Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cloning
biblio
Unleashing the Power of Compiler Intermediate Representation to Enhance Neural Program Embeddings
Submitted by aekwall on Fri, 04/28/2023 - 8:43am
Task Analysis
Training
Scalability
pubcrawl
Metrics
Resiliency
Training data
Compositionality
Program processors
Syntactics
Cloning
codes
compiler technique
deep learing
program embedding
compiler security
biblio
Evil-Twin Browsers: Using Open-Source Code to Clone Browsers for Malicious Purposes
Submitted by grigby1 on Fri, 04/14/2023 - 3:15pm
Browsers
trojan
evil-twin
Browser Security
codes
Resiliency
extension
open-source
Chromium
Compositionality
security
browser
Cloning
Prototypes
cyberattack
Conferences
resilience
Metrics
Human behavior
pubcrawl
biblio
Exploiting Process Variations to Protect Machine Learning Inference Engine from Chip Cloning
Submitted by grigby1 on Tue, 03/01/2022 - 3:19pm
network on chip security
Transistors
Throughput
testing
security
Scalability
Resiliency
resilience
pubcrawl
non-volatile memory
Cloning
Metrics
machine learning
inmemory computing
Hardware Security
Hardware accelerator
Engines
Deep Neural Network
composability
biblio
A Decentralized Method for Detecting Clone ID Attacks on the Internet of Things
Submitted by aekwall on Mon, 11/29/2021 - 12:53pm
security
Routing
Internet of Things
Protocols
operating systems
pubcrawl
Resiliency
composability
energy consumption
6LoWPAN
RPL
Clone ID Attack
Cloning
IoT
biblio
Enhancing the Reliability of IoT Data Marketplaces through Security Validation of IoT Devices
Submitted by grigby1 on Mon, 08/02/2021 - 2:23pm
Cloning
composability
Data marketplace
Data models
IoT
middleware
Open Source Software
policy-based governance
pubcrawl
Reliability
resilience
Resiliency
security
biblio
Defending Against Model Stealing Attacks With Adaptive Misinformation
Submitted by grigby1 on Thu, 01/28/2021 - 12:12pm
Metrics
training dataset
security of data
security
Scalability
Resiliency
resilience
query processing
pubcrawl
Predictive models
Perturbation methods
out-of-distribution inputs
OOD queries
neural nets
model stealing attacks
Adaptation models
learning (artificial intelligence)
labeled dataset
Human behavior
deep neural networks
Data models
Computational modeling
Cloning
clone model
black-box query access
attacker clone model
attacker
Adversary Models
Adaptive Misinformation
biblio
Android gaming malware detection using system call analysis
Submitted by grigby1 on Tue, 11/17/2020 - 1:40pm
Androids
Operating systems security
system call analysis
malware game system calls
malicious gaming applications
malicious games
detection system
cloning applications
benign game system calls
Android operating systems
Android gaming malware detection system
Android Gaming Malware
computer games
Android (operating system)
Humanoid robots
Monitoring
resilience
Games
dynamic analysis
program diagnostics
invasive software
malware
Cloning
smart phones
mobile computing
composability
Resiliency
Metrics
pubcrawl
biblio
Sandnet: Towards High Quality of Deception in Container-Based Microservice Architectures
Submitted by aekwall on Mon, 09/21/2020 - 2:46pm
Attack Strategies
confinement
vulnerable production network
suspicious microservices
security incidents
sandnet
sandbox network
quarantined services
QoD
Production systems
open production network
network deception mechanisms
live confinement
evaluation scenario
container-based microservice architectures
Cloning
computer network security
Degradation
Switches
computer viruses
Containers
cyber-physical systems
sandboxing
Measurement
threat intelligence
privacy
Production
composability
pubcrawl
Resiliency
system monitoring
security
biblio
Machine Learning Based IoT Edge Node Security Attack and Countermeasures
Submitted by grigby1 on Fri, 09/04/2020 - 2:38pm
noninvasive architecture independent machine learning attack
cloned PUF devices
Cloning
cloning accuracy
highly connected ecosystem
IoT edge node security attack
machine-learning based countermeasure
malicious attack
malicious PUF modeling
authentic PUFs
physically unclonable functions
PUF
PUF architecture
PUF designs
PUF structure
two-stage brute force attack model
ubiquitous computing devices
brute force attacks
machine learning
Internet of Things
security
Cloud Computing
Servers
computer network security
Protocols
authentication
computer architecture
Cryptography
cloud server
pubcrawl
IoT networks
IoT
IoT devices
learning (artificial intelligence)
Human Factors
policy-based governance
biblio
A New Technique for Detecting Android App Clones Using Implicit Intent and Method Information
Submitted by aekwall on Mon, 08/10/2020 - 9:32am
Metrics
android encryption
repackaged apps
online markets
method information
malicious codes
intent
implicit intents
code obfuscation techniques
Cloning
clone detection
class method
Android app clones detection
Andorid app
Code Obfuscation
Scalability
Android ecosystem
reverse engineering
Android (operating system)
Data mining
tools
pubcrawl
Human behavior
Resiliency
feature extraction
mobile computing
invasive software
malware
encryption
1
2
next ›
last »