Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Decision trees
biblio
IoT Botnet Malware Classification Using Weka Tool and Scikit-learn Machine Learning
Submitted by grigby1 on Tue, 03/09/2021 - 2:25pm
accurate classification methods
botmaster
botnet
botnet IoT
botnet malware attacks
botnets
classification
composability
computer network security
Decision trees
false positive rate
inconspicuousness characteristics
inexpensive power
internet network security
Internet of Things
Internet of Things network infrastructure
invasive software
IoT botnet malware classification
IoT devices
learning (artificial intelligence)
machine learning
machine learning algorithms
malware
malware attack
Metrics
network traffic
packet traffic
pubcrawl
resilience
Resiliency
scikit-learn
Scikit-learn analysis tools machine learning
Scikit-learn machine learning
telecommunication traffic
Time measurement
tools
WEKA
weka tool
biblio
Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach
Submitted by grigby1 on Tue, 03/09/2021 - 2:24pm
Bayesian optimization
botnet
Botnet detection
botnets
composability
Decision trees
IoT
machine learning
Metrics
Microelectronics
optimization
performance evaluation
pubcrawl
resilience
Resiliency
Robustness
Surges
biblio
Improving Black Box Classification Model Veracity for Electronics Anomaly Detection
Submitted by aekwall on Tue, 03/09/2021 - 12:05pm
Conferences
performance evaluation
Classification algorithms
Data models
nearest neighbour methods
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
composability
Metrics
pattern classification
manufacturing systems
production engineering computing
black box encryption
Decision trees
classification
Veracity
Feature Selection
fault diagnosis
fault detection
KNN
BB-stepwise algorithm
black box
black box classification model veracity
black box model
classification model transparency
data driven classification models
decision tree models
electronics anomaly detection
electronics devices
electronics industry
higher transparency
Industrial electronics
KNN models
KNN-stepwise
manufactured electronics
Stepwise
biblio
Encrypted-Input Program Obfuscation: Simultaneous Security Against White-Box and Black-Box Attacks
Submitted by grigby1 on Thu, 03/04/2021 - 2:33pm
black box encryption
composability
Resiliency
Metrics
black-box attacks
Cloud Computing
cloud programs
cloud services
Computational modeling
Cryptography
data privacy
Decision trees
encrypted-input program obfuscation
encryption
equivalent unobfuscated program
learning (artificial intelligence)
Logic gates
machine learning
machine learning as a service
machine learning programs
program confidentiality
program obfuscation
provable program obfuscation solution
pubcrawl
range membership programs
resilience
security
traditional cryptographic program obfuscation model
white box
White Box Security
white-box attacks
biblio
Behavior-Based Detection of Cryptojacking Malware
Submitted by grigby1 on Wed, 02/10/2021 - 1:10pm
Data mining
cryptocurrencies
pubcrawl
Human behavior
Metrics
resilience
Resiliency
internet
Computer crime
invasive software
Decision trees
Cybercrime
Ransomware
behavior-based detection
behavioral analysis
browser-based cryptojacking
complex detection technique
CPU load
cryptojacking
Cryptojacking detection
cryptojacking malware
cybercriminals
decision tree algorithm
detection program
executable-type cryptojacking
illegitimate profit
malicious mining
virtual machine environment
biblio
Classifier with Deep Deviation Detection in PoE-IoT Devices
Submitted by aekwall on Mon, 01/11/2021 - 1:37pm
computer network security
Monitoring
Scalability
telecommunication traffic
Internet of Things
security
feature extraction
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
Decision Tree
Image edge detection
firmware
Decision trees
Cameras
Switches
IoT
deep packet inspection
dpi
behavior analysis
deep deviation detection
edge intelligence
ML
network traffic characteristics
poe
PoE-IoT classification
PoE-IoT devices
vulnerable IoT devices
biblio
A Malware Detection Method Based on Improved Fireworks Algorithm and Support Vector Machine
Submitted by aekwall on Mon, 12/14/2020 - 12:31pm
invasive software
support vector machine
Support vector machines
learning (artificial intelligence)
Resiliency
pubcrawl
composability
malware detection
particle swarm optimisation
particle swarm optimization
pattern classification
SVM
machine learning methods
genetic algorithms
Decision trees
Predictive Metrics
computer systems
classification performance
differential evolution
Evolutionary algorithms
Fireworks algorithm
improved fireworks algorithm
kernel function parameter
Levy Flights
Malware detection method
optimal parameter combination
penalty factor
signature-based anti-virus systems
biblio
Targeted Addresses Identification for Bitcoin with Network Representation Learning
Submitted by grigby1 on Fri, 09/04/2020 - 3:58pm
addresses identification algorithms
annotated data
bitcoin
bitcoin security
cryptocurrencies
Data mining
de-anonymity approach
Decision trees
drugs
fault tolerance
feature extraction
Human behavior
illegal transactions
imbalanced multi-classification
learning (artificial intelligence)
network representation learning
pattern classification
pubcrawl
Scalability
security of data
security risk
transaction address
transaction addresses
biblio
Identification of State Registers of FSM Through Full Scan by Data Analytics
Submitted by grigby1 on Fri, 08/28/2020 - 3:55pm
logic design
data analysis
Data mining
pubcrawl
Resiliency
industrial property
Scalability
Big Data
Decision trees
Registers
Data protection
finite state machines
resilience
Silicon
regression analysis
electronic engineering computing
Intellectual Property Protection
Big Data Analytics
Decision Tree
downstream design
finite-state machine
FSM design
FSM state registers
OpenCores
Physical design
state register identification
state transitions
big data security metrics
biblio
Hybrid Model for Web Application Vulnerability Assessment Using Decision Tree and Bayesian Belief Network
Submitted by aekwall on Mon, 08/24/2020 - 1:37pm
Bayes methods
Bayesian belief network
Bayesian Belief Network (BBN)
belief networks
business data processing
business process
Classification algorithms
composability
consumer relationship
Decision Tree
Decision trees
Entropy
feature extraction
hybrid model
internet
learning (artificial intelligence)
logical Web pages
machine learning
machine learning algorithms
pubcrawl
Resiliency
security of data
vulnerability assessment
Web application vulnerability assessment
1
2
3
4
5
6
7
next ›
last »