Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Limiting
biblio
Resisting Distributed Backdoor Attacks in Federated Learning: A Dynamic Norm Clipping Approach
Submitted by grigby1 on Tue, 04/12/2022 - 12:19pm
Training data
dynamic norm clipping
distributed backdoor attacks
Limiting
Resists
Data Sanitization
federated learning
Collaborative Work
Distributed databases
Training
Compositionality
composability
Big Data
privacy
Resiliency
resilience
Human behavior
pubcrawl
biblio
A Web Application for Prevention of Inference Attacks using Crowd Sourcing in Social Networks
Submitted by grigby1 on Tue, 04/12/2022 - 12:19pm
Compositionality
inference attacks
data loss
Adaptive based algorithms
Limiting
social networks
Data Sanitization
education
social networking (online)
Clustering algorithms
Peer-to-peer computing
Crowd Sourcing
Classification algorithms
composability
privacy
Resiliency
resilience
Human behavior
pubcrawl
biblio
QoE-aware Data Caching Optimization with Budget in Edge Computing
Submitted by grigby1 on Mon, 01/31/2022 - 5:42pm
edge computing
QoE aware data caching
multiple knapsack problem
Limiting
Costs
budget constraint
approximate algorithm
user experience
Web Caching
Servers
quality of experience
quality of service
web services
Scalability
Resiliency
resilience
Metrics
pubcrawl
biblio
IoT Standard Platform Architecture That Provides Defense against DDoS Attacks
Submitted by grigby1 on Tue, 01/11/2022 - 10:35am
OCF
zero trust
Time measurement
Scalability
Resiliency
resilience
pubcrawl
Protocols
performance evaluation
attack surface
Metrics
Limiting
IoT security
IoT network security
denial-of-service attack
DDoS Attack
Conferences
Computer hacking
biblio
Unveiling MIMETIC: Interpreting Deep Learning Traffic Classifiers via XAI Techniques
Submitted by grigby1 on Wed, 12/22/2021 - 12:54pm
deep learning
encrypted traffic
explainable artificial intelligence
internet
law enforcement
learning (artificial intelligence)
Limiting
Mobile Applications
Mobile handsets
Multimodal learning
pubcrawl
resilience
Resiliency
Scalability
Traffic classification
xai
biblio
SAM: The Sensitivity of Attribution Methods to Hyperparameters
Submitted by aekwall on Thu, 05/13/2021 - 11:49am
Human behavior
pubcrawl
composability
Metrics
Robustness
attribution
Noise measurement
Sensitivity
Heating systems
smoothing methods
Limiting
biblio
Enhanced dynamic cyber zone defense
Submitted by aekwall on Mon, 07/27/2020 - 12:12pm
intrusion tolerance
simulation
security of data
security
Runtime
Resiliency
pubcrawl
moving target defense
Limiting
Laboratories
Intrusion Tolrance
intrusion tolerance technique
Algorithm
information security
Heuristic algorithms
dynamic cyber zone defense
discrete-time simulation
cyber systems
cyber incidents
computer security
composability
Complexity theory
collaboration zones
biblio
Vulnerability analysis and consequences of false data injection attack on power system state estimation
Submitted by K_Hooper on Wed, 04/04/2018 - 9:59am
nonlinear system model
vulnerability detection
Vulnerability Analysis
state estimation
Resiliency
pubcrawl
power transmission lines
power system state estimation
power system security
physical line
optimization
AC state estimation
Metrics
Load modeling
Load flow
Limiting
Human behavior
FDI attack
false data injection attack
DC optimal power flow
Compositionality
bi-level optimization problem
biblio
Designing a Micro-moving Target IPv6 Defense for the Internet of Things
Submitted by grigby1 on Tue, 01/16/2018 - 6:31pm
Metrics
testing
sensors
Resiliency
Reconnaissance
pubcrawl
Protocols
optimization
moving target defense
micromoving target IPv6 defense
Cooja simulation configuration
Limiting
IP networks
IoT devices
IoT
Internet of Things
internet
hardware testing
embedded systems
cyber security
biblio
Contiki-based mitigation of UDP flooding attacks in the Internet of things
Submitted by grigby1 on Tue, 01/16/2018 - 6:27pm
composability
Computer crime
Contiki
Cooja Simulator
DDoS attack mitigation
Floods
Human behavior
ICMP
IEEE 802.15 Standard
Internet of Things
Limiting
Metrics
Protocols
pubcrawl
Resiliency
UDP flood
« first
‹ previous
1
2
3
next ›
last »