Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
standards
biblio
A Control Flow Anomaly Detection Algorithm for Industrial Control Systems
Submitted by grigby1 on Thu, 05/09/2019 - 10:46am
Industrial Control Systems
tabbed-assert control flow analysis method
standards
standard path set acquisition
security of data
security
scalable
Scalability
Resiliency
resilience
pubcrawl
pattern matching
path matching
intrusion attack method
Anomaly Detection
industrial control
encoding
control systems
control flow path
control flow anomaly detection algorithm
control flow analysis method
control flow
computer network security
business programs
Business
basic group partition method
anomaly detection ability analysis
biblio
A Layer-Built Method to the Relevancy of Electronic Evidence
Submitted by aekwall on Wed, 05/08/2019 - 9:42am
Human behavior
standards
Scalability
resilience
relevancy of evidenc
pubcrawl
Metrics
layer-built method
law enforcement
judicial practice
information forensics
analytical process
Forensics
feature extraction
electronic evidence
discretionary evidence
Digital Forensics
cyber crimes
criminal investigation
Correlation
Computer crime
biblio
Wiping Techniques and Anti-Forensics Methods
Submitted by aekwall on Wed, 05/08/2019 - 9:42am
metadata
Writing
wiping techniques
wiping standards
tools
standards
software products developement
secure file destruction
Scalability
resilience
pubcrawl
product development
Metrics
anti-forensics methods
meta data
local storage devices
information forensics
Human behavior
forensic analysis
File systems
erasure standards
eraser software
Digital Forensics
data wiping
Cryptography
biblio
Performance Analysis of Pairing-Based Elliptic Curve Cryptography on Constrained Devices
Submitted by aekwall on Wed, 05/01/2019 - 12:38pm
identity-based encryption schemes
Telecommunications
standards
smart meters
smart cards
Scalability
Resiliency
public key cryptography
pubcrawl
performance evaluation
pairing-based elliptic curve cryptography
Metrics
Bilinear Pairing
group signatures
embedded devices
Elliptic curves
Elliptic curve cryptography
digital signatures
Cryptography
Cryptographic Protocols
cryptographic libraries
Constrained Devices
bilinear pairing operation
biblio
In Search of CurveSwap: Measuring Elliptic Curve Implementations in the Wild
Submitted by aekwall on Wed, 05/01/2019 - 12:37pm
Libraries
twist attacks
transport protocols
transport layer protocol
TLS handshake
standards
SSH hosts
Servers
server vulnerability
Scalability
Resiliency
pubcrawl
Protocols
Metrics
Cryptographic Protocols
IPsec
invalid curve attacks
internet-wide scans
internet scanning
internet
HTTPS hosts
Elliptic curves
elliptic curve parameter downgrade attack
Elliptic curve cryptography
CurveSwap attack
curve validity checks
curve twist attacks
biblio
A Cross Correlation Approach for Breaking of Text CAPTCHA
Submitted by aekwall on Mon, 04/01/2019 - 10:07am
challenge-response test
text CAPTCHA
Segmentation
Optical character recognition software
online web service providers
OCR
Noise measurement
image denoising
image classification
distorted text
cross correlation approach
character recognition
security of data
captcha images
CAPTCHA
image segmentation
captchas
Correlation
web services
standards
composability
pubcrawl
Human behavior
biblio
Cloud Computing Security and Privacy
Submitted by grigby1 on Wed, 03/06/2019 - 4:26pm
Cloud Computing
privacy
security
standards
pubcrawl
Data Security
big data privacy
biblio
The Identification of Supplier Selection Criteria Within a Risk Management Framework Towards Consistent Supplier Selection
Submitted by aekwall on Mon, 02/25/2019 - 11:43am
pattern matching
Supply Chain Risk Assesment
triangulation model
train manufacturer
supplier selection criteria
supplier risk assessment.
structured supplier risk assessment
Stability criteria
South Africa
source information
risk management framework
pubcrawl
organisational aspects
Interviews
document analysis
Bibliographies
supply chains
supply chain management
risk management
standards
Metrics
biblio
A Self-organized Shape Formation Method for Swarm Controlling
Submitted by aekwall on Thu, 02/21/2019 - 1:02pm
multi-robot systems
swarm robots
Swarm Intelligence
swarm controlling
standards
simulation
shape formation
shape control
Shape
self-organized shape formation method
Robustness
repulsive force field
pubcrawl
artificial method
mobile robots
line shapes
Force
distributed calculation
distance image
convergence
composability
complex behaviors
collision avoidance
attraction field
artificial potential fields
biblio
Fooling End-To-End Speaker Verification With Adversarial Examples
Submitted by aekwall on Wed, 01/16/2019 - 2:10pm
adversarial examples
White Box Security
YOHO
original speaker examples
NTIMIT
MFCC
Mel frequency cepstral coefficient
fooling end-to-end speaker verification
end-to-end deep neural models
deep end-to-end network
black-box attacks
automatic speaker verification systems
Automatic speaker verification
security of data
Perturbation methods
Neural networks
neural nets
Task Analysis
Training
speaker recognition
composability
Metrics
pubcrawl
resilience
standards
« first
‹ previous
…
18
19
20
21
22
23
24
25
26
…
next ›
last »