Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Predictive Metrics
biblio
Cryptography by Synchronization of Hopfield Neural Networks that Simulate Chaotic Signals Generated by the Human Body
Submitted by aekwall on Tue, 09/08/2020 - 10:11am
chaotic communication
reconfigurable hardware
random number sequence
human body
Hopfield neural networks
Hopfield neural nets
encryption circuit
dynamic systems
chaotic synchronization
chaotic signal simulation
asymmetric cryptography method
reconfigurable architectures
chaotic cryptography
field programmable gate arrays
Predictive Metrics
Dynamical Systems
random number generation
Neural networks
Synchronization
synchronisation
composability
pubcrawl
Resiliency
information security
Cryptography
FPGA
biblio
LBM: A Security Framework for Peripherals within the Linux Kernel
Submitted by grigby1 on Fri, 09/04/2020 - 4:26pm
powerful filtering functionality
Linux (e)BPF modules
Linux kernel
Linux-Kernel
malicious peripherals
malicious USB
NFC devices
operating systems (computers)
OS software stacks
Peripheral
peripheral attack surface
Linux
Protocols
pubcrawl
resilience
Resiliency
security
Smartphones
standardized communication protocols
Universal Serial Bus
USB
cyber physical systems
Metrics
Predictive Metrics
Bluetooth
bluetooth security
composability
computer network security
computer peripheral equipment
Computer peripherals
Cyber Physical System
Linux Operating System Security
eBPF
eBPF packet filtering mechanism
external GPU
filtering theory
general security framework
host operating system
Human behavior
Kernel
LBM framework
biblio
Detecting DoS Attack in Smart Home IoT Devices Using a Graph-Based Approach
Submitted by aekwall on Mon, 08/17/2020 - 11:18am
graph-based outlier detection in Internet of Things
attack graphs
attack signatures
current security solutions
denial-of-service attacks
DoS Attack Detection
GODIT
graph data
graph mining
DoS attack
graph-stream anomaly detection approaches
IoT-equipped smart home show
machine learning approaches
packet inspection
real-time graph stream
smart home IoT devices
smart home IoT traffic
cyber-attacks
IP networks
Internet of Things
real-time systems
learning (artificial intelligence)
Resiliency
pubcrawl
composability
graph theory
computer network security
Anomaly Detection
Data mining
Intrusion Detection
IoT security
Smart homes
Smart Home
Predictive Metrics
biblio
Using Temporal Conceptual Graphs and Neural Networks for Big Data-Based Attack Scenarios Reconstruction
Submitted by aekwall on Mon, 08/17/2020 - 11:18am
Elman
temporal conceptual graph
RBF networks
RBF
radial basis function networks
probable attack scenario
potential attack scenario
possible attack scenarios
investigation
hybrid neural network
high speed networks
global attack reconstruction process
Elman network
security of data
complex attack scenarios
big data-based attack scenarios reconstruction
Attack Scenario Graph
attack graphs
complex attacks
Predictive Metrics
Neural networks
graph theory
composability
pubcrawl
Resiliency
Big Data
biblio
Node Copying for Protection Against Graph Neural Network Topology Attacks
Submitted by aekwall on Mon, 08/17/2020 - 11:18am
Topology
similarity structure
semi-supervised learning
prediction capability
node copying
graph topology
graph neural network topology attacks
graph convolutional networks
graph based machine
downstream learning task
detection problem
deep learning models
corruption
attack graphs
graph connectivity
Predictive Metrics
security of data
adversarial attacks
network topology
network theory (graphs)
Training
Prediction algorithms
Neural networks
neural nets
Computational modeling
graph theory
composability
pubcrawl
Resiliency
learning (artificial intelligence)
Task Analysis
biblio
STDeepGraph: Spatial-Temporal Deep Learning on Communication Graphs for Long-Term Network Attack Detection
Submitted by aekwall on Mon, 08/17/2020 - 11:18am
hybrid deep neural network design
graph Laplacian matrix
attack graphs
dimensionality reduction
graph characterization vectors
graph kernel matrices
graph signal processing
graph similarity measures
graph structures
high-dimensional intrinsic representation
high-dimensional representations
hybrid deep learning models
Matrix converters
kernel-based similarity embedding vector
long-term information learning
long-term network attack detection
network communication data
real-world network attack datasets
spatial-temporal deep learning
spatiotemporal deep learning
structural similarity information
supervised classification task
temporal communication graph
traffic analysis methods
CNN
IP networks
telecommunication traffic
Kernel
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
composability
graph theory
matrix algebra
pattern classification
computer network security
convolutional neural nets
convolutional neural network
network traffic
deep learning
signal processing
LSTM
Predictive Metrics
Laplace equations
Long short-term memory
Graph Kernel
network flows
biblio
Analysis of Complex Networks for Security Issues using Attack Graph
Submitted by aekwall on Mon, 08/17/2020 - 11:17am
security issues
VA scans
VA reports
network vulnerabilities
network health
MulVal
Attack Graph Generation Tools.
attach graph
attack paths
attack graphs
attack graph
Informatics
Predictive Metrics
computer network security
Complexity theory
Security analysis
network theory (graphs)
complex networks
computer security
tools
Databases
composability
pubcrawl
Resiliency
vulnerability assessment
Organizations
biblio
TAG: Topological Attack Graph Analysis Tool
Submitted by aekwall on Mon, 08/17/2020 - 11:17am
MulVAL inference engine
topological attack graph analysis tool
tag
situational awareness
security problems
security level estimation
Security Evaluation
Resiliency
pubcrawl
Predictive Metrics
attack graphs
multistage cyberattacks
inference mechanisms
graph theory
cyber security
cyber defense
corrective actions
computer network security
composability
attack paths
biblio
Risk Assessment of Industrial Internet System By Using Game-Attack Graphs
Submitted by aekwall on Mon, 08/17/2020 - 11:17am
search engines
search engine keyword segment matching method
scan components
open services
nondestructive asset profiling
industrial internet system
game-attack graph-based risk assessment model
attribute attack graph
attack rule base
Attack Path
asset threat list
attack graphs
attack graph
Nash Equilibrium
Predictive Metrics
security of data
industrial control
risk analysis
probability
communication protocols
risk assessment
risk management
internet
graph theory
composability
pubcrawl
Resiliency
game theory
Protocols
security
biblio
Identification of Critical-Attacks Set in an Attack-Graph
Submitted by aekwall on Mon, 08/17/2020 - 11:17am
Industrial Control Systems
water treatment cyber-physical system
water treatment
system-level security property
system vulnerabilities
strongly-connected-components
security administrators
SCC
Min Label-Cut
critical-attacks set
complex attacks scenarios
attack-paths
attack-graph
advanced multifaceted attacks
attack graphs
attack scenarios
security of data
attack graph
Predictive Metrics
security measurements
control engineering computing
industrial control
system security
graph theory
composability
pubcrawl
Resiliency
cyber-physical systems
SCADA systems
security
Internet of Things
« first
‹ previous
…
31
32
33
34
35
36
37
38
39
…
next ›
last »