ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Machine Learning in Cyber Trust
Latest Publications
TOTAL DOCUMENTS
12
(FIVE YEARS 0)
H-INDEX
4
(FIVE YEARS 0)
Published By Springer US
9780387887340, 9780387887357
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
A Non-Intrusive Approach to Enhance Legacy Embedded Control Systems with Cyber Protection Features
Machine Learning in Cyber Trust
◽
10.1007/978-0-387-88735-7_7
◽
2009
◽
pp. 155-181
Author(s):
Shangping Ren
◽
Nianen Chen
◽
Yue Yu
◽
Pierre Poirot
◽
Kevin Kwiat
◽
...
Keyword(s):
Control Systems
◽
Embedded Control
◽
Embedded Control Systems
Download Full-text
Efficient Mining and Detection of Sequential Intrusion Patterns for Network Intrusion Detection Systems
Machine Learning in Cyber Trust
◽
10.1007/978-0-387-88735-7_6
◽
2009
◽
pp. 133-154
◽
Cited By ~ 4
Author(s):
Mei-Ling Shyu
◽
Zifang Huang
◽
Hongli Luo
Keyword(s):
Intrusion Detection
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
Image Encryption and Chaotic Cellular Neural Network
Machine Learning in Cyber Trust
◽
10.1007/978-0-387-88735-7_8
◽
2009
◽
pp. 183-213
◽
Cited By ~ 2
Author(s):
Jun Peng
◽
Du Zhang
Keyword(s):
Neural Network
◽
Image Encryption
◽
Cellular Neural Network
Download Full-text
Survey of Machine Learning Methods for Database Security
Machine Learning in Cyber Trust
◽
10.1007/978-0-387-88735-7_3
◽
2009
◽
pp. 53-71
◽
Cited By ~ 4
Author(s):
Ashish Kamra
◽
Elisa Ber
Keyword(s):
Machine Learning
◽
Database Security
◽
Learning Methods
◽
Machine Learning Methods
Download Full-text
Privacy Preserving Nearest Neighbor Search
Machine Learning in Cyber Trust
◽
10.1007/978-0-387-88735-7_10
◽
2009
◽
pp. 247-276
◽
Cited By ~ 11
Author(s):
Mark Shaneck
◽
Yongdae Kim
◽
Vipin Kumar
Keyword(s):
Nearest Neighbor
◽
Privacy Preserving
◽
Nearest Neighbor Search
◽
Neighbor Search
Download Full-text
Cyber-Physical Systems: A New Frontier
Machine Learning in Cyber Trust
◽
10.1007/978-0-387-88735-7_1
◽
2009
◽
pp. 3-13
◽
Cited By ~ 86
Author(s):
Lui Sha
◽
Sathish Gopalakrishnan
◽
Xue Liu
◽
Qixin Wang
Keyword(s):
Cyber Physical Systems
◽
Physical Systems
◽
New Frontier
Download Full-text
Misleading Learners: Co-opting Your Spam Filter
Machine Learning in Cyber Trust
◽
10.1007/978-0-387-88735-7_2
◽
2009
◽
pp. 17-51
◽
Cited By ~ 33
Author(s):
Blaine Nelson
◽
Marco Barreno
◽
Fuching Jack Chi
◽
Anthony D. Joseph
◽
Benjamin I. P. Rubinstein
◽
...
Keyword(s):
Spam Filter
Download Full-text
On the Performance of Online Learning Methods for Detecting Malicious Executables
Machine Learning in Cyber Trust
◽
10.1007/978-0-387-88735-7_5
◽
2009
◽
pp. 109-132
Author(s):
Marcus A. Maloof
Keyword(s):
Online Learning
◽
Learning Methods
Download Full-text
Identifying Threats Using Graph-based Anomaly Detection
Machine Learning in Cyber Trust
◽
10.1007/978-0-387-88735-7_4
◽
2009
◽
pp. 73-108
◽
Cited By ~ 6
Author(s):
William Eberle
◽
Lawrence Holder
◽
Diane Cook
Keyword(s):
Anomaly Detection
Download Full-text
High-Confidence Compositional Reliability Assessment of SOA-Based Systems Using Machine Learning Techniques
Machine Learning in Cyber Trust
◽
10.1007/978-0-387-88735-7_11
◽
2009
◽
pp. 279-322
◽
Cited By ~ 1
Author(s):
Venkata U. B. Challagulla
◽
Farokh B. Bastani
◽
I-Ling Yen
Keyword(s):
Machine Learning
◽
Reliability Assessment
◽
Machine Learning Techniques
◽
High Confidence
◽
Learning Techniques
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close