Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
machine learning
biblio
In-Network Data Aggregation for Information-Centric WSNs using Unsupervised Machine Learning Techniques
Submitted by grigby1 on Tue, 05/24/2022 - 3:56pm
Protocols
data aggregation
information-centric networking
spread spectrum communication
Compositionality
Metrics
Information Centric Networks
composability
telecommunication traffic
wireless sensor networks
machine learning
Scalability
Resiliency
resilience
collaboration
Human behavior
pubcrawl
IoT
machine learning algorithms
biblio
Secure Matrix Operations for Machine Learning Classifications Over Encrypted Data in Post Quantum Industrial IoT
Submitted by grigby1 on Fri, 05/20/2022 - 4:33pm
Compositionality
theoretical cryptography
secure matrix operations
secure IoT
privacy preserving algorithms
Post-quantum cryptography
Health
support vector machine classification
Industrial Informatics
classification
deep learning
Cybersecurity
Classification algorithms
composability
quantum computing
Cryptography
privacy
pubcrawl
machine learning
machine learning algorithms
biblio
A Visual Analytics Approach for the Diagnosis of Heterogeneous and Multidimensional Machine Maintenance Data
Submitted by grigby1 on Thu, 05/19/2022 - 1:24pm
Clustering algorithms
maintenance logs
heterogeneous data
text analytics
visual analytics
Learning systems
dimensionality reduction
Data visualization
high-dimensional data
machine learning
Metrics
Data mining
composability
Scalability
Human behavior
pubcrawl
Organizations
biblio
Hardware Trojan Detection Method for Inspecting Integrated Circuits Based on Machine Learning
Submitted by grigby1 on Thu, 05/19/2022 - 1:02pm
Logic gates
feature extraction
machine learning
pubcrawl
resilience
Resiliency
Hardware
composability
Trojan horses
supply chains
detection model
gate-level
hardware Trojan detection
Integrated circuit interconnections
trigger net
trojan horse detection
biblio
An Experimental Analysis on Malware Detection in Executable Files using Machine Learning
Submitted by grigby1 on Thu, 05/19/2022 - 12:59pm
malware
trojan horse detection
trojan horse
Executable Files
Adware
Virus
computer viruses
spyware
Trojan horses
tools
composability
internet
Resiliency
resilience
pubcrawl
Support vector machines
machine learning algorithms
machine learning
biblio
Hardware-Trojan Classification based on the Structure of Trigger Circuits Utilizing Random Forests
Submitted by grigby1 on Thu, 05/19/2022 - 12:59pm
composability
trojan horse detection
netlist
hardware trojan
manufacturing
Hardware Security
Random Forest
Trojan horses
Benchmark testing
Internet of Things
integrated circuits
Hardware
Resiliency
resilience
pubcrawl
machine learning
feature extraction
biblio
A Machine Learning Approach to Detection of Critical Alerts from Imbalanced Multi-Appliance Threat Alert Logs
Submitted by grigby1 on Thu, 05/19/2022 - 12:56pm
Noise measurement
Oversampling
data cleaning
class imbalance
alert screening
alert fatigue
threat vectors
cleaning
automation
Training
Metrics
Big Data
privacy
pubcrawl
Support vector machines
security
machine learning
biblio
Hybrid Evolutionary Approach in Feature Vector for Ransomware Detection
Submitted by grigby1 on Thu, 05/19/2022 - 12:56pm
network security
ransomware detection
threat vectors
Malware Analysis
Ransomware
Feature Selection
Cybersecurity
Metrics
static analysis
Internet of Things
privacy
Radio frequency
pubcrawl
Support vector machines
machine learning algorithms
machine learning
feature extraction
biblio
Machine Learning for Threat Recognition in Critical Cyber-Physical Systems
Submitted by grigby1 on Thu, 05/19/2022 - 12:55pm
cyber-physical systems
Trustworthy Artificial Intelligence
threat assessment
Healthcare
critical infrastructures
threat vectors
Stress
information management
Metrics
risk management
Cybersecurity
Computer crime
privacy
Radio frequency
pubcrawl
machine learning
Support vector machines
biblio
User Behaviour based Insider Threat Detection in Critical Infrastructures
Submitted by grigby1 on Thu, 05/19/2022 - 12:54pm
privacy
User Behavior Analysis
Insider Threat Detection (ITD)
Bi-directional Long Short Term Memory (bi-LSTM)
threat vectors
statistical analysis
support vector machine (SVM)
Metrics
Computer crime
critical infrastructure
pubcrawl
Anomaly Detection
machine learning
cyber security
Support vector machines
Organizations
feature extraction
deep learning
1
2
3
4
5
6
7
8
9
…
next ›
last »