Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
countermeasures
biblio
Data Exfiltration: Methods and Detection Countermeasures
Submitted by grigby1 on Thu, 10/20/2022 - 3:00pm
composability
steganography detection
network intrusion detection
Steganography
cyberattack
Data Exfiltration
countermeasures
timing
Measurement
IP networks
Planning
intrusion detection system
telecommunication traffic
privacy
Instruments
security
Metrics
pubcrawl
biblio
Security Decision Support in the Control Systems based on Graph Models
Submitted by grigby1 on Fri, 08/26/2022 - 2:06pm
Complexity theory
technical systems
response against violations
graph
countermeasure model
Control Theory
control
decision support
countermeasures
forecasting
information security
control systems
Decision Making
Scalability
Resiliency
Human Factors
Human behavior
pubcrawl
security
biblio
Securing AES against Localized EM Attacks through Spatial Randomization of Dataflow
Submitted by grigby1 on Fri, 09/04/2020 - 3:16pm
Power Attacks
fully controlled access
generic attack
high resolution EM probes
high-performance implementation
localized electromagnetic attack
localized EM attacks
minimum traces to disclosure
permutation network
potent threat
fixed S-box
profiled attack
randomization results
Semiconductor device measurement
side-channel attacks
spatial randomization
state register byte
transient random value
black box encryption
AES
encryption
Information Leakage
pubcrawl
composability
Metrics
Resiliency
resilience
sensitive data
Registers
Cryptography
Probes
black-box model attack
countermeasures
dataflow
datapath components
dynamic random mapping
embedded cryptographic implementations
exploitable leakage
biblio
Privacy and Security of Big Data in AI Systems: A Research and Standards Perspective
Submitted by grigby1 on Fri, 08/07/2020 - 2:48pm
countermeasures
Standards Developing Organizations
security of data
security
SDOs
Resiliency
privacy
IEC standards
Human behavior
defense strategies
data privacy
Data models
big data privacy
big data security
Big Data
artificial intelligence systems
Artificial Intelligence
AI systems developments
AI
Metrics
Scalability
resilience
Human Factors
pubcrawl
biblio
Intrusion Detection System Based RPL Attack Detection Techniques and Countermeasures in IoT: A Comparison
Submitted by grigby1 on Mon, 06/01/2020 - 2:58pm
Scalability
resilience
Resiliency
Routing
Routing protocols
RPL
RPL attack detection techniques
RPL based loT
RPL based routing attacks
rank attack
security
security of data
source routing protocol
Topology
version attack
Wormhole
wormhole attack
Intrusion Detection
Blackhole
Blackhole attack
computer network security
Conferences
countermeasures
IDS
IDS research contribution techniques
Internet of Things
attacks
intrusion detection system
IoT
knowledge driven approach
lightweight routing protocol stack
LLN
low power lossy networks
pubcrawl
biblio
An Attack Scenario and Mitigation Mechanism for Enterprise BYOD Environments
Submitted by aekwall on Mon, 06/10/2019 - 9:17am
attack mitigation
bring your own device (BYOD)
composability
countermeasures
BYOD
data leakage
enterprise networks
Internet of Things (IoT)
MANET Attack Mitigation
Metrics
pubcrawl
Resiliency
rogue access point
security
smartwatch
wi-fi direct printers
file
A Verifiable Framework for Cyber-Physical Attacks and Countermeasures in a Resilient Electric Power Grid
Submitted by lalithasankar on Mon, 12/17/2018 - 12:53pm. Contributors:
Lalitha Sankar
Oliver Kosut
Kory Hedman
Cybersecurity
electric power grid
countermeasures
load redistribution unobservable attacks
Session 12: LT
1449080
CPS-PI Meeting 2018
2018
Presentation
biblio
Cryptanalysis and Countermeasures on Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage
Submitted by K_Hooper on Wed, 05/09/2018 - 9:56am
outsourcing data services
security shortage
security problems
Security Audits
Security analysis
Secure storage
secure cloud storage
Scalability
Resiliency
Public key
public integrity auditing
public auditing scheme
public auditing
pubcrawl
Privacy-preserving
Cloud Computing
outsourcing
Mathematical model
low computational audit cost
integrity
Human behavior
Forgery
dynamic-hash-table based public auditing
dynamic hash table
dynamic data
data structure DHT
data blocks
Cryptography
cryptanalysis
countermeasures
biblio
Exploiting Fully Integrated Inductive Voltage Regulators to Improve Side Channel Resistance of Encryption Engines
Submitted by grigby1 on Mon, 11/13/2017 - 10:55am
countermeasures
Integrated Voltage Regulators
Metrics
pubcrawl
Resiliency
Scalability
security
side channel attacks
Time Frequency Analysis
biblio
Compilation of a Countermeasure Against Instruction-Skip Fault Attacks
Submitted by K_Hooper on Fri, 10/13/2017 - 9:33am
AES
compiler
countermeasures
Fault Attacks
LLVM
Metrics
pubcrawl
Resiliency
scalabilty
Securing Compilers
1
2
next ›
last »