Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Analytical models
biblio
Quickest Detection of Advanced Persistent Threats: A Semi-Markov Game Approach
Submitted by grigby1 on Fri, 01/22/2021 - 12:38pm
cyberattack
two-time scale Q-learning algorithm
Stackelberg zero-sum semi-Markov games
Stackelberg semiMarkov game
refinable attack investigation framework
real-word attack dataset
Rain
multistage attacks
Limiting average reward criteria
DIFT-based defender
Dynamic Information Flow Tracking
advanced persistent threats
q-learning
Markov processes
game theory
security of data
threat detection
APT
advanced persistent threat
Cyber Attacks
Games
Security analysis
Computational modeling
Scalability
Analytical models
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Automated Analysis of PUF-based Protocols
Submitted by grigby1 on Wed, 01/20/2021 - 3:21pm
integrated circuit
Tamarin prover
security protocols
Security Properties
Resiliency
resilience
pufs
PUF-based protocols
PUF API
pubcrawl
Protocols
physical unclonable functions
mutual authentication protocol
integrated circuits
Analytical models
hardware-based security
Hardware
formal methods and verification
fingerprint identification
error correction data
Data models
Cryptography
Cryptographic Protocols
Compositionality
application programming interface
APIs
API
biblio
Behavior Modeling and Individual Recognition of Sonar Transmitter for Secure Communication in UASNs
Submitted by grigby1 on Wed, 01/20/2021 - 3:08pm
sonar transmitter
radio transmitters
received signal
resilience
Resiliency
secure communication
Sonar
Sonar equipment
sonar signal processing
radio frequency fingerprint
specific emitter identification
specific emitter recognition
UASN
underwater acoustic communication
underwater acoustic sensor networks
Underwater vehicles
wireless sensor networks
Acoustic Fingerprints
pubcrawl
power spectrum features
power amplifier
nonlinear model
memory polynomial model
low-frequency radiation source
individual recognition
Human behavior
fingerprint features
feature extraction
Computational modeling
composability
Class D power amplifier
behavior modeling
Analytical models
biblio
Secure Federated Averaging Algorithm with Differential Privacy
Submitted by aekwall on Mon, 01/11/2021 - 12:42pm
convergence analysis
gradient methods
distributed machine learning
Gaussian noise
federated learning
message exchange
stochastic gradient descent
algorithm communication efficiency
client sensitive information
Stochastic processes
differential attacks
federating averaging algorithm
local model parameters
message obfuscation
Model averaging
secure FedAvg algorithm
secure federated averaging algorithm
composability
Scalability
Servers
data privacy
Data models
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
security of data
privacy
convergence
convergence rate
Prediction algorithms
Analytical models
client-server systems
differential privacy
biblio
Physical Layer Security in Vehicular Networks with Reconfigurable Intelligent Surfaces
Submitted by grigby1 on Mon, 12/28/2020 - 12:01pm
smart radio environments
RIS cells
RIS technologies
RIS-based access point
RIS-based relay
RIS-based transmission
RIS-relay
secrecy capacity
security
Signal to noise ratio
Resiliency
source power
telecommunication network reliability
telecommunication security
vehicle-to-vehicle communication
vehicular ad hoc networks
vehicular adhoc network
vehicular communications
vehicular network system models
wireless channels
incident signal
adjustable phase shift
Analytical models
average secrecy capacity
Buildings
Compositionality
dedicated energy source
Double-Rayleigh fading channels
fading channels
important paradigm
ad hoc network
Metrics
Monte Carlo methods
passive elements
physical layer security
pubcrawl
reconfigurable intelligent surface
reconfigurable intelligent surfaces
Relays
resilience
biblio
ROSploit: Cybersecurity Tool for ROS
Submitted by grigby1 on Thu, 12/17/2020 - 12:37pm
ROS
resilience
Resiliency
robot operating systems
robot programming
robotic operating system security research
robotic systems
robotics
robots
Reconnaissance
ROS systems
ROSploit
security
security of data
security vulnerabilities
threat model
tools
Analytical models
public domain software
pubcrawl
preliminary state
policy-based governance
operating systems (computers)
operating systems
offensive tool
modular two-pronged offensive tool
Human Factors
Human behavior
foundational knowledge
cybersecurity tool
Cybersecurity
control engineering computing
Biological system modeling
biblio
Particle Swarm Optimization Algorithm with Variety Inertia Weights to Solve Unequal Area Facility Layout Problem
Submitted by aekwall on Mon, 12/14/2020 - 11:38am
Compositionality
workshop area utilization
unequal area facility layout problem
UA-FLPP
NP-hard problem
nonlinear inertia weight
Inertia Weight
facilities layout
dynamic inertia weight
PSO algorithm
Swarm intelligence algorithm
Layout
Conferences
computational complexity
Analytical models
Production
particle swarm optimization algorithm
particle swarm optimization
Swarm Intelligence
particle swarm optimisation
convergence
simulation
composability
pubcrawl
biblio
Multimodal Graph Analysis of Cyber Attacks
Submitted by grigby1 on Fri, 12/11/2020 - 1:34pm
pubcrawl
Metrics
multimodal graph
multimodal graph analysis
multimodal graph approach
multimodal graph nodes
nodes classification
observed cyber events
privacy
Malware Analysis
resilience
Resiliency
security of data
single-modality graphs
strong inter-modal ties
targeted nodes
unclassified regime
cyber-attacks
attack stages
attacker
autonomous systems
Centrality
centrality analysis
community analysis
Computational modeling
Cyber Attacks
Analytical models
cyberattack
cyberattack victims
Data mining
graph theory
Human behavior
IP networks
malware
biblio
Deep Android Malware Classification with API-Based Feature Graph
Submitted by grigby1 on Fri, 12/11/2020 - 1:33pm
invasive software
structure analysis
Silicon
security
Resiliency
resilience
pubcrawl
privacy
mobile computing
Metrics
Mathematical model
malware class
malware apps
Malware Analysis
malware
Analytical models
Human behavior
hand-refined API-based feature graph
graph theory
Feature Selection
feature extraction
deep learning
CNN-based classifier
application program interfaces
API-based feature graph classification
API features
Android malware classification
Android malware apps
Android malware
Android (operating system)
biblio
A Symbolic Analysis of ECC-Based Direct Anonymous Attestation
Submitted by aekwall on Mon, 12/07/2020 - 11:25am
symbol manipulation
Predictive Metrics
privacy
pubcrawl
public key cryptography
Resiliency
Scalability
secrecy
secrecy properties
neural style transfer
symbolic analysis
symbolic verification
Tamarin modelling
Tamarin prover
tpm
Trusted Computing
trusted platform module TPM-backed anonymous credentials
trusted platform modules
ECC-based version
authentication
composability
Cryptographic Protocols
cryptographic scheme
cyber-physical system security
digital signatures
direct anonymous attestation
ECC-based direct anonymous attestation
Analytical models
ECC-DAA
expected authentication
formal analysis
formal verification
IEC standards
ISO standards
mechanised analysis
« first
‹ previous
…
22
23
24
25
26
27
28
29
30
…
next ›
last »