Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cross Layer Security
biblio
NeuroAttack: Undermining Spiking Neural Networks Security through Externally Triggered Bit-Flips
Submitted by aekwall on Thu, 05/13/2021 - 11:32am
Hardware
Spiking Neural Networks
SNN
security
Resiliency
resilience
Reliability
pubcrawl
policy-based governance
Metrics
machine learning
Cross Layer Security
fault-injection attacks
DNN
deep neural networks
cyber physical systems
cross-layer
Biological system modeling
Biological neural networks
Artificial Neural Networks
adversarial attacks
biblio
Denoising and Verification Cross-Layer Ensemble Against Black-box Adversarial Attacks
Submitted by aekwall on Mon, 09/21/2020 - 3:36pm
adversarial inputs
Cross Layer Security
verification cross-layer ensemble
unsupervised model
supervised model verification ensemble
representative attacks
noise reduction
MODEF
Manifolds
ensemble diversity
ensemble defense
defense-attack arms race
defense success rates
cross-layer model diversity ensemble framework
black-box adversarial attacks
benign inputs
security of data
adversarial deep learning
composability
DNNs
adversarial examples
machine learning tasks
deep neural networks
Predictive models
testing
Training
Neural networks
neural nets
Robustness
pubcrawl
Resiliency
learning (artificial intelligence)
biblio
Triple-Layer Image Security Using a Zigzag Embedding Pattern
Submitted by aekwall on Mon, 09/21/2020 - 3:36pm
normal cross correlation
cover image
cryptographic nature
high capacity
histogram analysis
image fidelity
least significant bit-embedding
LSB steganography
mean square error
message security scheme
chaotic logistic map encryption
peak signal to noise ratio
secure layer
steganographic nature
structural similarity index metric
triple-layer image security
zigzag
zigzag embedding pattern
zigzag pattern
Cross Layer Security
AES
encryption
security
Resiliency
pubcrawl
Logistics
Image color analysis
Measurement
image colour analysis
chaotic communication
Cryptography
mean square error methods
secret data
Steganography
secret message
composability
2D image steganography technique
AES-128 encryption
chaotic logistic map
biblio
Failure Disposal by Interaction of the Cross-Layer Artificial Intelligence on ONOS-Based SDON Platform
Submitted by aekwall on Mon, 09/21/2020 - 3:36pm
Artificial Intelligence
Cross Layer Security
software defined optical network
Open Network Operating System
ONOS-based SDON platform
failure disposal
cross-layer artificial intelligence
control layer
AI engines
composability
telecommunication control
software defined networking
Engines
optical fibre networks
Optical fiber networks
data layer
Databases
optimization
pubcrawl
Resiliency
feature extraction
biblio
ForeSee: A Cross-Layer Vulnerability Detection Framework for the Internet of Things
Submitted by aekwall on Mon, 09/21/2020 - 3:35pm
IoT privacy
composability
catastrophic accidents
corresponding graph-based analysis
cross-layer formal framework
cross-layer vulnerability detection framework
design flaws
device firmware
ForeSee
high-level decision-making processes
network protocols
long sequence
low-level physical surroundings
Multiple layer
multiple layers
physical environment
potential attack paths
severe threats
system configurations
Cross Layer Security
Intrusion Detection
Internet of Things
IoT devices
Internet of Things (IoT)
Resiliency
pubcrawl
graph theory
Protocols
Vulnerability Analysis
Decision Making
security of data
firmware
IoT security
vulnerability detection
cyber security
security issues
IoT systems
attack graph
Internet-of-Things devices
model checking
biblio
MAC-PRY Cross-Layer Design for Secure Wireless Avionics Intra-Communications
Submitted by aekwall on Mon, 09/21/2020 - 3:35pm
MIMO communication
Cross Layer Security
wireless networks on-board aircraft
WAICs technology
system design complexity
standard technologies
secure wireless avionics intra-communications
radioaltimeters
physical cross-layer security design
multiple-input multiple-output systems
Medium Access Control
MAC-PRY cross-layer design
internal aeronautics bus technologies
composability
aircraft communication
telecommunication security
wireless technology
Aircraft
access protocols
radiofrequency interference
avionics
Aerospace electronics
Wireless communication
Communication system security
wireless sensor networks
pubcrawl
Resiliency
computer architecture
security
biblio
XLF: A Cross-layer Framework to Secure the Internet of Things (IoT)
Submitted by aekwall on Mon, 09/21/2020 - 3:35pm
IoT systems
Cross Layer Security
XLF
unprecedented opportunities
pervasive IoT applications
paramount threats
cross-layer framework
cross-layer approach
Cross Layer
comprehensive protection
composability
IoT
privacy
batteries
pubcrawl
Resiliency
Protocols
security
Hardware
Internet of Things
Cloud Computing
security of data
biblio
Joint PHY/MAC Layer AN-Assisted Security Scheme in SVD-Based MIMO HARQ system
Submitted by aekwall on Mon, 09/21/2020 - 3:35pm
MIMO HARQ system
cross-layer security design
data rate performance
data rates
explosive data growth
HARQ protocol
high data rate requirement
joint PHY/MAC layer AN-assisted security scheme
low data rates
artificial noise design
multiple input multiple output hybrid automatic retransmission request system
parallel subchannels
singular value decomposition
SVD
SVD-based MIMO HARQ system
transmitting antennas
Cross Layer Security
telecommunication security
composability
Automatic repeat request
MIMO communication
receiving antennas
Cross-Layer Security
fading channels
access protocols
artificial noise
wireless channels
Internet of Things
5G mobile communication
pubcrawl
Resiliency
information security
security
biblio
Multiple Layered Security Analyses Method for Cryptocurrency Exchange Servicers
Submitted by aekwall on Mon, 09/21/2020 - 3:35pm
malicious attacks
telecommunication security
static analysis
smartphone apps
smart phones
Semantics
semantic analysis
security
Resiliency
pubcrawl
multiple layered security analyses method
Androids
internet
Humanoid robots
dynamic analysis
cryptocurrency exchangers
cryptocurrency exchange servicers
cryptocurrency
cryptocurrencies
Cross Layer Security
composability
business trading
biblio
Towards Achieving a Secure Authentication Mechanism for IoT Devices in 5G Networks
Submitted by aekwall on Mon, 03/16/2020 - 10:34am
Internet of Things
telecommunication security
security mechanisms
secure authentication mechanism
Scalable Security
Scalability
pubcrawl
NB-IOT
Narrowband IoT
mobile network infrastructure
Mobile Identity Management
message authentication
IoT security
IoT platform
IoT device
composability
Identity provider
Identity management
edge computing
Cross-Layer Security
Conferences
Computer crime
Cloud Computing
cellular radio
cellular network architecture
cellular IoT
5G networks
5G mobile communication
Cross Layer Security
Resiliency
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »