Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Libraries
biblio
SEADer++ v2: Detecting Social Engineering Attacks using Natural Language Processing and Machine Learning
Submitted by aekwall on Mon, 02/22/2021 - 12:38pm
natural language processing
social networks potential hackers
social engineering attacks detection
social attacks
SEADer++ v2
potential attacks
natural language processing steps
future attacks
Forestry
blacklisting
social engineering
Attack detection
cyber security
security of data
Mathematical model
Libraries
internet
social networking (online)
machine learning
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
Classification algorithms
Scalability
biblio
IoT Content Object Security with OSCORE and NDN: A First Experimental Comparison
Submitted by aekwall on Mon, 02/22/2021 - 12:37pm
multihop scenarios
DTLS
DTLS sessions
end-to-end transport
first experimental comparison
information-centric Named Data Networking protocol
IoT content Object Security
large-scale IoT
low power lossy links
measure protocol performances
MQTT-SN
content transfer
NDN attains superior robustness
network experimentation
OSCORE
protocol stacks
protocol translations
proxies
request-response transactions
secure networking
security sessions
single-hop scenarios
Libraries
IP networks
Scalability
Internet of Things
Protocols
transport protocols
Resiliency
Human behavior
pubcrawl
Cryptography
internet
computer network security
Logic gates
named data networking
internetworking
ICN
Information Centric Networks
gateways
CoAP
Constrained RESTful Environments
content object security features
content security end-to-end
biblio
Advanced Behavior-Based Technique for Cryptojacking Malware Detection
Submitted by grigby1 on Wed, 02/10/2021 - 12:11pm
malware
malicious mining
cryptojacking
behavioral analysis
Multicore processing
Ransomware
Cybercrime
Browsers
malware detection
Monitoring
Libraries
Cryptography
Resiliency
resilience
Metrics
Human behavior
pubcrawl
cryptocurrencies
biblio
Watchman: Monitoring Dependency Conflicts for Python Library Ecosystem
Submitted by aekwall on Mon, 02/08/2021 - 12:40pm
Monitoring
Scalability
Resiliency
pubcrawl
Metrics
tools
Libraries
automation
Python
software engineering
Ecosystems
software ecosystem
Human Factors
Compositionality
Cyber Dependencies
dependency conflicts
biblio
CanvasMirror: Secure Integration of Third-Party Libraries in a WebVR Environment
Submitted by grigby1 on Wed, 02/03/2021 - 12:10pm
Three-dimensional displays
resilience
secure integration
security
sensitive information
shared canvas
third-party context
third-party library providers
third-party sandboxing
rendering (computer graphics)
three-dimensional world
virtual reality
web security
Web technology
WebVR
WebVR environment
WebVR site
hypermedia markup languages
360-degree immersive browsing experiences
Browsers
CanvasMirror
composability
cyber physical systems
HTML canvas
Human behavior
Human Factors
immersive systems
internet
Libraries
Load modeling
Loading
online front-ends
privacy
pubcrawl
biblio
Design of an Augmented Reality System for Immersive Learning of Digital Electronic
Submitted by grigby1 on Wed, 02/03/2021 - 12:08pm
immersive learning
tools
resilience
pubcrawl
privacy
Multimedia systems
mobile learning
mobile computing
Mobile Applications
Mobile Application
Logic gates
Libraries
ios
interactive systems
interactive app
immersive systems
Human Factors
Human behavior
electronic engineering education
electronic engineering computing
education
digital electronics
Digital circuits
cyber physical systems
computer aided instruction
composability
Cameras
augmented reality system
augmented reality
biblio
Multitask Adversarial Learning for Chinese Font Style Transfer
Submitted by aekwall on Mon, 02/01/2021 - 10:44am
fine-grained parts
style transfer
character images
character recognition
character sets
Chinese character complexity
Chinese font datasets
Chinese font style transfer
cross-task interactions
neural style transfer
font generation
general style transfer
MTfontGAN
multiple target ones
multitask
multitask adversarial learning
reference font
Scalability
gan
Gallium nitride
overfitting problem
Predictive Metrics
Generators
natural language processing
machine learning
Libraries
Training
neural nets
Decoding
pubcrawl
Resiliency
learning (artificial intelligence)
Task Analysis
biblio
Establishing Trust in Binary Analysis in Software Development and Applications
Submitted by aekwall on Mon, 02/01/2021 - 10:41am
Binary codes
vulnerability reports
source security
software programmer trust
security vulnerability minimization
knowledge elicitations
knowledge acquisition
implementation risk assessment
binary release metadata
binary component
binary code components
binary code behavior
binary analysis tools
binary analysis techniques
human trust
security of data
binary code
data loss
trust
Binary Analysis
software development
software engineering
computer security
Libraries
tools
standards
pubcrawl
Human behavior
Trusted Computing
Software
biblio
Hands-on Undergraduate Labs on Anonymity Cryptographic Algorithms
Submitted by grigby1 on Thu, 01/28/2021 - 1:02pm
Protocols
Wireshark dissector
undergraduate security course
Tor
Software algorithms
security
Resiliency
resilience
Relays
pubcrawl
anonymity
project-based learning
problem-based learning
onion routing
Metrics
Libraries
Human behavior
education
Cryptography
composability
biblio
JCMathLib: Wrapper Cryptographic Library for Transparent and Certifiable JavaCard Applets
Submitted by grigby1 on Wed, 01/20/2021 - 3:21pm
proprietary manufacturer-specific APIs
low-level cryptographic primitives
memory footprint
nondisclosure agreements
open code sharing
open library
open systems
open-source development
open-source licenses
optimisation
optimization
proprietary APIs
low-level cryptographic operations
pubcrawl
public domain software
resilience
Resiliency
resource-constrained platforms
smart cards
smartcards
software libraries
standards
transparency
wrapper cryptographic library
Elliptic curves
APIs
application program interfaces
application programming interface
auditability
Big Integers
certification
certification transparency
Compositionality
Cryptography
data types
elliptic curve operations
API
generic library
Hardware
interoperability
Java
JavaCard
JavaCard API
JavaCard applets
JavaCard multiapplication platform
JCMathLib
Libraries
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »