Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cats
biblio
Two-level chaotic system versus non-autonomous modulation in the context of chaotic voice encryption
Submitted by grigby1 on Thu, 06/30/2022 - 5:05pm
Metrics
voice encryption
Non-autonomous modulation
Multilevel Chaotic Security
Lorenz system
Arnold cat map
chaotic cryptography
modulation
Receivers
Ciphers
Cats
real-time systems
chaotic communication
Scalability
Resiliency
resilience
pubcrawl
encryption
biblio
An Implicit Approach for Visual Data: Compression Encryption via Singular Value Decomposition, Multiple Chaos and Beta Function
Submitted by grigby1 on Mon, 03/14/2022 - 12:23pm
Metrics
singular value decomposition
logistic map
Compression
Beta Function
Arnold cat map
digital images
Image coding
visualization
Reliability
encryption
Policy Based Governance
Safe Coding
Cats
chaotic communication
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
biblio
Cops-Ref: A New Dataset and Task on Compositional Referring Expression Comprehension
Submitted by aekwall on Tue, 06/01/2021 - 1:19pm
Cats
cognition
composability
Compositionality
Engines
Genetic expression
pubcrawl
Semantics
Task Analysis
visualization
biblio
BackFlow: Backward Edge Control Flow Enforcement for Low End ARM Microcontrollers
Submitted by aekwall on Mon, 03/15/2021 - 12:08pm
program compilers
STM32 NUCLEO F446RE microcontroller
memory safety
memory corruptions
low-end ARM Cortex-M microprocessors
compiler-based toolchain
Clang/LLVM compiler
Cats
backward edge control flow integrity
BackFlow
ARM instruction set
Europe
compiler security
compiler
Safety
Instruction sets
CFI
Compositionality
storage management
Benchmark testing
program diagnostics
microcontrollers
computer security
automation
Metrics
pubcrawl
Resiliency
Scalability
biblio
Analyzing Variation Among IoT Botnets Using Medium Interaction Honeypots
Submitted by grigby1 on Tue, 03/09/2021 - 2:23pm
IoT Botnets
time 40.0 d
Strain
Servers
Resiliency
resilience
pubcrawl
password
near-identical malicious login sessions
multiple botnet deployments
mirai
Metrics
medium interaction honeypots
malware
malicious sessions
analyzing variation
invasive software
Internet of Things
honeypot configuration
honeypot
dominant botnet software
Cowrie
computer network security
Computer crime
composability
common attack patterns
Cats
botnets
botnet malware strains
botnet
biblio
Black Box Explanation Guided Decision-Based Adversarial Attacks
Submitted by grigby1 on Fri, 09/04/2020 - 4:10pm
Training data
Black Box Security
targeted deep neural networks
performing decision-based black-box attacks
imperceptive adversarial perturbation
imperceptible adversarial example
derivative-free and constraint optimization problem
decision-based black-box adversarial attack
decision-based adversarial attacks
Constraint optimization
boundary attack
black box explanation guided decision-based adversarial attacks
black box explanation
attack efficiency
artificial intelligence security
Logistics
Cryptography
Perturbation methods
neural nets
Neural networks
learning (artificial intelligence)
resilience
Resiliency
Metrics
composability
pubcrawl
search problems
Artificial Intelligence
optimisation
telecommunication security
Cats
Computational modeling
biblio
CapExec: Towards Transparently-Sandboxed Services
Submitted by grigby1 on Fri, 03/27/2020 - 11:37am
tools
collaboration
security
pubcrawl
policy-based governance
composability
Runtime
Libraries
Memory management
application security
Capsicum
Cats
compartmentalization
Containers
sandboxing
service manager
biblio
Initial Validation of the Cybersecurity Concept Inventory: Pilot Testing and Expert Review
Submitted by grigby1 on Wed, 03/18/2020 - 11:51am
Instruments
tools
Science of Security
Scalability
Resiliency
resilience
Reliability
pubcrawl
Policy-Governed Secure Collaboration
Metrics
Interviews
assessment validation.
Human behavior
education
cybersecurity education
Cybersecurity Concept Inventory (CCI)
Cybersecurity Assessment Tools (CATS) Project
computer security
composability
collaboration
Cats
biblio
Efficient tamper-evident logging of distributed systems via concurrent authenticated tree
Submitted by grigby1 on Thu, 08/23/2018 - 11:57am
Merkle history tree
Chameleon hash
chameleon hashing
concurrent authenticated tree
Concurrent Authentication
concurrent large-scale log streams
cryptographic hashing
discrete log
highly concurrent scale log streams
large-scale distributed applications
large-scale distributed systems
log data
log management tools
logarithmic number
Cats
Merkle-tree approach
providing security
public verifiability
resource-constrained systems
secure audit logging schemes
Secure logging
secure logging system
security community
space-efficiency
tamper-evident logging
tree data structures
untrusted machine
History
Concurrency
cyber-physical systems
pubcrawl
composability
Cryptography
system monitoring
distributed processing
Servers
authentication
Analytical models
tools
data structure
data structures
security
resilience
data integrity
Metrics
program verification
Resiliency
forward security
integrity verification
digital signatures
distributed system
integrity
concurrency control
audit logs
biblio
Reversible Chaotic Encryption Techniques For Images
Submitted by grigby1 on Wed, 12/27/2017 - 1:09pm
Image Processing
UACI
tent map
Signal processing algorithms
signal processing
reversible chaotic encryption technique
Resiliency
pubcrawl
PSNR
pixel shuffling
NPCR
MSE
Metrics
Logistics
logistic map
Arnold cat map
image pixels
image encryption security
image encryption
encryption
Cryptography
composability
civilian systems
Chaotic techniques
Chaotic maps
chaotic cryptography
chaotic communication
Cats
Arnold's cat map