Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Kernel
biblio
An I/O Request Packet (IRP) Driven Effective Ransomware Detection Scheme using Artificial Neural Network
Submitted by aekwall on Thu, 04/08/2021 - 4:36pm
ransomware behavior
malware
microsoft windows
neural nets
Neural networks
newly found research paradigm
pubcrawl
Ransomware
ransomware attacks
low-level file system
ransomware detection
ransomware families
ransomware researchers
ransomware samples
ransomware samples every day
Resiliency
retail to critical infrastructure
global surge
artificial neural network
Compositionality
Cryptography
cyber-attacks
Data collection
discovering novel ransomware families
driven effective ransomware detection scheme
effective artificial neural network structure
i-o systems security
I/O Monitoring
industry-based security researchers
Information Reuse and Security
invasive software
IRP logs
Kernel
learning (artificial intelligence)
biblio
Research on Technology of Embedded System Security Protection Component
Submitted by grigby1 on Mon, 03/29/2021 - 12:03pm
log management
whitelist-based security protection
whitelist management
trusted computing technology
Trusted Computing
transport protocols
TCPIP
TCP/IP protocol
security policy management
security management system
security management
Resiliency
resilience
Qt graphical management interface
pubcrawl
Metrics
composability
Kernel
IoT devices
Internet of Things development
Internet of Things
graphical management interface
embedded systems
embedded system security protection
embedded security protection system
Cryptography
cryptographic algorithm
Computers
computer network security
computer network reliability
computer network performance evaluation
computer network management
biblio
Profiling Vulnerabilities Threatening Dual Persona in Android Framework
Submitted by grigby1 on Thu, 01/28/2021 - 1:31pm
Quadroot
IPC
Kernel
malware
managed profiles
Market research
Metrics
mobile computing
National Vulnerability Database NVD
Pingroot
profiling vulnerabilities threatening dual persona
pubcrawl
inter-process communication
resilience
Resiliency
Scalability
security of data
security threat analysis
smart phones
smartphone
Stagefright
unrestricted access
vulnerable Android versions
certificate forging
Android (operating system)
Android 5
Android for Work
Android Lollipop release
Android platform
Android security model
Android smartphones
Android vulnerabilities
Android vulnerability Website
Androids
BYOP
android encryption
checksum collisions
crafted MMS
CYOD
dual persona
EMM
encryption
FUM score
Google
GSuite
Human behavior
biblio
Accurate Deep Net Crowd Counting for Smart IoT Video acquisition devices
Submitted by grigby1 on Mon, 01/11/2021 - 2:01pm
IoT cameras
video surveillance
smart IoT video acquisition devices
Self attention network
security system
security
Scalability
Robustness
Resiliency
resilience
pyramid contextual module
pubcrawl
object detection
neural nets
Metrics
Kernel
camera characteristics
Internet of Things cameras
Internet of Things
feature extraction
estimation
deep video
Deep Neural Network
deep net crowd counting
deep architecture
crowdsourcing
crowd management tasks
Crowd density estimation
consistency
computer architecture
Cameras
biblio
BlurNet: Defense by Filtering the Feature Maps
Submitted by grigby1 on Mon, 12/28/2020 - 12:48pm
Scalability
malicious examples
Metrics
neural nets
Neural networks
Perturbation methods
pubcrawl
resilience
Resiliency
robust physical perturbations
Robustness
RP
malicious adversary
security of data
standard blur kernels
standard-architecture traffic sign classifiers
standards
stop signs
substitute model
targeted misclassification rates
traffic engineering computing
victim model
white stickers
white-box attacks
frequency analysis
adaptive attack evaluation
adaptive filtering
adversarial defense
adversarial images
Adversarial Machine Learning
Adversarial robustness
attack algorithms
black stickers
blackbox transfer attack
BlurNet
depthwise convolution layer
Adaptation models
gradient information
high frequency noise
image recognition
image restoration
input image
Kernel
layer feature maps
learning (artificial intelligence)
low-pass filters
lowpass filtering behavior
biblio
