Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Unsupervised Learning
biblio
Practical and White-Box Anomaly Detection through Unsupervised and Active Learning
Submitted by grigby1 on Thu, 03/04/2021 - 2:35pm
White Box Security
white box
security
active learning
Anomaly Detection
composability
Forestry
iRRCF
key performance indicators
KPI anomaly detection framework
Labeling
Metrics
Monitoring
Neural networks
pubcrawl
random forests
resilience
Resiliency
robust random cut forest
RRCF
RRCF algorithm
security of data
supervised learning
time series
Time series analysis
Unsupervised Anomaly Detection
Unsupervised Learning
user experience
white-box anomaly detection
biblio
Unsupervised Discovery Of Semantically Aware Communities With Tensor Kruskal Decomposition: A Case Study In Twitter
Submitted by aekwall on Mon, 02/15/2021 - 4:47pm
pubcrawl
graph theory
social networking (online)
Twitter
Metrics
social network
network theory (graphs)
cyber physical systems
Unsupervised Learning
Semantics
Compositionality
Periodic structures
singular value decomposition
SVD
tensors
Tucker decomposition
decomposition
analytical methodologies
Blogs
clustered graph spectrum
Community discovery
community structure discovery
compact community size distribution
digital marketing
Facebook groups
fact checking
followfollower relationships
functional coherency
functional Twitter elements
hashtag semantics
heavy degree distribution tail
high clustering coefficient values
higher order analytics
higher order counterpart
Julia
Kruskal decomposition
low diameter
news aggregators
Political Campaigns
politics
rank one tensors
recursive community structure
semantic weight
semantically aware communities
Structural coherency
structural Twitter elements
substantial empirical evidence
synthetic graph generation models
tensor algebra
tensor kruskal decomposition
tensor representation
Tucker tensor decomposition
Twitter subgraph
unofficial form
unsupervised discovery
biblio
Pattern Extraction for Behaviours of Multi-Stage Threats via Unsupervised Learning
Submitted by grigby1 on Fri, 01/22/2021 - 1:39pm
security of data
feature extraction
Anomaly Detection
data analysis
Unsupervised Learning
IP networks
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Correlation
Scalability
Cybersecurity
Training data
advanced persistent threat
APT
Clustering algorithms
pattern clustering
advanced persistent threats
Behaviour Analysis
Cyber Threats Intelligence
heterogeneous log-files
Log-files Analysis
malicious behaviour
Multi-stage threats
multistage threats
pattern extraction
biblio
Adversarial Perturbations Fool Deepfake Detectors
Submitted by grigby1 on Fri, 01/15/2021 - 12:02pm
Training
Unsupervised Learning
convolutional neural nets
Neural networks
pubcrawl
Human behavior
Human Factors
Metrics
Resiliency
Scalability
Perturbation methods
Electronics packaging
resilience
gradient methods
adversarial perturbations
feature extraction
Detectors
generative adversarial networks
image enhancement
DeepFake
faces
Deep Image Prior
deepfake detectors
deepfake image enhancement
Deepfakes
fast gradient sign method
generative convolutional neural networks
image restoration
Lipschitz regularization
biblio
Network Anomaly Detection Based on Deep Support Vector Data Description
Submitted by aekwall on Mon, 12/14/2020 - 12:30pm
security of data
intrusion detection system
Data models
Support vector machines
feature extraction
Resiliency
pubcrawl
composability
Neural networks
Big Data
Training
convolutional neural nets
convolutional neural network
telecommunication traffic
Anomaly Detection
Deep Neural Network
Unsupervised Learning
Predictive Metrics
representation learning
deep support vector data description
Deep-SVDD
KDD CUP99 dataset
malicious traffic detection system
network anomaly detection
network traffic anomaly detection
normal traffic features
support data vector description
biblio
Graph Embedding Based Familial Analysis of Android Malware using Unsupervised Learning
Submitted by grigby1 on Fri, 12/11/2020 - 2:32pm
analytical workload
Android malware
application program interfaces
detection algorithms
Face
familial analysis
feature extraction
GefDroid
graph embedding
