Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
adaptive adversaries
biblio
PUF Modeling Attack using Active Learning
Submitted by grigby1 on Mon, 01/21/2019 - 12:39pm
learning efficiency
uncertainty
Training
state-of-the-art attacking methods
security
secure hardware systems
Scalability
Resiliency
PUF modeling attack
pubcrawl
physical unclonable function modeling attack
passive learning
Noise measurement
Metrics
active learning techniques
learning (artificial intelligence)
intelligent adversaries
Human behavior
hardware security techniques
hardware security field
Hardware
delays
Cryptography
CRP
Computational modeling
challenge-response pair
Adversary Models
adaptive adversaries
biblio
Mechanizing the Proof of Adaptive, Information-Theoretic Security of Cryptographic Protocols in the Random Oracle Model
Submitted by grigby1 on Wed, 01/10/2018 - 12:20pm
pubcrawl
information-theoretic security
Metrics
multiparty cryptographic protocols
nonprogrammable random choices
oracle knowledge
party private count retrieval protocol
Policy
Protocols
information theoretic security
random oracle model
real-ideal paradigm
Resiliency
Scalability
security of data
Servers
Upper bound
adaptive adversaries
human factor
Human behavior
honest-but-curious security
games approach sequence
Games
game theory
game parameters
EASYCRYPT proof assistant
Databases
Cryptography
Cryptographic Protocols
concrete upper bounds
composability
Complexity theory
collaboration
biblio
Moving target defense for adaptive adversaries
Submitted by Heather Lucas on Wed, 09/17/2014 - 6:33pm
moving target defense
Unsolicited electronic mail
Training
Switches
standard static methods
security problems
security of data
security applications
security
reverse-engineer
reverse engineering
performance evaluation
adaptive adversaries
ML algorithms
malicious activities
machine learning
learning (artificial intelligence)
innocent activities
hybrid dynamical systems
Games
flexible MT defense strategy
cyber security
Biological system modeling
algorithm performance degradation
file
Predictive Moving Target Defense
Submitted by adyson on Tue, 05/29/2012 - 2:58pm. Contributors:
Richard Colbaugh
Kristin Glass
adaptive adversaries
cyber security.
game theory
machine learning
moving target defense
New Mexico Institute of Mining and Technology
predictive defense
Sandia National Laboratories
Academia
Conference paper
MTRS 2012 Presentations