Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
sybil attacks
biblio
Evading Classifiers by Morphing in the Dark
Submitted by K_Hooper on Wed, 05/02/2018 - 9:41am
composability
evasion attacks
machine learning
Metrics
pubcrawl
Resiliency
sybil attacks
biblio
SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities
Submitted by K_Hooper on Wed, 05/02/2018 - 9:40am
algorithmic complexity attacks
composability
DoS attacks
fuzzing
Metrics
pubcrawl
Resiliency
resource exhaustion attacks
sybil attacks
biblio
DPS-Discuss: Demonstrating Decentralized, Pseudonymous, Sybil-resistant Communication
Submitted by K_Hooper on Wed, 05/02/2018 - 9:40am
bitcoin
censorship
composability
Metrics
Pseudonymity
pubcrawl
Resiliency
sybil attacks
Sybil-Resistance
Tor
biblio
FruitChains: A Fair Blockchain
Submitted by K_Hooper on Wed, 05/02/2018 - 9:40am
blockchains
composability
distributed consensus
fairness
Metrics
Nash Equilibrium
pubcrawl
Resiliency
sybil attacks
biblio
Solving Sybil Attacks Using Evolutionary Game Theory
Submitted by grigby1 on Wed, 05/17/2017 - 12:36pm
composability
Evolutionary Game Theory
evolutionary stable strategies
Metrics
pubcrawl
recommender systems
replicator dynamics
Resiliency
Sybil attack
sybil attacks
biblio
Sybil Detection Using Latent Network Structure
Submitted by grigby1 on Wed, 05/17/2017 - 12:36pm
complex contagion
composability
edge detection
latent social network
Metrics
network accountability
provable security
pubcrawl
Resiliency
security
Sybil attack
sybil attacks
biblio
Defending Against Sybil Devices in Crowdsourced Mapping Services
Submitted by grigby1 on Wed, 05/17/2017 - 12:36pm
composability
Compositionality
crowdsourcing
edge detection
Human behavior
location privacy
Metrics
mobile maps
pubcrawl
Resiliency
security
Sybil attack
sybil attacks
wireless networks
« first
‹ previous
1
2
3
4
5
6
7