Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Conferences
biblio
The Impact of Network Design Interventions on CPS Security
Submitted by aekwall on Sun, 10/16/2022 - 6:03pm
security
Measurement
Human Factors
Conferences
Games
pubcrawl
Scalability
Redundancy
Predictive Metrics
Automotive engineering
game theoretic security
biblio
Adversarial Attacks on CFO-Based Continuous Physical Layer Authentication: A Game Theoretic Study
Submitted by aekwall on Sun, 10/16/2022 - 6:03pm
wireless networks
game theoretic security
threshold policy
physical layer authentication
Continuous Authentication
carrier frequency offset
binary hypothesis testing
adversarial learning
Predictive Metrics
security
Physical layer
cyber-physical systems
Scalability
pubcrawl
Games
Conferences
5G mobile communication
Human Factors
biblio
A Dynamic Access Control Model Based on Game Theory for the Cloud
Submitted by aekwall on Sun, 10/16/2022 - 6:03pm
pubcrawl
game theoretic security
Nash Equilibrium
dynamic
Cloud Computing
Predictive Metrics
Access Control
game theory
Scalability
Measurement
Games
Conferences
probability
authorization
trust
Human Factors
Computational modeling
biblio
Spear Phishing Emails Detection Based on Machine Learning
Submitted by grigby1 on Wed, 10/12/2022 - 2:39pm
Companies
Conferences
feature extraction
Forwarding features
Human behavior
interpolation
KMSMOTE
machine learning
machine learning algorithms
Phishing
pubcrawl
Reputation features
spear phishing emails
biblio
Alexa in Phishingland: Empirical Assessment of Susceptibility to Phishing Pretexting in Voice Assistant Environments
Submitted by grigby1 on Wed, 10/12/2022 - 2:38pm
Amazon Alexa
Conferences
Electronic mail
Human behavior
IoT security
Phishing
Phishing Susceptibility
privacy
pubcrawl
security
Virtual assistants
Voice assistant security
biblio
Vulnerability Assessment for Deep Learning Based Phishing Detection System
Submitted by grigby1 on Wed, 10/12/2022 - 2:37pm
Conferences
deep learning
Electronic countermeasures
Human behavior
Phishing
pubcrawl
security
biblio
Verbal Deception Cue Training for the Detection of Phishing Emails
Submitted by grigby1 on Wed, 10/12/2022 - 2:37pm
Conferences
Copper
deception cues
deception detection
Electronic mail
familiarity
Human behavior
Informatics
Phishing
pubcrawl
security
Training
biblio
Named Entity Recognition Method in Network Security Domain Based on BERT-BiLSTM-CRF
Submitted by grigby1 on Thu, 10/06/2022 - 3:21pm
resilience
CRF
BiLSTM
BERT
Resiliency
Text recognition
Communications technology
Knowledge engineering
Named Data Network Security
named entity recognition
pubcrawl
Cybersecurity
network security
encoding
Data models
Scalability
Conferences
Human Factors
Human behavior
biblio
Privacy Preserved Secure Offloading in the Multi-access Edge Computing Network
Submitted by grigby1 on Mon, 10/03/2022 - 12:47pm
energy consumption
secure offloading
jointly optimal
CMDP
Location Privacy in Wireless Networks
location privacy
Reinforcement learning
Markov processes
Mobile handsets
wireless networks
security
Compositionality
composability
Wireless communication
Conferences
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Virtual Private Mobile Network with Multiple Gateways for B5G Location Privacy
Submitted by grigby1 on Mon, 10/03/2022 - 12:46pm
data privacy
Location Privacy. Routing. Virtual Private Mobile Network
Location Privacy in Wireless Networks
location privacy
Vehicular and wireless technologies
wireless networks
Compositionality
composability
Cellular networks
Logic gates
privacy
performance evaluation
Conferences
Resiliency
resilience
Metrics
Human behavior
pubcrawl
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
…
next ›
last »