacks
Steganography
steganography detection
inference privacy
biblio
Software Vulnerabilities, Products and Exploits: A Statistical Relational Learning Approach
Submitted by grigby1 on Fri, 07/15/2022 - 12:44pm
integrated circuits
Statistical relational learning
exploits
relational database security
Pipelines
Weapons
knowledge based systems
Metrics
composability
feature extraction
Instruments
security
Software
Resiliency
resilience
Human behavior
pubcrawl
biblio
A Big Data and Deep Learning based Approach for DDoS Detection in Cloud Computing Environment
Submitted by grigby1 on Mon, 06/13/2022 - 3:38pm
Scalability
Flash Crowd
density-based clustering
Web and internet services
DDoS Attack
big data security in the cloud
Weapons
Metrics
Big Data
deep learning
Resiliency
resilience
pubcrawl
machine learning algorithms
machine learning
Cloud Computing
Training
biblio
Recognizing Radicalization Indicators in Text Documents Using Human-in-the-Loop Information Extraction and NLP Techniques
Submitted by grigby1 on Mon, 06/06/2022 - 12:56pm
Training
machine learning
pubcrawl
Scalability
Databases
natural language processing
Weapons
Terrorism
Human Factors
law enforcement
human in the loop
human-in-the-loop
information extraction
biblio
Asymmetric Analysis of Anti-Terrorist Operations and Demand for Light Weapons under the Condition of Informationization
Submitted by grigby1 on Tue, 04/26/2022 - 10:35am
pubcrawl
Weapons
Training
Terrorism
Technological innovation
small arms
Scalability
Resiliency
resilience
Anti-terrorist operations
Informationization
Information age
Image Processing
Human behavior
Deterrence
Cyberspace
Asymmetry
biblio
A Threat of Deepfakes as a Weapon on Digital Platform and their Detection Methods
Submitted by grigby1 on Mon, 04/25/2022 - 4:28pm
Weapons
Recurrent Neural Networks(RNNs)
Generative Adversarial Networks(GANs)
Deepfake Detection Challenge(DFDC)
Deep Neural Networks(DNNs)
Convolutional Neural Networks(CNNs)
Forgery
DeepFake
voting
Media
machine learning algorithms
Metrics
History
Scalability
Resiliency
resilience
Human Factors
pubcrawl
Neural networks
biblio
Effectiveness of Entropy-Based DDoS Prevention for Software Defined Networks
Submitted by grigby1 on Wed, 04/13/2022 - 2:50pm
pubcrawl
Weapons
traffic control
Synchronization
statistical defending approaches
software defined networks (SDN)
security
Resiliency
resilience
real-time systems
pattern locks
Metrics
machine learning to anomaly detection
Human behavior
Entropy
distributed denial-of-service (DDoS) attacks
denial-of-service attack
DDoS Attack Prevention
composability
botnet
biblio
Cyber Warfare Threat Categorization on CPS by Dark Web Terrorist
Submitted by grigby1 on Tue, 04/12/2022 - 12:12pm
Training
machine learning
pubcrawl
Human behavior
Web pages
tagging
Weapons
dark web
Tor
Terrorism
supervised learning
categorization
cyber warfare
Cyber-Physical Systems (CPS)
biblio
Weaponizing Unicodes with Deep Learning -Identifying Homoglyphs with Weakly Labeled Data
Submitted by grigby1 on Tue, 10/12/2021 - 2:47pm
Cybersecurity
homoglyphs
Measurement
Metrics
Plagiarism
Predictive models
predictive security metrics
pubcrawl
security
software development management
unicode
visualization
Weapons
1
2
3
4
next ›
last »