Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Detectors
biblio
A Gradient-Based Pixel-Domain Attack against SVM Detection of Global Image Manipulations
Submitted by grigby1 on Mon, 03/19/2018 - 1:51pm
Nonlinear distortion
image enhancement
image filtering
limited knowledge
LK
median filtering
median filters
Metrics
noise figure 50 dB to 70 dB
Histograms
PSNR
pubcrawl
resilience
Resiliency
Scalability
Support vector machines
SVM detection
adaptive filtering
histogram stretching
high-dimensional SPAM features
gradient-based pixel-domain attack
gradient methods
gradient estimation
gradient descent methodology
global image manipulations
Forensics
forensic techniques
feature extraction
estimation theory
equalisers
Detectors
computational complexity
adaptive histogram equalization
biblio
Sensor Security Index for Control Systems
Submitted by grigby1 on Mon, 03/19/2018 - 1:49pm
multiple sensors
system vulnerability
system destruction
Stuxnet
Steady-state
sensors
sensor security index
sensor bias injection attacks
sensor attacks
Sensor attack
security of data
security
Resiliency
resilience
pubcrawl
north eastern electrical grid black out
actuator security
Metrics
malicious attacks
Linear systems
linear dynamic systems
linear control systems
Indexes
Human behavior
Gold
Detectors
Cyber-physical attack
Control systems attack
composability
anomaly detector
actuators
biblio
Enhancement of Security against Zero Dynamics Attack via Generalized Hold
Submitted by grigby1 on Mon, 03/19/2018 - 1:48pm
Resiliency
J. Back is with the School of Robotics
Korea
Kwangwoon University
Linear systems
Metrics
poles and zeros
pubcrawl
resilience
Human behavior
sampled data systems
sampled-data system
sampling zero dynamics attack
sampling zeros
Seoul
unstable zeros
zero-order-hold
actuator security
generalized hold
Eigenvalues and eigenfunctions
discrete-time zeros
discrete time systems
digital control
Detectors
cyber-physical systems
cyber-physical system
control system security
control engineering computing
continuous-time system
continuous-time physical system
continuous time systems
composability
actuators
biblio
RDS3: Ransomware Defense Strategy by Using Stealthily Spare Space
Submitted by grigby1 on Mon, 03/05/2018 - 1:14pm
Cloud Computing
composability
Detectors
encryption
malware
Metrics
pubcrawl
Ransomware
resilience
Resiliency
biblio
Implementation of a scalable real time canny edge detector on programmable SOC
Submitted by grigby1 on Tue, 01/23/2018 - 3:45pm
Algorithm design and analysis
Canny edge detection
computer vision
Detectors
field programmable gate arrays
FPGA based acceleration
Hardware
Image edge detection
pubcrawl
PYNQ-Z1
real-time systems
Scalability
scalable
Scalable Security
security
Streaming media
biblio
A set-theoretic approach for secure and resilient control of Cyber-Physical Systems subject to false data injection attacks
Submitted by grigby1 on Thu, 12/28/2017 - 1:34pm
Human behavior
telecommunication channels
set-theoretic control framework
set theory
Science of Security
Scalability
resilient control
Resiliency
pubcrawl
Policy-Governed Secure Collaboration
Metrics
internet
Human Factors
actuators
FDI attacks
encryption algorithms
Detectors
cyber-physical systems
cyber false data injection attacks
Cryptography
control remediation strategy
composability
Communication channels
collaboration
anomaly detector module
biblio
Shellcode detector for malicious document hunting
Submitted by grigby1 on Wed, 12/20/2017 - 1:08pm
malicious documents
Web sites
Web site
tools
simple encryption method
shellcode detector
shellcode
pubcrawl
Portable document format
Phishing
open-source tools
object retrieval
network threat
malware
advanced persistent threat attacks
malicious document hunting
malicious document detector
information retrieval
Human Factors
Human behavior
feature extraction
encryption
Electronic mail
document handling
Detectors
Computer crime
APT attack techniques
advanced persistent threats
biblio
Covert Communication in Fading Channels under Channel Uncertainty
Submitted by grigby1 on Tue, 12/12/2017 - 1:28pm
Compositionality
covert channels
Detectors
fading channels
pubcrawl
Radiometry
Receivers
Resiliency
Scalability
uncertainty
Wireless communication
biblio
AnomalyDetect: Anomaly Detection for Preserving Availability of Virtualized Cloud Services
Submitted by grigby1 on Tue, 12/12/2017 - 1:22pm
Kalman filter
virtualized cloud services
Virtual machining
virtual machines
Time series analysis
software fault tolerance
security of data
Scalability
Resiliency
pubcrawl
potential anomalies forecasting
Monitoring
Metrics
Live Migration of Virtual Machines
live migration
Kalman filters
Anomaly Detection
interconnected virtual machines
Intelligent systems
historical data
Detectors
cloud services migration
cloud services
Cloud Security
cloud disruption
Cloud Computing
Autonomic Security
Autonomic Cloud Security
autonomic cloud availability
AutoMigrate framework
AnomalyDetect approach
biblio
Security challenges in smart surveillance systems and the solutions based on emerging nano-devices
Submitted by grigby1 on Mon, 11/20/2017 - 12:20pm
neural nets
targeted objects
surveillance
smart surveillance systems
security of data
security
Resistance
Resiliency
pubcrawl
policy-based governance
Policy
Optimization methods
optimisation
aging
nano-devices
memristors
Learning systems
learning (artificial intelligence)
Government
Governance
Detectors
deep neural networks
collaboration
Artificial Neural Networks
artificial neural network
Anomaly Detection
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
next ›
last »