Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
microsoft windows
biblio
Multi-format speech perception hashing based on time-frequency parameter fusion of energy zero ratio and frequency band variance
Submitted by grigby1 on Fri, 12/11/2020 - 2:43pm
resilience
time-frequency parameter fusion
time-frequency features
Time-frequency Analysis
Time Frequency Analysis
speech signal processing
Speech recognition
speech processing
speech content authentication
sensor fusion
security
Scalability
Robustness
Resiliency
Cryptography
pubcrawl
perceptual hash
multiformat speech perception hashing
microsoft windows
Metrics
message authentication
mean filtering
Libraries
key dependence
hash sequence security
frequency band variance
feature extraction
energy zero ratio
biblio
Optimized Time-Frequency Processing Dedicated to the Detection of Jamming Attacks on Wi-Fi Communications
Submitted by grigby1 on Fri, 12/11/2020 - 2:42pm
resilience
wireless LAN
Wireless fidelity
wireless communication network
Wi-Fi communication signals
Time-frequency Analysis
Time Frequency Analysis
telecommunication security
specific signal processing
signal processing
security
Scalability
Resiliency
attacks
reception stage
pubcrawl
optimized time-frequency processing
OFDM
microsoft windows
Metrics
jamming signals
Jamming
IEEE 802.11n Standard
convolution
communication terminal
biblio
Robust Nash Static Output Feedback Strategy for Uncertain Markov Jump Delay Stochastic Systems
Submitted by grigby1 on Wed, 12/02/2020 - 2:02pm
microsoft windows
uncertain systems
uncertain Markov jump delay stochastic systems
stochastic systems
Scalability
Robustness
robust Nash static output feedback strategy
robust control
Resiliency
resilience
pubcrawl
Output feedback
active queue management
Markov processes
linear matrix inequalities
game theory
feedback
delays
delay systems
cross coupled stochastic matrix inequalities
coupled congestion control
Congestion Control
algebraic equations
biblio
Towards Efficient Malware Detection and Classification using Multilayered Random Forest Ensemble Technique
Submitted by grigby1 on Thu, 10/29/2020 - 11:12am
malware authors
Vision-based malware analysis
traditional malware
Resiliency
resilience
pubcrawl
privacy
pattern classification
multilayered random forest ensemble technique
microsoft windows
Metrics
malware patterns
malware images
malware detection
malware classification
Adaptation models
malware
learning (artificial intelligence)
invasive software
hybrid model
Human behavior
Gray-scale
Forestry
feature extraction
Ensemble forest
deep neural networks
deep learning models
cyber security
Computational modeling
biblio
Insights into Malware Detection via Behavioral Frequency Analysis Using Machine Learning
Submitted by aekwall on Mon, 10/26/2020 - 12:11pm
known malware
malicious software
malicious activity
Microsoft Windows (operating systems)
machine learning models
behavioral frequency analysis
benign software
common defenses
common malware defenses
dynamic behavioral analysis
Predictive Metrics
Malware Behavioral Analysis
malware signature classifier
malware threat landscape
signature catalog
unknown malware
Windows API system function calls
zero-day
zero-day vulnerabilities
Metrics
malware detection
invasive software
machine learning algorithms
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
machine learning
malware
pattern classification
Analytical models
privacy
microsoft windows
Malware Analysis
application program interfaces
dynamic analysis
Software algorithms
biblio
Linux Security: A Survey
Submitted by aekwall on Mon, 10/26/2020 - 11:46am
password
Linux Operating System Security
Linux security
firewall security
file permissions
File
antivirus
firewall
Predictive Metrics
microsoft windows
authorisation
Business
Metrics
composability
pubcrawl
Resiliency
Linux
invasive software
security
malware
biblio
Security Flaws of Operating System Against Live Device Attacks: A case study on live Linux distribution device
Submitted by aekwall on Mon, 10/26/2020 - 11:45am
data tampering
Linux Operating System Security
Universal Serial Bus
software portability
security and privacy
portability
permanent record deletion
operating systems
operating system security flaws
live Linux distribution device
Live Devices
live device attacks
Linux operating system
security of data
Insider Threats
Predictive Metrics
File systems
microsoft windows
data theft
Metrics
composability
pubcrawl
Resiliency
Linux
mobile computing
security
biblio
TVis: A Light-weight Traffic Visualization System for DDoS Detection
Submitted by grigby1 on Tue, 10/06/2020 - 1:41pm
pubcrawl
low-rate attacks
microsoft windows
Monitoring
network defenders
network size
network traffic
networked computers
offline modes
online and offline
light-weight traffic visualization system
resilience
Resiliency
telecommunication traffic
time 5.0 s
triangle-area
TVis
undirected graph
visual observations
visualization
external network traffic
anomaly detection system
Computer crime
computer network security
Computing Theory
data visualisation
Data visualization
DDoS Attack
denial-of-service attack
distributed DoS attacks
acute attacks
graph theory
Heron's triangle-area mapping
high-rate DDoS detection
highrate DDoS attacks
interactive visualization system
internal network traffic
internet
IP networks
biblio
A Novel Approach of Unprivileged Keylogger Detection
Submitted by grigby1 on Fri, 09/04/2020 - 3:17pm
Keyboards
BIOS Security
userspace keylogger detection
unprivileged keylogger detection
surveillance software
spyware
privileged
operating system kernels
monitoring software
malware packages
keystroke simulation
keystroke logger
Keylogger userspace
Kernel keylogger
confidential data stealing
authorisation
microsoft windows
Human Factors
Kernel
Computers
resilience
Resiliency
Metrics
pubcrawl
mobile computing
security
invasive software
Scalability
Monitoring
biblio
Security validation testing environment in the cloud
Submitted by grigby1 on Fri, 08/28/2020 - 3:54pm
microsoft windows
big data security metrics
security validation testing environment
MS Azure
log analysis
cybersecurity vulnerabilities
resilience
Proposals
cloud environment
tools
computer security
Scalability
Resiliency
pubcrawl
Servers
Cloud Computing
security of data
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »