Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Browsers
biblio
Turning Trust Around: Smart Contract-Assisted Public Key Infrastructure
Submitted by aekwall on Mon, 11/18/2019 - 11:48am
contracts
PKI Trust Models
trust experience
smart contract-assisted public key infrastructure
smart contract-assisted PKI extension
PKI
dynamic trust state
dynamic trust network
dynamic trust management
Decentralized Trust
CT
certification
certificate transparency
certificate authority
Browsers
Scalability
public key cryptography
Public key
digital signatures
Policy
Ecosystems
smart contract
blockchain
Metrics
pubcrawl
Human behavior
Resiliency
Trusted Computing
Protocols
biblio
Certificate Transparency Using Blockchain
Submitted by grigby1 on Wed, 10/23/2019 - 12:39pm
Protocols
web domains
web communication
telecommunication security
SSL-TLS protocols
SSL Trust Models
Servers
Scalability
safe distributions
Resiliency
resilience
public logs
public keys
public key cryptography
Public key
pubcrawl
authorisation
PKI
Metrics
IBM Hyperledger Fabric blockchain platform
hyperledger
Human behavior
Google
Computed tomography
certification authorities
certification
certificate validation process
certificate transparency
certificate revocation mechanism
certificate authorities
Browsers
blockchain
biblio
Graph-Based APT Detection
Submitted by grigby1 on Mon, 06/10/2019 - 1:59pm
Image edge detection
Web interface
undocumented attacks
Servers
Resiliency
pubcrawl
Protocols
privacy
Organizations
Metrics
Malware Analysis
invasive software
advanced persistent threats
Human behavior
HTTP traffic
graph-based APT detection
graph theory
graph model
detection system
Browsers
Batch production systems
Approximation algorithms
antiviruses
biblio
Constructing Browser Fingerprint Tracking Chain Based on LSTM Model
Submitted by grigby1 on Fri, 04/05/2019 - 10:27am
LSTM
training set
track Web attackers
stateless tracking technique
Stability analysis
LSTM model
input feature vector
browser fingerprint tracking chain
browser fingerprint evolution
browser fingerprint
recurrent neural nets
Time series analysis
time series
Resiliency
security of data
Compositionality
Browser Security
tracking
Fingerprint recognition
online front-ends
Recurrent neural networks
computer architecture
Browsers
Training
Metrics
Human behavior
pubcrawl
resilience
biblio
Tor Browser Forensics in Exploring Invisible Evidence
Submitted by grigby1 on Fri, 04/05/2019 - 10:27am
Resiliency
Tor browser forensics
Relays
perpetrators
onion routing
onion router
invisible evidence
Internet crimes
information security offenses
information security incidents
incognito
Facebook
endeavors
digital evidence
DH-HEMTs
internet
Tor
Digital Forensics
Compositionality
Browser Security
online front-ends
Computer crime
Forensics
Cryptography
Browsers
Metrics
Human behavior
pubcrawl
resilience
tools
biblio
FP -TESTER : Automated Testing of Browser Fingerprint Resilience
Submitted by grigby1 on Fri, 04/05/2019 - 10:27am
Browser Security
testing toolkit
software tools
privacy leaks
FP-TESTER
browser vendors
browser tracking
browser fingerprint resilience
Automated Testing
Resiliency
Statistics
Sociology
program testing
Compositionality
privacy
Fingerprint recognition
Browser Fingerprinting
online front-ends
Entropy
Browsers
Metrics
Human behavior
pubcrawl
resilience
testing
security of data
data privacy
internet
biblio
FP-STALKER: Tracking Browser Fingerprint Evolutions
Submitted by grigby1 on Fri, 04/05/2019 - 10:26am
online front-ends
target tracking
Portable document format
FP-STALKER approach
browser instances
Resiliency
Compositionality
Browser Security
Fingerprint recognition
Browser Fingerprinting
privacy
microsoft windows
Browsers
learning (artificial intelligence)
Metrics
Human behavior
pubcrawl
resilience
security
data privacy
biblio
Malicious HTML File Prediction: A Detection and Classification Perspective with Noisy Data
Submitted by grigby1 on Wed, 03/06/2019 - 4:25pm
learning (artificial intelligence)
synthetic minority oversampling technique
SMOTE
Resiliency
resilience
pure detection model
pubcrawl
protection systems
pattern classification
noisy data
networked systems
malicious HTML file prediction
malicious HTML file classification
machine learning
Autonomic Security
Intrusion Detection
Hypertext systems
hypermedia markup languages
feature selection technique
feature extraction
Decision trees
data quality
cybersecurity challenges
computer security
computer network security
composability
class imbalance
Browsers
biblio
SoundAuth: Secure Zero-Effort Two-Factor Authentication Based on Audio Signals
Submitted by grigby1 on Fri, 02/08/2019 - 4:34pm
password
zero-effort two-factor authentication
zero-effort 2FA mechanism
user-friendliness
user experience
two factor authentication
time synchronization
Support vector machines
support vector machine
SoundAuth
smart phones
smart phone
Servers
pubcrawl
ambient audio signals
online front-ends
machine learning
learning (artificial intelligence)
Human Factors
Human behavior
co-presence detection
challenge-response protocol
Browsers
browser
authorisation
authentication
audio signals
ambient sound
biblio
Identifying Vulnerabilities in APT Attacks: A Simulated Approach
Submitted by grigby1 on Mon, 01/21/2019 - 12:37pm
multiple simulated attacks
vulnerabilities
virtualized environment
Universal Serial Bus
tools
spearphishing
security of data
Scalability
Resiliency
pubcrawl
Payloads
operating system
advanced persistent threat attacks
mitigation
Metrics
malware
Human behavior
Firewalls (computing)
cyber-attacks
Browsers
APT threat vectors
APT attacks
antivirus software
advanced persistent threats
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »