Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
internet
biblio
End User and Expert Perceptions of Threats and Potential Countermeasures
Submitted by grigby1 on Mon, 03/29/2021 - 1:13pm
mental models
usable security and privacy
trust-based defensive methods
threats countermeasures
threat models
technical countermeasures
security technology
security expert perceptions
security
Scalability
pubcrawl
privacy technology
privacy
potential countermeasures
Biological system modeling
large-scale adoption
Interviews
internet
inductive research approach
Human Factors
Guidelines
expert systems
expert perceptions
end user perceptions
data privacy
conducted semistructured interviews
computer network security
cognitive science
biblio
A Deep Learning-based Malware Hunting Technique to Handle Imbalanced Data
Submitted by aekwall on Mon, 03/29/2021 - 11:59am
Generative Adversarial Network(GAN)
generative adversarial network
LSTM
Predictive Metrics
machine learning approaches
antivirus companies
common threats
convolutional neural network (CNN)
cyber-security dangers
deep learning-based malware hunting technique
deep learning
Imbalanced
imbalanced training data sets
long short term memory
Long Short Term Memory(LSTM)
multiple class classification problems
Opcode
opcode sequences
oversampling minority classes
Generative Adversarial Learning
pattern classification
malware
invasive software
Data models
machine learning algorithms
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
Computational modeling
Scalability
internet
Training
CNN
convolutional neural nets
convolutional neural network
generative adversarial networks
recurrent neural nets
malware samples
biblio
Game-Like Captchas for Intrusion Detection
Submitted by grigby1 on Thu, 03/18/2021 - 2:36pm
Games
user interactions
user authentication
Support vector machines
pubcrawl
IP networks
intrusion detection system
Intrusion Detection
internet
Human behavior
Google re-captcha
authentication
game-like captchas
game play
game choices
credential stuffing
composability
captchas
biometrics (access control)
biometric authentication
authorisation
biblio
Improving Security Control of Text-Based CAPTCHA Challenges using Honeypot and Timestamping
Submitted by grigby1 on Thu, 03/18/2021 - 2:35pm
image segmentation
Web sites
Web Bots
web applications
user-friendliness
text-based CAPTCHA challenge
text analysis
segmentation technique
security of data
security mechanism
pubcrawl
optical character recognition
Multilingual CAPTCHA
internet
CAPTCHA string
Human Interaction Proof
human computer interaction
Human behavior
honeypot technique
honeypot
Hip
hidden text-boxes
deformations
Data protection
composability
captchas
CAPTCHA Usability
biblio
A Study of Evaluation Methods of WEB Security Threats Based on Multi-stage Attack
Submitted by grigby1 on Wed, 03/17/2021 - 12:43pm
Formal Specification
Chained Attacks
Web security threats
Web application services
security vulnerability model
security specification
Security Evaluation
multistage attack
Measures
Kill Chain
Classified protection
Reconnaissance
Internet services
tools
web services
internet
Data models
Scalability
Analytical models
Resiliency
resilience
pubcrawl
Servers
security
security of data
biblio
Evaluation of Network Assisted Handoffs in Heterogeneous Networks
Submitted by grigby1 on Tue, 03/16/2021 - 2:11pm
pubcrawl
Metrics
mobile computing
mobility management (mobile radio)
multihoming
named-object
network assisted handoffs
ORBIT testbed
policy-based approach
LTE
Rebinding
resilience
Resiliency
seamless data transfer
soft handoff
Throughput
WiFi
hard handoff
5G mobile communication
beyond 5G networks
clean slate
collaboration
computer architecture
Distributed Mobility Management
DMM
Handover
5G
heterogeneous networks
Human behavior
ICN
information centric network architecture
internet
IP network
IP networks
biblio
Managing the Evolution to Future Internet Architectures and Seamless Interoperation
Submitted by grigby1 on Tue, 03/16/2021 - 2:11pm
network management perspective
interoperability
IoT
IP networks
Logic gates
Metrics
MobilityFirst
NDN
network architecture
internetworking
network servers
open systems
policy-based approach
Protocols
pubcrawl
resilience
Resiliency
seamless interoperation
encryption
architectural island separation
clean slate
COIN
collaboration
computer architecture
computer network management
content retrieval
content-oriented interoperability framework
application-layer object resolution service
Future Internet Architectures
Human behavior
ICN
industrial automation
information-centric networking
information-centric networks
internet
Internet architectures
biblio
Design and Implementation of MobilityFirst Future Internet Testbed
Submitted by grigby1 on Tue, 03/16/2021 - 2:10pm
Protocols
US government
testing
testbed
Science - general
Scalability
Routing
Resiliency
resilience
pubcrawl
clean slate
policy-based approach
MobilityFirst
MF Proxy
Metrics
internet
Human behavior
future Internet architecture
collaboration
biblio
MiteS: Software-based Microarchitectural Attacks and Countermeasures in networked AP SoC Platforms
Submitted by grigby1 on Mon, 03/15/2021 - 1:08pm
programming
microarchitectural attack
microarchitecture
microcomputers
microprocessor chips
MiteS
Multiple Encryption
networked AP SoC platforms
PCS
personal computers
preventive countermeasure
Metrics
Protocols
pubcrawl
resilience
Resiliency
return-oriented programming
return-oriented programming attack
software-based microarchitectural attacks
stack protection
system-on-chip
Computer crime
adapted words addition
all-programmable system-on-chip
AP SoC attacker
AP SoC victim
buffer overflow
Buffer overflow attack
command injection attacks
command-injection
command-injection-based attack
composability
return oriented programming
Cryptography
dynamic reconfiguration
field programmable gate arrays
FPGA dynamic configuration
Intellectual Property cores
internet
Internet Protocol
internetworked all programmable system-on-chip platforms
IP
biblio
SQL Injection Attack and Detection Based on GreenSQL Pattern Input Whitelist
Submitted by grigby1 on Mon, 03/15/2021 - 1:08pm
Resiliency
internet technology
IP networks
Metrics
optimized whitelist
Pattern
patterned input
pubcrawl
resilience
internet
SQL
SQL injection
SQL injection attack
SQL injection attack command
Whitelist
Whitelists
working mode
Big Data
intercept samples
input model
Information systems
GreenSQL pattern input whitelist
GreenSQL learning
GreenSQL database firewall
GreenSQL
Firewalls (computing)
firewalls
Databases
database protection
database management systems
dangerous threat
composability
command injection attacks
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
…
next ›
last »