Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
covert channel
biblio
On the Distributed Jamming System of Covert Timing Channels in 5G Networks
Submitted by grigby1 on Wed, 02/10/2021 - 11:51am
covert channels
modulation method
modulation
jam system
interference algorithm
fifth generation mobile network
diversity reception
diversity networks
distributing jammer
distributed jamming system
co-constructing and sharing
5g network
5G mobile network
radiofrequency interference
Jamming
security
Interference
covert channel
covert timing channel
Transmitters
timing
Compositionality
network security
5G mobile communication
Scalability
telecommunication security
Resiliency
resilience
pubcrawl
Servers
biblio
CTRL-ALT-LED: Leaking Data from Air-Gapped Computers Via Keyboard LEDs
Submitted by grigby1 on Fri, 08/07/2020 - 2:38pm
optical equipment
light emitting diodes
light sensor
malicious insider
malware
Metrics
modern cyber-attack
modern USB keyboards
Network
Num-Lock
optical
optical communication
Keyboards
Optical sensors
pubcrawl
Receivers
remote cameras
resilience
Resiliency
Scroll-Lock
sensitive optical sensors
smart phones
Trusted Computing
Universal Serial Bus
CTRL-ALT-LED
Air gaps
air-gap
air-gapped computers
airgapped computers
bit rate 120.0 bit/s
bit rate 3000.0 bit/s
Cameras
Caps-Lock
composability
computer network security
covert channel
advanced persistent threat
data leakage prevention systems
evil maid attacks
exfiltrate data
exfiltration
firmware
Human behavior
Human Factors
invasive software
keyboard
keyboard LEDs
biblio
Research on Time Concealed Channel Technology of Cloud Computing Platform Based on Shared Memory
Submitted by grigby1 on Thu, 07/16/2020 - 11:18am
pubcrawl
Virtualization
Virtual machining
time-covert channels
time concealed channel technology
shared memory time covert channels
shared memory systems
shared memory
security of data
security issues
security
Scalability
Resiliency
resilience
Analytical models
interference methods
Interference
Entropy
data leakage
covert channels
covert channel interference
covert channel detection
covert channel
Compositionality
composability
cloud platform
cloud computing platform
Cloud Computing
biblio
Studied on Application of Double Encryption Algorithm in Covert Channel Transmission
Submitted by grigby1 on Thu, 09/05/2019 - 10:25am
intelligent mobile terminal
Transportation
transmission process
telecommunication security
symmetric encryption
smart cities
Security transmission
Scalability
RSA
resilience
mobile terminal data transmission
mobile intelligent terminal
mobile computing
asymmetric encryption algorithm
file transfer
double encryption algorithm
Double encryption
DES
Cryptography
covert transmission
covert channels
covert channel transmission
covert channel
Conferences
Compositionality
Big Data
biblio
Dummy Traffic Generation to Limit Timing Covert Channels
Submitted by grigby1 on Thu, 09/05/2019 - 10:24am
hidden communication
timing channel
timing
telecommunication traffic
security policy
Scalability
resilience
Receivers
IP timing covert channels
IP networks
Information Leakage
hidden transmit information
Bandwidth
Entropy
dummy traffic generation
dummy traffic
Cybersecurity
covert channels
covert channel capacity formula
covert channel
computer network security
Compositionality
channel capacity
biblio
Packet Length Covert Channel: A Detection Scheme
Submitted by grigby1 on Thu, 09/05/2019 - 10:24am
Scalability
packet length covert channel
packet radio networks
packet size covert channel
Prevention
Protocols
Receivers
Reliability
resilience
normal terrific
security
security attack
system security policies
telecommunication channels
telecommunication security
telecommunication traffic
undetectable network covert channels
elimination
Communication channels
Compositionality
content development
content-based features
covert channel
covert channels
covert traffic
detection
communication channel
feature extraction
frequency-based features
illegal information flow
learning (artificial intelligence)
machine learning
machine learning based detection scheme
network protocols
biblio
The Security Risks of Power Measurements in Multicores
Submitted by grigby1 on Mon, 06/17/2019 - 10:51am
capacity bound
covert channel
empirical study
Human Factors
Metrics
power
pubcrawl
resilience
Scalability
Security Risk Management
biblio
Securing Concurrent Lazy Programs Against Information Leakage
Submitted by grigby1 on Thu, 08/23/2018 - 10:57am
information-flow control tools
concurrency control
Agda proof assistant
concurrent lazy programs security
covert channel
functional languages
functional programming
Haskell libraries
IFC libraries
IFC tools
Information Leakage
lazy calculus
lazy evaluation
lazy languages
lazyDup
Message systems
noninterference
security library MAC
software libraries
Writing
data structures
Theorem Proving
Haskell
Concurrency
cyber-physical systems
pubcrawl
composability
security of data
data privacy
Sensitivity
security
program diagnostics
resilience
Metrics
Libraries
Lattices
timing
Resiliency
software tools
biblio
A New Data-Hiding Approach for IP Telephony Applications with Silence Suppression
Submitted by grigby1 on Tue, 05/01/2018 - 10:32am
composability
covert channel
Information hiding
Metrics
privacy
pubcrawl
Steganography
steganography detection
voice activity detection
VoIP
biblio
Covert Channel over Network Time Protocol
Submitted by grigby1 on Mon, 03/05/2018 - 12:23pm
covert channel
Human behavior
Human Factors
Metrics
NTP
peer to peer security
pubcrawl
resilience
Resiliency
Scalability
Storage channel
Time channel
« first
‹ previous
1
2
3
next ›
last »