Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
provable security
biblio
Optimising Network Architectures for Provable Adversarial Robustness
Submitted by aekwall on Tue, 10/12/2021 - 3:13pm
Neural networks
Robustness
Computational modeling
Perturbation methods
Predictive models
Training
pubcrawl
Resiliency
Compositionality
artificial neural network
Predictive Metrics
provable security
computer vision
network architecture
biblio
A Multiple-Replica Provable Data Possession Algorithm Based on Branch Authentication Tree
Submitted by aekwall on Tue, 10/12/2021 - 3:13pm
security
authentication
Heuristic algorithms
Conferences
pubcrawl
Resiliency
Compositionality
Software algorithms
Predictive Metrics
data integrity
provable security
Multi Branch Authentication Tree
Multiple-Replica
provable data possession
software engineering
Vector Dot Product
biblio
Provably Robust Decisions based on Potentially Malicious Sources of Information
Submitted by aekwall on Tue, 10/12/2021 - 3:13pm
security
Robustness
Routing
pubcrawl
Resiliency
Decision Making
Compositionality
malware
Predictive Metrics
provable security
cognition
Information systems
malicious reporting
Provable robustness
trust-based security
biblio
Security Assessment of the Contextual Multi-Armed Bandit - RL Algorithm for Link Adaptation
Submitted by aekwall on Tue, 10/12/2021 - 3:13pm
security
Measurement
Games
Wireless communication
pubcrawl
Resiliency
Industries
Reinforcement learning
Compositionality
Throughput
Predictive Metrics
provable security
Contextual Multi-Armed Bandit
link adaptation
RL algorithms security
security assessment
biblio
Modular Security Analysis of OAuth 2.0 in the Three-Party Setting
Submitted by aekwall on Tue, 10/12/2021 - 3:12pm
authorization
Compositionality
Cryptographic Protocols
OAuth
Predictive Metrics
provable security
pubcrawl
Resiliency
security model
biblio
Boolean Searchable Symmetric Encryption with Filters on Trusted Hardware
Submitted by aekwall on Tue, 04/27/2021 - 1:26pm
Servers
encryption
Hardware
Resiliency
pubcrawl
composability
Intel SGX
Indexes
provable security
secure databases
distributed systems
searchable encryption
biblio
Breaking and (Partially) Fixing Provably Secure Onion Routing
Submitted by aekwall on Tue, 04/27/2021 - 1:14pm
provable security
Resiliency
Predictive Metrics
Compositionality
composability
Cryptography
privacy
Protocols
pubcrawl
Receivers
Relays
Routing
biblio
A Game Theoretic Approach For Deploying Forensic Ready Systems
Submitted by aekwall on Mon, 03/29/2021 - 11:49am
nonprovable attack scenarios
game theoretic approach
game theoretic security
game theory
Human Factors
investigation readiness
investigation-ready infrastructure
low security configurations
moderate security configurations
gained security cost
nonprovable attacks
pubcrawl
Scalability
security of data
security overhead
security solutions
two-player game
provable security
forensic-ready systems
forensic ready systems
forensic readiness
forensic experts
cyber incidents
cyber attacker
cost-prohibitive approaches
cognitive security solution
attacking defending
attack surface
Attack Strategies
adaptive cyber defender
Compositionality
Predictive Metrics
Resiliency
biblio
Transparent Provable Data Possession Scheme for Cloud Storage
Submitted by aekwall on Mon, 03/22/2021 - 1:06pm
encryption
user convenience
transparent provable Data Possession scheme
transparent PDP
third-party auditor
security of data
security
pubcrawl
provable data possession
Probabilistic logic
metadata
Mathematical model
general cloud storage system model
file organisation
encryption audits
provable security
discrete logarithm problem
data security techniques
data privacy
data integrity
conventional PDP
cloud storage
cloud proof
Cloud Computing
auditing
audit
Compositionality
Predictive Metrics
Resiliency
biblio
Encrypted-Input Program Obfuscation: Simultaneous Security Against White-Box and Black-Box Attacks
Submitted by grigby1 on Thu, 03/04/2021 - 2:33pm
pubcrawl
Logic gates
machine learning
machine learning as a service
machine learning programs
Metrics
program confidentiality
program obfuscation
provable program obfuscation solution
learning (artificial intelligence)
range membership programs
resilience
security
traditional cryptographic program obfuscation model
white box
white box cryptography
White Box Security
white-box attacks
cloud services
Resiliency
Predictive Metrics
Compositionality
Black Box Attacks
black box encryption
black-box attacks
Cloud Computing
cloud programs
provable security
composability
Computational modeling
Cryptography
data privacy
Decision trees
encrypted-input program obfuscation
encryption
equivalent unobfuscated program
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »