Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Vegetation
biblio
Efficient Acceleration of Decision Tree Algorithms for Encrypted Network Traffic Analysis
Submitted by grigby1 on Tue, 03/01/2022 - 4:19pm
Pipelines
Wires
Vegetation
threat
telecommunication traffic
Table lookup
Scalability
Resiliency
resilience
pubcrawl
Acceleration
network on chip security
Network
Metrics
detection
Decision trees
Decision Tree
Cryptography
composability
biblio
Analysis of Algorithms for User Authentication using Keystroke Dynamics
Submitted by grigby1 on Tue, 08/17/2021 - 4:17pm
authentication
Forestry
Heuristic algorithms
Human behavior
keystroke analysis
keystroke dynamics
machine learning
Metrics
password
pubcrawl
tuning
User Authentication and XGBoost
Vegetation
biblio
Intrusion Detection System for the MIL-STD-1553 Communication Bus
Submitted by aekwall on Wed, 08/11/2021 - 2:29pm
timing
Intrusion Detection
authentication
Anomaly Detection
machine learning
machine learning algorithms
Vegetation
pubcrawl
Resiliency
composability
intrusion tolerance
communication bus security
markov chain
MIL-STD-1553
Military standards
biblio
Practical Security for Cooperative Ad Hoc Systems
Submitted by aekwall on Wed, 07/07/2021 - 4:47pm
Human Factors
Routing
Ad hoc networks
cooperative communication
cooperative systems
encryption
homomorphic hashing
network security
pervasive computing
resilience
Vegetation
Ubiquitous Computing Security
pubcrawl
Scalability
Metrics
Resiliency
biblio
Traceable Ciphertext Policy Attribute-based Encryption Scheme with User Revocation for Cloud Storage
Submitted by aekwall on Mon, 03/22/2021 - 1:07pm
fine-grained access control
user identity tracking
traceable ciphertext policy attribute-based encryption scheme
single user revocation
identity directory technology
forward security
ciphertext re-encryption technology
association revocation
associated user revocation
CP-ABE
user revocation
CP-ABE scheme
encryption audits
Traceability
Cloud Computing
Compositionality
Predictive Metrics
storage management
Vegetation
pubcrawl
Resiliency
private key cryptography
data privacy
cloud storage
encryption
authorisation
Access Control
Servers
biblio
Detection of XSS in web applications using Machine Learning Classifiers
Submitted by grigby1 on Wed, 02/10/2021 - 1:21pm
Web pages
Cross Site Scripting
random forests
cross-site scripting attack
classifiers
Classified Algorithms
cross-site scripting
Vegetation
Uniform resource locators
feature extraction
JavaScript
malware
Scalability
Resiliency
resilience
Human behavior
pubcrawl
machine learning
biblio
A Novel Jamming Attacks Detection Approach Based on Machine Learning for Wireless Communication
Submitted by aekwall on Mon, 12/14/2020 - 12:32pm
channel surfing
5G
time series
Transmitters
Wireless communication
random forests
Jamming
wireless network
Forestry
random forest algorithm
wireless channels
detection probability
false alarm probability
jamming attacks
jamming attacks detection
jamming signal detection
millimeter wave bands
Random Fores
smart jammers
pubcrawl
telecommunication security
game theory
machine learning algorithms
Support vector machines
support vector machine
learning (artificial intelligence)
machine learning
Resiliency
Receivers
composability
Vegetation
neural network
Fuzzy logic
probability
telecommunication computing
signal detection
Predictive Metrics
biblio
Comparing Explanations between Random Forests and Artificial Neural Networks
Submitted by grigby1 on Tue, 12/01/2020 - 2:02pm
learning algorithm
Vegetation
transparent structure
random forests
Radio frequency
pubcrawl
predictive performance
predictive accuracy
Prediction algorithms
neural nets
Artificial Intelligence
human trust
Human behavior
heuristic explanation method
Forestry
decision making processes
Decision Making
black boxes
Artificial Neural Networks
biblio
Isolation Forest based Detection for False Data Attacks in Power Systems
Submitted by grigby1 on Wed, 10/14/2020 - 12:40pm
Vegetation
real-time data
outlier detection
isolation forest based detection algorithm
isolation forest
integrated communication networks
IF based detection method
entire power grid
bad data detection
false data attack
False Data Detection
Transmission line measurements
cyber physical systems
network information
cyberattack
Forestry
fault diagnosis
false data injection attacks
Smart Grids
power systems
IEEE 118-bus system
state estimation
Cyber Attacks
real-time systems
composability
power system security
Resiliency
resilience
Human behavior
pubcrawl
biblio
K-nearest Neighbor Search by Random Projection Forests
Submitted by grigby1 on Fri, 05/22/2020 - 2:38pm
Clustering algorithms
Vegetation
tree-based methodology
rpForests
random projection forests
multicore computers
kNN search
kNN distances
exponential decay
ensemble size
ensemble random projection trees
ensemble methods
Ensemble
clustered computers
nearest neighbor search
k-nearest neighbor search
learning (artificial intelligence)
search problems
computational complexity
k-nearest neighbors
nearest neighbour methods
Measurement
Metrics
Big Data
random forests
pubcrawl
Unsupervised Learning
Forestry
Data mining
machine learning algorithms
machine learning
1
2
3
next ›
last »