graph embedding techniques
graph theory
Human behavior
invasive software
learning (artificial intelligence)
malware
Malware Analysis
malware link network
Metrics
pattern classification
pattern clustering
privacy
pubcrawl
resilience
Resiliency
security
Semantics
similarity relationships
smart phones
SRA
supervised learning
Unsupervised Learning
biblio
A Security System Using Deep Learning Approach for Internet of Vehicles (IoV)
Submitted by grigby1 on Mon, 11/02/2020 - 12:09pm
connected vehicles
connected vehicles communication
critical V2X infrastructures deployment
deep learning
deep learning approach
deep learning methodology
Human Factors
Internet of Things
Internet of Vehicles
IoT
IoV security system
learning (artificial intelligence)
Metrics
mobile computing
neural nets
pubcrawl
reliable communication services
reliable services
resilience
Resiliency
secure applications
security of data
security threats
smart cities
Smart Environments
smart offices
Smart Spectrum Utilization
spectrum utilization
supervised learning
Unsupervised Learning
biblio
Industrial Control Intrusion Detection Model Based on S7 Protocol
Submitted by grigby1 on Fri, 10/16/2020 - 11:32am
abnormal behavior detection
abnormal S7 protocol packet detection
Anomaly Detection
communication process
Companies
composite intrusion detection method
computer network security
deep analysis algorithm
Heuristic algorithms
ICs
industrial control
industrial control intrusion detection model
industrial control network security
industrial control system
Industrial Control Systems
internet
internet technology
Intrusion Detection
national Industrial 4.0 strategy
networked control systems
power systems
private industrial control protocols
production engineering computing
protocol analysis
protocol parsing technology
Protocols
pubcrawl
resilience
Resiliency
S7 data packet analysis
S7 protocol
Scalability
Siemens Company
static white list configuration complexity
static white list configuration portability
tradtonal protocol parsing technology
Unsupervised Learning
white list detection
white list self-learning
white list self-learning algorithm
biblio
Framework for Data Driven Health Monitoring of Cyber-Physical Systems
Submitted by grigby1 on Tue, 10/06/2020 - 2:11pm
Anomaly Detection
building management systems
condition monitoring
continuous monitoring
CPS operational health
CPS resilience
CPS testbed
cyber physical systems
cyber-network
cyber-physical systems
data acquisition
data driven health monitoring
data driven methodology
data driven techniques
data features
Data mining
Degradation
distributed power generation
explainable AI
feature extraction
feature extraction method
health monitoring
heterogeneous data streams
interconnected computational resources
Monitoring
Neurons
physical resources
power engineering computing
pubcrawl
real-time systems
resilience
Resiliency
Self-organizing feature maps
state estimation
state identification
time state estimation
Unsupervised Learning
visualization technique
biblio
Denial of Service Detection Mitigation Scheme using Responsive Autonomic Virtual Networks (RAvN)
Submitted by aekwall on Mon, 08/24/2020 - 12:47pm
security of data
computer network security
Monitoring
IP networks
telecommunication traffic
virtualisation
software defined networking
feature extraction
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
composability
Decision Making
network traffic
gaussian distribution
pattern clustering
Software-Defined Networks
Unsupervised Learning
adaptive systems
network configurations
adaptive policy updates
adaptive reconfigurable features
anomalous mitigation solutions
anomaly detection schemes
Centroid-based-based clustering technique
data features
decision making skills
high rate denial of service attacks
high rate DoS attacks
intragroup variance
Kmeans
low rate detection
mitigation scheme
multivariate clustering method
multivariate gaussian distribution model
network performance statistics
ONOS SDN controller
open networking operating system
RAvN
responsive autonomic data-driven adaptive virtual networking framework
traffic monitoring tools
unsupervised machine learning technique
Autonomic Security
1
2
3
4
next ›
last »