Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Detectors
biblio
Lightweight Node-level Malware Detection and Network-level Malware Confinement in IoT Networks
Submitted by aekwall on Mon, 09/21/2020 - 3:46pm
Correlation
confinement
runtime malware detection
real-time malware control strategies
network-level malware confinement
network functionality
Malware propogation
Malware propagation
Malware confinement
lightweight node-level malware detection
average network throughput
predictive control
IoT networks
cyber-physical systems
privacy
computer network security
malware detection
composability
pubcrawl
Resiliency
feature extraction
invasive software
performance evaluation
security
Runtime
malware
Internet of Things
network security
Detectors
biblio
Jointly Optimized Target Detection and Tracking Using Compressive Samples
Submitted by aekwall on Mon, 09/14/2020 - 12:30pm
compressive samples
tracking algorithm
sparse signals
signal reconstruction
Radar tracking
radar target detection
radar detection
joint target detection
joint performance metric
joint detection and tracking
joint decision and estimation
joint CSP Bayesian approach
high-resolution radar signals
CSP-JDT
Detectors
radar resolution
signal sampling
compressive sampling
compressed sensing
object detection
estimation
target tracking
privacy
composability
pubcrawl
Resiliency
cyber-physical systems
Bayes methods
biblio
Combined Compressive Sampling Techniques and Features Detection using Kullback Leibler Distance to Manage Handovers
Submitted by aekwall on Mon, 09/14/2020 - 12:29pm
Akaike information criterion
Small Cells
signal sampling
received signal probability density function
primary signals sparsity
manage handovers
Kullback Leibler Distance
Handovers
Handover technique
features detection
Distribution Analysis Detector
Compressive Sampling Techniques
Compressive Sampling algorithm
compressive sampling
Akaike weights
Akaike Weight
Detectors
Probability density function
compressed sensing
mobility management (mobile radio)
Handover
signal detection
Complexity theory
probability
privacy
Computational modeling
composability
pubcrawl
Resiliency
feature extraction
cyber-physical systems
biblio
An Empirical Study on API-Misuse Bugs in Open-Source C Programs
Submitted by grigby1 on Fri, 08/14/2020 - 11:44am
C language
API misuse
API-misuse bugs
API-misuse detection
API-misuse detectors
APIMU4C
benchmark
bug detection
C code
application programming interfaces
empirical study
fix patterns
Open Source Software
open-source C programs
static analysis detectors
usage statistics
application programming interface
security of data
Detectors
Compositionality
public domain software
security vulnerabilities
Computer bugs
application program interfaces
APIs
program diagnostics
program debugging
static analysis
Libraries
Benchmark testing
Resiliency
resilience
pubcrawl
biblio
An Anomaly Detector for CAN Bus Networks in Autonomous Cars based on Neural Networks
Submitted by aekwall on Mon, 07/20/2020 - 10:44am
critical phase
in-vehicle networks
academic researchers
anomaly detector
anomaly-detection techniques
autonomous cars
CAN bus networks
CAN packets
Controller Area Networks bus
controller area networks
ID field
industrial researchers
MLP Neural Network
MultiLayer Perceptron neural network
real-time detection
robust secure system
securing communication
wireless interfaces
pubcrawl
security of data
Detectors
intrusion detection system
Internet of Things
Protocols
cyber-physical systems
feature extraction
Resiliency
Automotive engineering
Neural networks
Computer hacking
Anomaly Detection
Intrusion Detection
pattern clustering
controller area network security
intrusion detection method
multilayer perceptrons
biblio
Covert Communications in Packet Collision Channels
Submitted by grigby1 on Thu, 07/16/2020 - 12:17pm
sophisticated receiver
pubcrawl
random access MAC
random access system
Receivers
resilience
Resiliency
Scalability
security
slotted ALOHA
physical-layer models
telecommunication channels
telecommunication security
transmitted signal
transmitter Alice
unauthorized users
watchful adversary Willie
Willie's receiver
wireless system security
covert systems
achievable covert rates
channel capacity
channel coding
composability
Compositionality
Conferences
covert channels
covert communications
covert rate
access protocols
decision theory
Detectors
Measurement
medium-access control layer
Monitoring
packet collision channels
Physical layer
physical layer environment
biblio
Detection and Compensation of Covert Service-Degrading Intrusions in Cyber Physical Systems through Intelligent Adaptive Control
Submitted by grigby1 on Thu, 07/16/2020 - 11:44am
networked control systems
feedback
feedback signals
ICs
Anomaly Detection
Identification
insecure networks
intelligent adaptive control
internet
Intrusion Detection
Metrics
Detectors
pubcrawl
resilience
Resiliency
service degradation.
simulations
Steady-state
system behavior
system operation
system/plant identification
covert attacks
classic controller
compensating controller
compensation framework
compensator
composability
computer network security
computer networks
control
control engineering computing
covert
adaptive control
covert service-degrading intrusions
CPS modeling
Cyber Physical System
cyber security
cyber-physical systems
DC motors
deception signal amplification attack
Degradation
detection algorithm
biblio
A deep learning approach to trespassing detection using video surveillance data
Submitted by grigby1 on Fri, 07/03/2020 - 1:15pm
Railroad security
Deep Neural Network
dual-stage ARTS architecture
dual-stage deep learning architecture
early warning prediction techniques
high fidelity trespass classification stage
inexpensive pre-filtering stage
potential trespassing sites
public domain surveillance data
deep convolutional neural networks
railroad trespassing activity
safety risks
Subspace constraints
surveillance
Trespassing detection
video processing
video surveillance data
deep video
convolutional neural nets
computer architecture
machine learning
pubcrawl
Metrics
Resiliency
resilience
learning (artificial intelligence)
deep learning
Scalability
Neural networks
video surveillance
Detectors
activity detection
automated railroad trespassing detection system
background subtraction
CNN-based deep learning architecture
computer vision
biblio
A Game-theoretic Framework for Security-aware Sensor Placement Problem in Networked Control Systems
Submitted by aekwall on Mon, 06/08/2020 - 11:22am
game theoretic security
zero-sum game
undirected tree
undirected topology
system L2 gain
Stackelberg equilibrium
security-aware sensor placement problem
optimal sensor placement strategy
Networked Control System
game-theoretic framework
game leader
detector decision
attacker-detector game
attacker decision
attack signals
Symmetric matrices
security of data
Nash Equilibrium
Cyber-physical attacks
networked control systems
Predictive Metrics
Human Factors
Games
optimisation
trees (mathematics)
sensor placement
pubcrawl
game theory
security
Scalability
Monitoring
Detectors
biblio
Feature Based Image Registration using Heuristic Nearest Neighbour Search
Submitted by grigby1 on Fri, 05/22/2020 - 2:37pm
feature based image matching techniques
threshold accepting
simulated annealing
nearest-neighbor
nearest neighbour search done
image segmentation
image registration
image matching
image feature matching
heuristic Nearest Neighbour Search
Feature Matching
feature based image registration
feature extraction
Exhaustive Search
combinatorial optimization
nearest neighbor search
search problems
Detectors
Task Analysis
nearest neighbour methods
Measurement
Metrics
computer science
pubcrawl
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »