Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Support vector machines
biblio
Modified RNP Privacy Protection Data Mining Method as Big Data Security
Submitted by grigby1 on Tue, 06/14/2022 - 1:11pm
Measurement
RNP
PPDM
privacy metrics
data utility
big data security metrics
Multimedia systems
Interference
Data mining
Support vector machines
Perturbation methods
Big Data
data privacy
Scalability
Resiliency
resilience
pubcrawl
biblio
Evaluating Machine Learning Classifiers for Data Sharing in Internet of Battlefield Things
Submitted by grigby1 on Thu, 06/09/2022 - 2:31pm
Force
dynamics
Human Factors
confidentiality
privacy preservation
iobt
Internet of battlefield things
V2X
Homomorphic encryption
Robot sensing systems
Training
Scalability
Resiliency
resilience
pubcrawl
blockchain
Support vector machines
Forestry
machine learning
biblio
Advanced Intrusion Detection Using Deep Learning-LSTM Network On Cloud Environment
Submitted by aekwall on Thu, 06/09/2022 - 11:06am
Measurement
Support vector machines
privacy
Intrusion Detection
deep learning
Cloud Computing
machine learning algorithms
Resiliency
composability
pubcrawl
IDS
Cloud Intrusion Detection System (CIDS)
Deep learning-LSTM
IDS model
SCAE+SVM IDS
biblio
Security Analysis of Private Intellectual Property
Submitted by grigby1 on Wed, 06/08/2022 - 10:18am
intellectual property
private intellectual
Intellectual Property Rights (IPR)
infringer
intellectual property security
Economics
patents
Intellectual Property Protection
Data processing
Support vector machines
real-time systems
composability
internet
Resiliency
resilience
policy-based governance
pubcrawl
biblio
Image Forensics using Optimal Normalization in Challenging Environment
Submitted by grigby1 on Mon, 06/06/2022 - 12:13pm
tools
feature extraction
Support vector machines
pubcrawl
Human behavior
resilience
Scalability
Metrics
Image coding
Transform coding
digital images
Image forensics
Resiliency
Co-occurrence
image filtering
Image operations
biblio
An Experimental Analysis on Malware Detection in Executable Files using Machine Learning
Submitted by grigby1 on Thu, 05/19/2022 - 12:59pm
malware
trojan horse detection
trojan horse
Executable Files
Adware
Virus
computer viruses
spyware
Trojan horses
tools
composability
internet
Resiliency
resilience
pubcrawl
Support vector machines
machine learning algorithms
machine learning
biblio
Intrusion Representation and Classification using Learning Algorithm
Submitted by grigby1 on Thu, 05/19/2022 - 12:56pm
Training
security
Support vector machines
Intrusion Detection
pubcrawl
privacy
Classification algorithms
Metrics
Cybersecurity
testing
genetic algorithms
threat vectors
intrusion
decomposition
discriminatory
Fitness value
biblio
A Machine Learning Approach to Detection of Critical Alerts from Imbalanced Multi-Appliance Threat Alert Logs
Submitted by grigby1 on Thu, 05/19/2022 - 12:56pm
Noise measurement
Oversampling
data cleaning
class imbalance
alert screening
alert fatigue
threat vectors
cleaning
automation
Training
Metrics
Big Data
privacy
pubcrawl
Support vector machines
security
machine learning
biblio
Hybrid Evolutionary Approach in Feature Vector for Ransomware Detection
Submitted by grigby1 on Thu, 05/19/2022 - 12:56pm
network security
ransomware detection
threat vectors
Malware Analysis
Ransomware
Feature Selection
Cybersecurity
Metrics
static analysis
Internet of Things
privacy
Radio frequency
pubcrawl
Support vector machines
machine learning algorithms
machine learning
feature extraction
biblio
Identification of Cyber Threats and Parsing of Data
Submitted by grigby1 on Thu, 05/19/2022 - 12:55pm
Organizations
Support vector machines
pubcrawl
Radio frequency
Correlation
privacy
Benchmark testing
Metrics
Market research
Technological innovation
threat vectors
1
2
3
4
5
6
7
8
9
…
next ›
last »