Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
attacker
biblio
Honeypots Vulnerabilities to Backdoor Attack
Submitted by grigby1 on Thu, 06/09/2022 - 2:52pm
information security
pubcrawl
resilience
Scalability
Cryptography
attacker
Human Factors
honey pots
honeypot
attack
Resiliency
Backdoor
Kfsensor
victim
biblio
Robust Cross-Layer Security Framework For Internet of Things Enabled Wireless Sensor Networks
Submitted by grigby1 on Tue, 05/25/2021 - 2:18pm
man-in-middle attack
wireless sensor networks
security
Robustness
Resiliency
resilience
pubcrawl
Physical layer
Monitoring
Cross Layer Security
Internet of Things
Energy Efficiency
cross-layer technique
composability
Clustering algorithms
clustering
attacker
biblio
Introducing Code Assets of a New White-Box Security Modeling Language
Submitted by grigby1 on Thu, 03/04/2021 - 2:35pm
Metrics
white-box security modeling language
White-box security
WB security analysis
testing
specification languages
source code (software)
software protection technologies
software protection solutions
Software
Security modeling language
reverse engineer
Resiliency
resilience
pubcrawl
White Box Security
i-WBS
Data protection
Conferences
Computer crime
Computational modeling
composability
code security
code assets
Binary codes
binary code
attacker
Analytical models
security
white box
biblio
Defending Against Model Stealing Attacks With Adaptive Misinformation
Submitted by grigby1 on Thu, 01/28/2021 - 1:12pm
Metrics
training dataset
security of data
security
Scalability
Resiliency
resilience
query processing
pubcrawl
Predictive models
Perturbation methods
out-of-distribution inputs
OOD queries
neural nets
model stealing attacks
Adaptation models
learning (artificial intelligence)
labeled dataset
Human behavior
deep neural networks
Data models
Computational modeling
Cloning
clone model
black-box query access
attacker clone model
attacker
Adversary Models
Adaptive Misinformation
biblio
Framework for Analyzing the Security of Robot Control Systems
Submitted by grigby1 on Thu, 12/17/2020 - 1:36pm
pubcrawl
vulnerabilities
threats
security system
security of data
security
robots
robotized system
Robotic system
Robot sensing systems
robot operating systems
robot control systems
Resiliency
resilience
Application software
policy-based governance
operating systems
model
mobile robots
malware
Human Factors
Human behavior
group management system
framework
control engineering computing
attacks
attacker
biblio
Multimodal Graph Analysis of Cyber Attacks
Submitted by grigby1 on Fri, 12/11/2020 - 2:34pm
pubcrawl
Metrics
multimodal graph
multimodal graph analysis
multimodal graph approach
multimodal graph nodes
nodes classification
observed cyber events
privacy
Malware Analysis
resilience
Resiliency
security of data
single-modality graphs
strong inter-modal ties
targeted nodes
unclassified regime
cyber-attacks
attack stages
attacker
autonomous systems
Centrality
centrality analysis
community analysis
Computational modeling
Cyber Attacks
Analytical models
cyberattack
cyberattack victims
Data mining
graph theory
Human behavior
IP networks
malware
biblio
Deceive the Attacker: Thwarting IP Theft in Sieve-Valve-based Biochips
Submitted by grigby1 on Mon, 11/02/2020 - 12:29pm
real-life biochips
IP theft
Lab-on-a-Chip
Microfluidics
Mixers
Multiplexing
obfuscated biochips
policy-based governance
practical sieve-valve based obfuscation
pubcrawl
IP networks
resilience
Resiliency
reverse engineering
security of data
Sequential analysis
sieve-valve-based biochips
sieve-valves
Valves
computer network security
bioassay developer
bioassay implementation
biochip building blocks
biochips
biological techniques
Biomembranes
bioMEMS
composability
attacker
control signals
cost-security trade-offs
desieve
highly-skilled-person-hour investment
industrial property
intellectual property rights
intellectual property security
internet
biblio
A Semantic k-Anonymity Privacy Protection Method for Publishing Sparse Location Data
Submitted by grigby1 on Thu, 08/13/2020 - 5:35pm
semantic k-anonymity privacy protection method
privacy disclosure
privacy leaks
privacy protection
pubcrawl
Publishing
resilience
Resiliency
semantic attacks
nonsensitive data
semantic privacy protection
semantic translation
Semantics
sensors
sparse location data
Trajectory
user sensitive information
k-anonymity
anonymous set
attacker
composability
compressed sensing
data privacy
diversity reception
Human behavior
information science
anonymity
location based services
location information
location technology
location-based services
Metrics
missing location data
multiuser compressing sensing method
biblio
Peace Through Superior Puzzling: An Asymmetric Sybil Defense
Submitted by grigby1 on Mon, 03/02/2020 - 1:37pm
distributed computing
Sybil participants
Sybil defense algorithm
sybil attacks
Sybil attack
spending rate
Resiliency
resilience
pubcrawl
Metrics
abstract-A common tool
computer network security
computational puzzles
computational complexity
composability
attacker
attack scenarios
asymmetric Sybil defense
Algorithm design and analysis
biblio
A Secure Autonomic Mobile Ad-Hoc Network Based Trusted Routing Proposal
Submitted by grigby1 on Wed, 02/26/2020 - 4:34pm
Scalability
Mobile Ad-hoc Network host
mobile radio
packet count
privacy
Protocols
pubcrawl
Resiliency
route detection
route discovery
Routing
Routing protocols
Mobile Ad-Hoc Network (MANET)
Secure Autonomic Mobile Ad-hoc Network
telecommunication network routing
trust administration approach
Trust estimation dependent
trust management approach
trust organization approaches
Trust Routing
trusted path
trusted Routing proposal
wireless sensor networks
Informatics
Adaptive Information Dissemination (AID)
attacker
composability
Compositionality
data privacy
Data Transmission
different occurrences ease
direction-finding procedure
fuzzy trust approach
hybrid approach
inaccessible systems
Adaptive Information Dissemination
information dissemination
internet
Internet of Things
Internet of Things (IoT)
Internet of Things gadgets
IoT
MANET Attack Detection
manet privacy
Metrics
mobile ad hoc networks
1
2
3
next ›
last »