Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Filtering
biblio
Extracting Side-Channel Leakage from Round Unrolled Implementations of Lightweight Ciphers
Submitted by aekwall on Mon, 01/20/2020 - 11:59am
side channel analysis attacks
narrow bandpass filtering
optimal leakage models
parallel round-based datapath
PRINCE
pubcrawl
Resiliency
resource constraints
round unrolled implementations
round unrolling
Scalability
side channel analysis
multiband narrow bandpass filtering techniques
side channel signatures
side-channel leakage
signal isolation
Signal to noise ratio
signal-to-noise ratio
SIMON
SIMON datapaths
size 45.0 nm
SNR
time domain correlation power analysis
Energy Efficiency
AES
AES algorithm
Band-pass filters
Ciphers
combinational logics
Correlation
correlation frequency analysis
Cryptography
edge nodes
encryption
advanced encryption standard
field programmable gate arrays
Filtering
first-order side-channel leakages
FPGA
fully-unrolled datapath
Hardware
improved CFA attack
leakage models
Lightweight Ciphers
lightweight cryptographic algorithms
biblio
Detection of Phishing Attacks
Submitted by grigby1 on Tue, 11/26/2019 - 3:48pm
Phishing
information security
Intrusion Detection
Intrusion Detection Systems
login credentials
mail contents
malicious links
money loss
official person
identity theft
phishing attacks
phishing emails
Postal services
pubcrawl
spam mails
spam words
Uniform resource locators
unsolicited e-mail
detection problem
attachments
attacker
Bayes methods
Bayesian algorithm
Classification algorithms
communication mediums
Computer crime
cyber attack
Anti Phishing Simulator
digital simulation
e-mail
e-mails harm victims
Electronic mail
Filtering
Human behavior
human factor
biblio
IPsec/Firewall Security Policy Analysis: A Survey
Submitted by aekwall on Tue, 10/22/2019 - 9:53am
internetworking
Security Policies Analysis
traffic control
security policy verification
security policy misconfigurations
security policy management
Security policy anomalies
policy analysis
network security protection
network safety
IPsec security policy analysis
IPsec gateways
formal verification
Firewall Security policy analysis
firewall
Conflicts analysis
computer network security
Virtual private networks
security policy
Firewalls (computing)
Logic gates
IPsec
network security
computer networks
Communication networks
Correlation
Filtering
policy-based governance
pubcrawl
authorisation
IP networks
biblio
Evaluation of Detection Method to Mitigate DoS Attacks in MANETs
Submitted by aekwall on Mon, 06/10/2019 - 10:15am
Ad hoc networks
composability
DoS
Filtering
Firewalls (computing)
MANET Attack Detection
MANETs
Metrics
mobile computing
Monitoring
MrDR
pubcrawl
Resiliency
Routing
Routing protocols
biblio
A Comparative Study of Spam SMS Detection Using Machine Learning Classifiers
Submitted by aekwall on Mon, 02/25/2019 - 11:42am
Filtering
text messages
stylistic features
spam SMS detection
Spam SMS
smart phones
short message service
phones
machine learning classifiers
information filtering
filtering spam emails
detection
deep learning methods
content-based machine learning techniques
content based advertisement
CAP curve
Scalability
machine learning
spam messages
electronic messaging
Unsolicited electronic mail
spam detection
unsolicited e-mail
pattern classification
Neural networks
Metrics
pubcrawl
Human behavior
learning (artificial intelligence)
Classification algorithms
Bayes methods
biblio
Detection of Spam E-mails with Machine Learning Methods
Submitted by aekwall on Mon, 02/25/2019 - 11:42am
naïve Bayes classifier
vector space model
Unsolicited electronic mail
unsolicited e-mail
spam filtering
spam e-mails
spam detection
security of data
Scalability
pubcrawl
Postal services
pattern classification
offensive content
Analytical models
Metrics
machine learning methods
machine learning
learning (artificial intelligence)
internet
Human behavior
Filtering
e-mail filtering
e-mail communication
content information
Bayes methods
biblio
Reducing USB Attack Surface: A Lightweight Authentication and Delegation Protocol
Submitted by grigby1 on Thu, 01/31/2019 - 12:13pm
safest places
mobile device
mobile malware
network communications
Petri nets
privately owned smart device
Protocols
pubcrawl
radiofrequency identification
resilience
Resiliency
Metrics
secure places
Servers
smart phones
unintentional piggybacking
Universal Serial Bus
USB attack surface
USB connection streams
USB security
USB storage
Filtering
air-gapped networks
authentication
coloured Petri nets
Coloured Petri Nets (CPN) modelling
composability
Computational modeling
corporate network
Cryptographic Protocols
delegation protocol
epidemic model.
Air gaps
free malware equilibrium
Human behavior
intentional piggybacking
Internet of Things (IoT)
invasive software
lightweight authentication
malware
malware infection
malware spread
biblio
Enhancing Sampling and Counting Method for Audio Retrieval with Time-Stretch Resistance
Submitted by grigby1 on Mon, 01/21/2019 - 12:27pm
LSH
turning point alignment method
Turning
time-stretch resistance
time-stretch
state-of-the-art methods
state-of-the-art audio retrieval method
Sampling and Counting Method
retrieval performance
Resists
Resistance
Resiliency
pubcrawl
Philips-like fingerprints
noise distortions
massive audio dataset
Acoustic Fingerprints
information retrieval
Indexes
ideal audio retrieval method
Human behavior
Fingerprint recognition
fingerprint matching
Filtering
distortion
composability
audio track
audio signal processing
audio retrieval
audio fingerprint
Acoustic signal processing
biblio
Detection of DDoS attack via deep packet analysis in real time systems
Submitted by grigby1 on Wed, 09/12/2018 - 11:25am
known attack patterns
telecommunication traffic
Scalability
Resiliency
resilience
real-time systems
real time systems
Radiation detectors
pubcrawl
packet filtering
Monitoring
Libraries
Computer crime
Internet technologies
internet
Filtering
deep packet inspection
deep packet analysis
DDoS Attack
Databases
cyber security
Cyber Attacks
computer network security
biblio
Research on an Agent-Based Intelligent Social Tagging Recommendation System
Submitted by grigby1 on Wed, 05/30/2018 - 4:11pm
personalized recommendation
user interest mining
tagging
social tagging users
social tagging recommendation
social networking (online)
Social Agents
Servers
self-adaptive recommendation strategy
self-adaptive recommendation
Scalability
resource management
recommender systems
pubcrawl
personalized recommendation strategy
Adaptation models
multi-agent systems
intelligent social tagging recommendation system
information retrieval
Human Factors
Human behavior
Filtering
equilibrium selection
Data models
Data mining
computer architecture
common preference group recommendation strategy
common preference group recommendation
Agent technology
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »