Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
sensitive information
biblio
Redacting Sensitive Information from the Data
Submitted by grigby1 on Tue, 04/12/2022 - 11:20am
programming
named entity recognition
document redaction
Bot (Internet)
codes
Target recognition
Data Sanitization
Compositionality
sensitive information
pubcrawl
metadata
composability
Companies
data privacy
privacy
Resiliency
resilience
Human behavior
biblio
Insider Threat Detection with Face Recognition and KNN User Classification
Submitted by grigby1 on Thu, 04/08/2021 - 3:53pm
image authenticity
face recognition
authentication mechanism
Face
security concerns
Facial features
cloud insider
Cloud Penetration
cloud user community
Degree of Trust
factor authentication
nearest neighbour methods
kNN classification algorithm
KNN Classification and QoS
KNN user Classification
private cloud deployments
Security Method
threat detection model
Threat detection module
threat detection QoS
insider threat
policy-based governance
authorisation
Cloud Computing
information security
Insider Threat Detection
machine learning
Monitoring
Insider Threats
pubcrawl
Human behavior
security of data
resilience
Resiliency
message authentication
authentication
quality of service
cloud storage
pattern classification
sensitive information
Metrics
biblio
On the Security-Privacy Tradeoff in Collaborative Security: A Quantitative Information Flow Game Perspective
Submitted by aekwall on Thu, 04/08/2021 - 3:41pm
collaborative security
sensitive information
information exchange
security-related information
privacy loss
game-theoretic analysis
information theoretic security
collaboration gain
collaborative entities
Loss measurement
collaborative security schemes
information sharing process
multiple security entities
Quantitative information flow
quantitative information flow game perspective
quantitative information flow games
security-privacy tradeoff
security of data
security decisions
Games
collaboration
Intrusion Detection
cyber-attacks
Metrics
privacy
policy-based governance
pubcrawl
Human behavior
Resiliency
game theory
privacy concerns
data privacy
Scalability
biblio
Provenance-based Classification Policy based on Encrypted Search
Submitted by aekwall on Mon, 03/22/2021 - 12:08pm
Predictive Metrics
Encrypted Search
encryption
encryption audits
Games
information retrieval
integrity data
keyword searching
Offline Guessing Attack
pattern classification
encrypted provenance
Privacy Third Party Auditing
provenance-based classification policy
pubcrawl
Public key
security
security protection
semantic security
sensitive information
storage management
cloud document classification
Human behavior
Metrics
Resiliency
composability
Access Control
Adaptation models
authorisation
Cloud Computing
cloud data
Provenance
cloud storage
Compositionality
Cryptography
data integrity
data quality
digital provenance
digital signatures
document category
document handling
biblio
A Monitoring Framework for Side-Channel Information Leaks
Submitted by grigby1 on Mon, 03/15/2021 - 12:10pm
monitor ambient light
side-channel sources
side-channel research
side-channel information leaks
side-channel detection
sensitive information
Resiliency
resilience
recent computer security research
pubcrawl
program security requirements
private information
privacy
popular memory safety
penetration testing tools
monitoring framework
classical exploitation techniques
Metrics
memory corruption
learning (artificial intelligence)
known design patterns
injection tools
indirect means
exploitation framework
data privacy
Cryptography
computer systems
computer network security
Computer Engineering
composability
command injection attacks
biblio
BranchSpec: Information Leakage Attacks Exploiting Speculative Branch Instruction Executions
Submitted by aekwall on Mon, 03/15/2021 - 11:10am
Side Channel
BranchSpec attacks
called BranchSpec
Coffee Lake-based processors
existing speculative attacks
harness branch predictors
information leakage attacks
information leakage threat
microarchitectural attack
microarchitectural side channels
processor hardware vulnerabilities
processor microarchitectural components
processor microarchitecture
branch predictor
simpler code patterns
speculative branch executions
speculative branch instruction executions
speculative execution
speculative executions
speculative path
speculative state update
speculatively executed branches
Transient Execution Attack
transient execution attacks
transient executions
victim
microprocessor chips
Scalability
Conferences
telecommunication security
Hardware
attack surface
History
information security
Resiliency
pubcrawl
Metrics
security vulnerability
Transient analysis
security of data
Compositionality
Instruction sets
program compilers
microarchitecture
Spectre
compiler security
Surface treatment
sensitive information
computer architecture
parallel architectures
branch pattern history structure
branch prediction mechanisms
biblio
Enhanced Privacy and Data Protection using Natural Language Processing and Artificial Intelligence
Submitted by aekwall on Mon, 02/22/2021 - 12:39pm
natural language processing
unsupervised machine learning
unlabeled domain-specific documents corpora
text analysis
Task Analysis
specific-domain knowledge data sets
sensitive information
Sensitive Data Extraction
Scalability
Resiliency
pubcrawl
privacy preservation
physical documents
expert systems
Medical services
machine learning
knowledge transfer
Human behavior
digital documents
Data protection
data privacy
data obfuscation procedures
artificial intelligence training
artificial intelligence systems
Artificial Intelligence
privacy
biblio
CanvasMirror: Secure Integration of Third-Party Libraries in a WebVR Environment
Submitted by grigby1 on Wed, 02/03/2021 - 12:10pm
Three-dimensional displays
resilience
secure integration
security
sensitive information
shared canvas
third-party context
third-party library providers
third-party sandboxing
rendering (computer graphics)
three-dimensional world
virtual reality
web security
Web technology
WebVR
WebVR environment
WebVR site
hypermedia markup languages
360-degree immersive browsing experiences
Browsers
CanvasMirror
composability
cyber physical systems
HTML canvas
Human behavior
Human Factors
immersive systems
internet
Libraries
Load modeling
Loading
online front-ends
privacy
pubcrawl
biblio
A Hybrid Solution for Confidential Data Transfer Using PKI, Modified AES Algorithm and Image as a Secret Key
Submitted by aekwall on Mon, 01/25/2021 - 11:58am
PKI
symmetric encryption technologies
secure transfer
modified AES algorithm
key generation server
insecure network
confidential information trading
confidential information leakage
confidential data transfer
asymmetric encryption technologies
Asymmetric Encryption
online services
modified AES
sensitive information
digital signatures
Servers
cyber threats
public key cryptography
Public key
internet
Metrics
composability
pubcrawl
Human behavior
Resiliency
data encryption
data integrity
Receivers
hybrid encryption
encryption
biblio
MagView: A Distributed Magnetic Covert Channel via Video Encoding and Decoding
Submitted by grigby1 on Mon, 01/25/2021 - 10:29am
Resiliency
invasive software
magnetic cover channel
Magnetic separation
Magnetometers
Metrics
prototype MagView
pubcrawl
resilience
information embedding
secret data
sensitive information
transmitter computer
video coding
video decoding
video encoding
video frame type
video quality degradation
CPU utilization
Air gaps
air-gap
air-gapped internal network
air-gapped networks
Central Processing Unit
composability
Computers
cover channels
covert channels
Decoding
distributed magnetic covert channel
encoding
error statistics
Human behavior
Human Factors
Image coding
1
2
3
4
5
next ›
last »