Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Forensics
biblio
Towards Embedding Data Provenance in Files
Submitted by aekwall on Fri, 02/25/2022 - 9:46am
Forensics
usability
Self-contained Provenance
file system
End-to-end Data Provenance
Embedded Data Provenance
Delta-encoding
data provenance
Stakeholders
Provenance
Intrusion Detection
Prototypes
History
composability
Human behavior
Resiliency
Metrics
pubcrawl
Conferences
biblio
A Blockchain-Based Evidential and Secure Bulk-Commodity Supervisory System
Submitted by grigby1 on Thu, 02/24/2022 - 11:24am
Industries
Atmospheric measurements
blockchain
bulk commodity
Business
chaos
Fabric
Forensics
Human behavior
Scalability
lightnode
Measurement
Metrics
Particle measurements
privacy
Privacy Policies
privacy protect
pubcrawl
biblio
Machine Learning Based Approach for the Automated Mapping of Discovered Vulnerabilities to Adversial Tactics
Submitted by grigby1 on Mon, 02/07/2022 - 3:44pm
privacy
machine learning
machine learning algorithms
Neural networks
pubcrawl
resilience
Resiliency
Conferences
composability
Measurement
Forensics
system vulnerabilities
automatic mapping
Digital Forensic Engineering
MITRE Adversarial Tactics
biblio
Preventing Distributed Denial of Service Attacks in Software Defined Mesh Networks
Submitted by aekwall on Mon, 01/31/2022 - 3:15pm
Forensics
sFlow-RT
sFlow Collector
sFlow Agent
Policy Based Flow Management (PBFM)
network topology
flow tables
DDoS Attacks
Attack Detection and Mitigation
wireless mesh networks
Cloud Computing
denial-of-service attack
Firewalls (computing)
Topology
Redundancy
composability
Resiliency
Metrics
pubcrawl
SDN
biblio
Adversarial Attack on Fake-Faces Detectors Under White and Black Box Scenarios
Submitted by aekwall on Mon, 01/31/2022 - 3:11pm
Detectors
White Box Security
white-box
forensic models
Faked faces
black-box
adversarial attack
Forensics
Generators
security
generative adversarial networks
composability
Resiliency
Metrics
pubcrawl
Conferences
feature extraction
biblio
Spoofed Voice Detection using Dense Features of STFT and MDCT Spectrograms
Submitted by aekwall on Tue, 01/25/2022 - 2:50pm
CNN
STFT
spoofed voices
spectrum
recognition
MDCT
Hann window
Fourier transforms
attestation
Forensics
Speech recognition
Forgery
discrete cosine transforms
composability
Human behavior
Resiliency
pubcrawl
feature extraction
authentication
biblio
Toward Pinpointing Data Leakage from Advanced Persistent Threats
Submitted by aekwall on Mon, 12/20/2021 - 11:22am
Human behavior
leakage auditing
fingerprint
Digital Forensics
data leakage
APT
advanced persistent threat
Forensics
Fingerprint recognition
Organizations
Resiliency
Metrics
pubcrawl
Databases
Conferences
Computer hacking
Scalability
Big Data
biblio
Multi-Attack Detection Using Forensics and Neural Network Based Prevention for Secure MANETs
Submitted by grigby1 on Tue, 09/21/2021 - 2:35pm
MANET Attack Detection
telecommunication traffic
Routing
Resiliency
resilience
pubcrawl
Probes
neural network
Multi attacker
Metrics
manet attack prevention
MANET
IEEE 802.11 Standard
Fuzzy logic
Forensics
Forensic method
Ethernet
detection
delays
Compositionality
biblio
Trusted Anonymous Authentication For Vehicular Cyber-Physical Systems
Submitted by grigby1 on Thu, 05/13/2021 - 11:07am
Cloud Computing
security
pubcrawl
resilience
Resiliency
authentication
privacy
Databases
Forensics
Cameras
anonymous messaging
Internet-of-Things
efficiency
Trusted Anonymous Authentication
Vehicular Cyber-Physical Systems
biblio
Catching Falling Dominoes: Cloud Management-Level Provenance Analysis with Application to OpenStack
Submitted by grigby1 on Wed, 05/05/2021 - 11:23am
Provenance
Human behavior
Metrics
Resiliency
composability
Cloud Computing
Communication networks
Complexity theory
Conferences
Forensics
metadata
pubcrawl
Scalability
Scalable Security
security
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »