Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data Exfiltration
biblio
On Securing MAC Layer Broadcast Signals Against Covert Channel Exploitation in 5G, 6G & Beyond
Submitted by grigby1 on Fri, 05/19/2023 - 2:26pm
covert channel
random hashing
MAC layer security
Downlink
6G
Resiliency
5G security
Media Access Protocol
Data Exfiltration
covert channels
security
machine-to-machine communications
resilience
Compositionality
Protocols
5G mobile communication
Scalability
performance evaluation
pubcrawl
biblio
Data Exfiltration: Methods and Detection Countermeasures
Submitted by grigby1 on Thu, 10/20/2022 - 4:00pm
composability
steganography detection
network intrusion detection
Steganography
cyberattack
Data Exfiltration
countermeasures
timing
Measurement
IP networks
Planning
intrusion detection system
telecommunication traffic
privacy
Instruments
security
Metrics
pubcrawl
biblio
Multilayer Data-Driven Cyber-Attack Detection System for Industrial Control Systems Based on Network, System, and Process Data
Submitted by grigby1 on Fri, 09/18/2020 - 2:07pm
early attack detection
regression analysis
network traffic data
false data injection attacks
Data Exfiltration
Informatics
cyber-attack detection
data diodes
data-driven monitoring
defense-in-depth
cyber attack
host system data
Industrial Control System (ICS)
intrusion detection results
motivated attackers
multiple-layer data-driven cyber-attack detection system
physical system
physically impactful cyber attacks
command injection attacks
integrated circuits
cyber-physical systems
pubcrawl
resilience
Resiliency
computer network security
Analytical models
Data models
industrial control
Monitoring
Industrial Control Systems
network data
composability
DoS attacks
computer security
malware
Metrics
cyber threats
biblio
Bridging The Gap: Data Exfiltration In Highly Secured Environments Using Bluetooth IoTs
Submitted by grigby1 on Fri, 09/04/2020 - 4:25pm
malicious actor
covert
data
Data Exfiltration
exfiltration
free-space optical communication
highly secured network
home networks
Image color analysis
insecure IoT
IoT
Chromium
professional networks
security measures
security standard
sensitive environments
smart bulb
strict security policies
unprecedented threats
web bluetooth api
Cyber Physical System
bluetooth security
sensitive information
Internet of Things
security
computer network security
invasive software
pubcrawl
composability
Resiliency
resilience
Human behavior
IoT devices
Cryptography
Software
cyber physical systems
Payloads
Browsers
botnets
air gapped network
Bluetooth
Bluetooth IoT
Bluetooth smart bulb
biblio
Bridging The Gap: Data Exfiltration In Highly Secured Environments Using Bluetooth IoTs
Submitted by grigby1 on Fri, 08/07/2020 - 3:38pm
invasive software
unprecedented threats
strict security policies
Software
sensitive information
sensitive environments
security standard
security measures
security
Science of Security
pubcrawl
professional networks
Payloads
malicious actor
IoT devices
IoT
air gapped network
Internet of Things
insecure IoT
Image color analysis
home networks
highly secured network
free-space optical communication
Data Exfiltration
Cryptography
computer network security
Browsers
botnets
Bluetooth smart bulb
Bluetooth IoT
Bluetooth
biblio
Covert Data Exfiltration Using Light and Power Channels
Submitted by grigby1 on Thu, 07/16/2020 - 12:17pm
Internet of Things
standard off-the-shelf smart bulbs
Scalability
RGB LED
Resiliency
resilience
pubcrawl
Power covert channels
power channels
Optical covert channels
myriad security risks
light emitting diodes
IoT
Air gapped networks
free-space optical communication
exfiltration attacks
embedded security
Data Exfiltration
covert data exfiltration
covert channels
covert channel communications
computer network security
Compositionality
composability
Bluetooth controlled light bulb
Bluetooth
biblio
LED Alert: Supply Chain Threats for Stealthy Data Exfiltration in Industrial Control Systems
Submitted by grigby1 on Wed, 02/26/2020 - 4:41pm
programmable logic controller
Kernel
LED alert
light emitting diodes
Measurement
Metrics
operation technology
persistent threats
privacy
programmable controllers
invasive software
pubcrawl
real-time operation
Smart Systems
supply chain attack
supply chain security
supply chain threats
supply chains
threat vectors
Trojan horses
embedded systems
attack vector
computer security
Air gaps
CPU performance
cyber domain
Data Exfiltration
device tree
direct memory access
DMA transfer speed
anomaly detection techniques
Embedded Systems Security
firmware
firmware modification
firmware trojan
Hardware
industrial control
Industrial Control Systems
industrial domain
industrial Internet-of-Things
biblio
DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting
Submitted by grigby1 on Wed, 11/28/2018 - 2:08pm
Anomaly Detection
Application Fingerprinting
composability
cyber physical systems
Data Exfiltration
data leakage
False Data Detection
Human behavior
network security
pubcrawl
resilience
Resiliency
biblio
A Subliminal Channel in EdDSA: Information Leakage with High-Speed Signatures
Submitted by grigby1 on Fri, 09/28/2018 - 3:12pm
resilience
network security
cyber-physical systems
pubcrawl
Scalability
digital signatures
Information Leakage
network protocols
censorship circumvention
Data Exfiltration
ed25519
eddsa
Information hiding
subliminal channels
biblio
Correlating cyber incident information to establish situational awareness in Critical Infrastructures
Submitted by grigby1 on Mon, 11/27/2017 - 12:30pm
feature extraction
vulnerability detection
text analysis
security information correlation
security
Resiliency
pubcrawl
Metrics
Mathematical model
Joining processes
information correlation
Human Factors
Human behavior
Compositionality
Europe
Data Exfiltration
cyber situational awareness
cyber incidents handling
cyber incident information correlation
cyber attack
critical infrastructures
Critical Infrastructure Protection
critical infrastructure
Correlation
computer network security
1
2
next ›
last »