Identification of Computer Displays Through Their Electromagnetic Emissions Using Support Vector Machines
Submitted by aekwall on Mon, 12/14/2020 - 12:28pm
information security
Training
TEMPEST information security problem
tempest
Support vector machines
signal processing
security of data
Resiliency
pubcrawl
Predictive Metrics
pattern classification
Monitoring
matrix algebra
Kernel
computer displays
Image reconstruction
image classification
F1-score
Electromagnetics
electromagnetic emissions
display image capture
confusion matrix
Computer graphics
Antenna measurements
Artificial Intelligence
classification
composability
biblio
AMDroid: Android Malware Detection Using Function Call Graphs
Submitted by grigby1 on Fri, 12/11/2020 - 2:32pm
learning (artificial intelligence)
structural semantic learning
static analysis
smart phones
Semantics
Resiliency
resilience
pubcrawl
privacy
opcode sequences
mobile operating system
mobile internet
Metrics
Malware Analysis
malware
machine learning
AMDroid
Kernel
invasive software
Human behavior
graph theory
graph kernels
function call graphs
function call graph
feature extraction
FCGs
countless malicious applications
application program interfaces
API calls
Android Malware Detection
Android (operating system)
biblio
Reinforcement Learning with Budget-Constrained Nonparametric Function Approximation for Opportunistic Spectrum Access
Submitted by grigby1 on Wed, 12/02/2020 - 1:54pm
learning (artificial intelligence)
telecommunication congestion control
state spaces
single-channel carrier-sense multiple-access
Scalability
Resiliency
resilience
reinforcement learning-based radio
Reinforcement learning
Receivers
radio spectrum management
Radio frequency
pubcrawl
opportunistic spectrum access
multichannel adversarial radio
Acceleration
kernel-based reinforcement learning approach
Kernel Method
Kernel
intrinsic state-action space
idle slots
function approximation
Dictionaries
coupled congestion control
congested bands
cognitive radio
channel access actions
carrier sense multiple access
budget-constrained sparsification technique
budget-constrained nonparametric function approximation
biblio
A Fast MPEG’s CDVS Implementation for GPU Featured in Mobile Devices
Submitted by grigby1 on Tue, 12/01/2020 - 4:37pm
GPU-based approach
Human Factors
CDVS information
Central Processing Unit
Compact Descriptors for Visual Search
comparable precision
computation times
Computer applications
Concurrent computing
CPU-based reference implementation
descriptor extraction process
embedded software
fast MPEG CDVS implementation
GPU data structures
parallel algorithms
Image analysis
indexing algorithm
Internet-scale visual search applications
interoperable cross-platform solution
main local descriptor extraction pipeline phases
many-cores embedded graphical processor units
matching algorithm
memory access
Moving Picture Experts Group
MPEG CDVS standard
visual descriptors
Internet-scale Computing Security
data structures
pubcrawl
Human behavior
Metrics
collaboration
resilience
Resiliency
Scalability
internet
storage management
standards
composability
mobile computing
feature extraction
multiprocessing systems
parallel processing
Kernel
Policy Based Governance
Mobile handsets
graphics processing units
visualization
mobile devices
image matching
image retrieval
object detection
Services
biblio
Copker: A Cryptographic Engine Against Cold-Boot Attacks
Submitted by aekwall on Mon, 11/30/2020 - 12:08pm
key-encryption key
cold-boot attack
cold-boot attacks
Copker stores kilobytes
CPU registers
cryptographic engine
cryptographic services
deterministic random bit generators
disk encryption
ECDSA signing
Cache-as-RAM
multiple private keys
on-chip CPU caches
PGP Email clients
plain-text sensitive data
popular asymmetric cryptosystems
public-key cryptography implementation
RAM chips
suspend mode
Magnetic Remanence
Computers
private key cryptography
Kernel
Resiliency
pubcrawl
Cryptography
cyber physical systems
random number generation
Random access memory
RSA
Internet of Things
Compositionality
Registers
memory data
cryptographic keys
sensitive information
deterministic random bit generator
private key
Cathode ray tubes
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »