Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Detectors
biblio
Semi-supervised novelty detection with one class SVM for SMS spam detection
Submitted by grigby1 on Fri, 02/17/2023 - 4:37pm
smishing
Scalability
Benchmark testing
Detectors
semi-supervised learning
SMS
Image Processing
novelty detection model
One Class Support Vector Machine
Filtering
spam detection
Training
machine learning
Support vector machines
pubcrawl
Human behavior
Metrics
biblio
Control flow integrity check based on LBR register in power 5G environment
Submitted by aekwall on Fri, 02/17/2023 - 9:41am
Detectors
LBR register
Control-flow protection
CFI
rop attacks
Costs
codes
process control
static analysis
Human Factors
Safety
composability
Resiliency
Scalability
pubcrawl
real-time systems
Internet of Things
biblio
VulCNN: An Image-inspired Scalable Vulnerability Detection System
Submitted by grigby1 on Mon, 02/13/2023 - 2:03pm
deep learning
CNN
pubcrawl
Scalability
Semantics
Detectors
image
Transforms
Scalable Security
codes
vulnerability detection
large scale
Rats
biblio
An FLL-Based Clock Glitch Detector for Security Circuits in a 5nm FINFET Process
Submitted by grigby1 on Fri, 02/03/2023 - 4:09pm
pubcrawl
Human behavior
resilience
Resiliency
Scalability
Detectors
Voltage measurement
timing
Hardware Security
Frequency locked loops
Very large scale integration
Phase measurement
pattern locks
Clock glitch
FinFETs
FLL
biblio
An Edge Detection Based Reversible Data Hiding Scheme
Submitted by grigby1 on Fri, 02/03/2023 - 4:03pm
Information hiding
steganography detection
Steganography
SSIM
reversible steganography
pubcrawl
privacy
Metrics
LSB method
edge detection
Image quality
Image edge detection
Image coding
IEEE Sections
Detectors
Conferences
composability
security
biblio
Cryptography using Affine Hill Cipher Combining with Hybrid Edge Detection (Canny-LoG) and LSB for Data Hiding
Submitted by grigby1 on Fri, 02/03/2023 - 3:58pm
Image edge detection
steganography detection
Steganography
Receivers
pubcrawl
PSNR
privacy
Metrics
LSB
edge detection
Embbedding
Detectors
Cry[ptography
Conferences
composability
Ciphers
security
biblio
Predicting Confidentiality, Integrity, and Availability from SQL Injection Payload
Submitted by grigby1 on Fri, 02/03/2023 - 2:49pm
confidentiality
SQL injection detection
security information and event management
SIEM
Availability
support vector machine
SQL injection
Firewalls (computing)
integrity
Detectors
Training data
Adaptation models
privacy
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
Support vector machines
deep learning
biblio
Malicious attack detection based on traffic-flow information fusion
Submitted by aekwall on Thu, 01/05/2023 - 4:10pm
Attack detection
composability
Detectors
feature extraction
information fusion
machine learning algorithms
Metrics
Observers
performance evaluation
pubcrawl
Resiliency
Roads
smart transportation
sybil attacks
Traffic flow characterization
vehicular networks
biblio
Failure Detectors for 6LoWPAN: Model and Implementation
Submitted by grigby1 on Tue, 12/06/2022 - 1:49pm
Detectors
Wireless communication
Reliability
Memory management
LLN
IoT
Internet of Things
IEEE 802.15 Standard
failure detector
6LoWPAN
computer network reliability
Computational modeling
agreement
pubcrawl
composability
resilience
Resiliency
biblio
EVAX: Towards a Practical, Pro-active & Adaptive Architecture for High Performance & Security
Submitted by grigby1 on Thu, 12/01/2022 - 1:21pm
Detectors
Zero Day Attack Defense
Side Channel
ML Interpretability
Microarchitectural Attack Detection
Linearized Neural Network
Automatic Attack Sample Generation
Automated Hardware Performance Counter Engineering
Adversarial Machine Learning Attacks
codes
Zero day attacks
generative adversarial networks
Training
defense
Switches
side-channel attacks
microarchitecture
composability
Hardware Security
Hardware
Resiliency
resilience
Metrics
pubcrawl
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »