Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Bloom filter
biblio
Identity-Based Integrity Verification (IBIV) Protocol for Cloud Data Storage
Submitted by grigby1 on Tue, 04/19/2022 - 12:16pm
pubcrawl
SIS problem
signature based defense
Servers
Scalability
Resiliency
resilience
Quantum Safe Cryptography
quantum computing
Bloom filter
Protocols
Memory
Lattices
lattice cryptography
IDBased cryptography
data privacy
Cloud storage system
Cloud Computing
biblio
D3: Detection and Prevention of DDoS Attack Using Cuckoo Filter
Submitted by grigby1 on Wed, 04/13/2022 - 1:54pm
Metrics
DDoS Attack Prevention
OSI
Cuckoo filter
DoS
Information filters
Bloom filter
DDoS
denial-of-service attack
Economics
cloud
Support vector machines
SDN
Floods
composability
Computational modeling
Data models
Resiliency
resilience
Human behavior
pubcrawl
biblio
Preserving Network Privacy on Fine-grain Path-tracking Using P4-based SDN
Submitted by grigby1 on Wed, 08/11/2021 - 3:04pm
policy-based governance
Switches
security
Routing
Resiliency
resilience
pubcrawl
Protocols
Privacy-aware
privacy
Bloom filter
Path-tracking
P4
network topology
ip privacy
IP networks
fine-grain
composability
collaboration
biblio
Privacy-Preserving Traffic Flow Estimation for Road Networks
Submitted by aekwall on Tue, 07/27/2021 - 1:05pm
Computing Theory
privacy
Aggregates
Bloom filter
Computing Theory and Privacy
Cryptography
encryption
Homomorphic encryption
Protocols
pubcrawl
Receivers
Resiliency
Roads
vehicular traffic flow estimation
biblio
Pollution Attacks on Counting Bloom Filters for Black Box Adversaries
Submitted by aekwall on Tue, 07/27/2021 - 12:58pm
Technological innovation
pollution attacks
Pollution
Integrated circuit modeling
Hash functions
Complexity theory
Black Box Attacks
Bloom filter
composability
Resiliency
Metrics
pubcrawl
field programmable gate arrays
security
biblio
A Fuzzy String Matching Scheme Resistant to Statistical Attack
Submitted by aekwall on Mon, 01/18/2021 - 10:35am
Indexes
vector index
string matching
statistical attack
secure fuzzy query
Scalability
S-BF
Resistance
Resiliency
query processing
pubcrawl
noise vector
Metrics
Bloom filter
fuzzy string matching scheme
fuzzy set theory
fuzzy query scheme
Fuzzy Query
Fuzzy Cryptography
frequency distribution
encryption
Encrypted Cloud Database
data structures
Cryptography
Cloud Computing
biblio
Privacy-Preserving Fuzzy Multi-Keyword Search for Multiple Data Owners in Cloud Computing
Submitted by aekwall on Mon, 09/28/2020 - 11:02am
locality-sensitive hashing
Computing Theory and Privacy
single data owner model
searchable encryption schemes
search privacy
privacy-preserving fuzzy multikeyword search
plaintext search techniques
multiple data owners
LSH
Information Leakage
fuzzy multi-keyword search.
encrypted documents
ciphertext search
Bloom filter
BF
Cloud Computing
Privacy-preserving
encryption method
cloud server
Indexes
fuzzy set theory
query processing
pubcrawl
Human behavior
Resiliency
data privacy
encryption
Cryptography
Servers
Scalability
biblio
Deep packet inspection using Cuckoo filter
Submitted by grigby1 on Wed, 09/12/2018 - 10:24am
matched filters
Traffic identification
Traffic classification
telecommunication traffic
signature fingerprint
Scalability
Resiliency
resilience
Quotient Filter
pubcrawl
membership query data structures
matching check tool
Bloom filter
k hash functions
Internet service providers
internet
Inspection
Information filters
high performance DPI approaches
Fingerprint recognition
filtering algorithms
deep packet inspection
data structures
Cuckoo filter
biblio
Multi-level Anomaly Detection in Industrial Control Systems via Package Signatures and LSTM Networks
Submitted by grigby1 on Wed, 07/18/2018 - 9:05am
resilience
multilevel anomaly detection method
network package content analysis
package content level anomaly detection
package signatures
package traffic
pattern classification
production engineering computing
Protocols
pubcrawl
recurrent neural nets
LSTM networks
Resiliency
SCADA systems
Scalability
signature database
software packages
stacked long short term memory network-based softmax classifier
time series
time-series anomaly detection
time-series structure
field devices
baseline signature database
Bloom filter
Bloom filters
communication patterns
control engineering computing
data structures
database management systems
Databases
Detectors
digital signatures
Anomaly Detection
gas pipeline SCADA system
ICS Anomaly Detection
ICS networks
industrial control
Industrial Control Systems
integrated circuits
Intrusion Detection
learning (artificial intelligence)
long short term memory networks
biblio
CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers
Submitted by grigby1 on Thu, 06/07/2018 - 2:15pm
scalable system
PKI
privacy
privacy concerns
Protocols
Prototypes
pubcrawl
Rapid7
resilience
Resiliency
revocation
Scalability
online front-ends
security of data
Servers
space-efficient filter cascade data structure
SSL certificate revocations
SSL revocation checking
SSL Trust Models
TLS certificate revocations
TLS revocation checking
Transport Layer Security
University of Michigan
data structures
Browsers
certificate transparency
client-server systems
CRL
CRL checking
CRLite servers
CRLs
CRLSet
Cryptography
data privacy
Bloom filter
fail-closed security posture
Firefox
Google Certificate Transparency
Human behavior
internet
Metrics
OCSP
OCSP checking
OCSP Stapling
OneCRL
1
2
next ›
last »