Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
tools
biblio
One-Round Provably Secure Yoking-Proof for RFID Applications
Submitted by grigby1 on Wed, 12/20/2017 - 12:05pm
privacy protection
yoking-proof
tools
RFIDs
RFID tags
RFID tagged objects
RFID tag pair
RFID applications
RFID
Resiliency
radiofrequency identification
pubcrawl
provable security
authentication
privacy model
privacy
one-round provably secure yoking-proof
one-round offline yoking-proof scheme
Moriyama security model
IoT
Internet of Things
Human Factors
Human behavior
data privacy
Cryptography
biblio
Formal Computational Unlinkability Proofs of RFID Protocols
Submitted by grigby1 on Wed, 12/20/2017 - 12:05pm
pubcrawl
unlinkability
Turing machines
tools
Theorem Proving
security protocols
security of data
RFIDs
RFID protocols
RFID
Resiliency
radiofrequency identification
communication complexity
Protocols
Human Factors
Human behavior
Hash functions
formal computational unlinkability proofs
Cryptography
Cryptographic Protocols
Computational modeling
computational model
computational complete symbolic attacker
biblio
Security in software-defined wireless sensor networks: Threats, challenges and potential solutions
Submitted by grigby1 on Wed, 12/20/2017 - 12:01pm
control systems
sensor security
WSN
water resources
tools
software-defined wireless sensor network
software-defined networking approach
security threats
SDWSN security
SDWSN
SDN paradigms
SD-WSN
real-time systems
Internet of Things paradigm
IoT
authorization
wireless sensor networks
computer network security
composability
SDN
Human Factors
software defined networking
Human behavior
Resiliency
pubcrawl
security
Metrics
biblio
SDN data path confidence analysis
Submitted by grigby1 on Tue, 12/12/2017 - 12:31pm
Software-Defined Networks
Routing
SDN data path confidence analysis
SDN hybrid networks
secure network
Security Metrics
Security Policies Analysis
sensitive data
sensitive information
single metric indicator
software defined networking
Software-defined networking (SDN)
remediation costs
specific network path
Springs
stolen information
systemic network problems
time series
Time series analysis
time series data repository
tools
Traceroute
unauthorized access
latent network problems
autonomous systems
collaboration
competitors costs industry
Confidence Assessment
confidence score
configuration metrics
dependable network
domestic policy
foreign policy
internet
automated system protection services
Measurement
multifactor indicator analysis
network behavior
network configuration
network operation
network path confidence analysis service
OpenFlow
policy-based governance
proprietary information
pubcrawl
biblio
Determining proximal geolocation of IoT edge devices via covert channel
Submitted by grigby1 on Tue, 12/12/2017 - 12:28pm
IoT edge devices
trusted router
tools
telecommunication channels
smart meters
Scalability
Routing protocols
roadside speed sensors
Resiliency
radiation sensors
pubcrawl
Protocols
pressure sensors
IP packets
IP networks
chemical sensors
Internet Protocol
Internet packet router authentication
Internet of Things
internet
Intelligent sensors
Geology
geolocation techniques
geolocation authentication
geolocation
covert channels
covert channel
computer network security
Compositionality
command and control center
biblio
Sciunits: Reusable Research Objects
Submitted by grigby1 on Tue, 12/12/2017 - 12:27pm
Predictive models
tools
Software
Servers
sciunit
Resiliency
reproducibility
pubcrawl
Provenance
composability
Monitoring
Metrics
metadata
Human Factors
Human behavior
Containers
Compositionality
biblio
Real-Time IRC Threat Detection Framework
Submitted by grigby1 on Tue, 12/12/2017 - 12:22pm
Metrics
WannaCry ransomware attack
tools
Stanford coreNLP
social networking (online)
social media platforms
security of data
Scalability
Resiliency
real-time threat detection
real-time text communications
real-time systems
real-time IRC threat detection framework
pubcrawl
Neural networks
Monitoring
Autonomic Security
malicious IRC behavior analysis
IRC protocol
IRC channel monitoring
Internet Relay Chat protocol
Internet Relay Chat (IRC)
internet
hacker data analysis and visualization
hacker community
electronic messaging
Data collection
cyber security
Computer hacking
Computer crime
autonomic threat detection
biblio
Columbus: Filesystem Tree Introspection for Software Discovery
Submitted by grigby1 on Tue, 12/12/2017 - 12:19pm
Metadata Discovery Problem
tools
standards
software packaging knowledge
software packages
software management
software engineering
software discovery
Scalability
Resiliency
querying package management tools
pubcrawl
program diagnostics
problem diagnosis
Packaging
Operational analytics
agile development practices
metadata
meta data
machine learning methods
licensing requirement compliance
learning (artificial intelligence)
filesystem tree introspection
file metadata
feature extraction
drift detection situations
Docker Images
data structures
Compositionality
Columbus
Cloud Computing
cloud
biblio
To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild
Submitted by grigby1 on Mon, 12/04/2017 - 11:57am
Monitoring
Webcams
Trojan horses
tools
Resiliency
remote attackers interactive control
remote access trojans
remote access trojan
Rats
RAT malware
RAT
pubcrawl
botnets
Metrics
invasive software
interactive systems
human operator interaction
human computer interaction
honeypot
Electronic mail
DarkComet malware
darkcomet
Compositionality
biblio
Anomaly Detection Using Persistent Homology
Submitted by grigby1 on Mon, 11/27/2017 - 11:30am
Metrics
vulnerability detection
tools
Three-dimensional displays
summary statistics
statistical analysis
set theory
security of data
Resiliency
pubcrawl
Ports (Computers)
persistent homology
Anomaly Detection
IP networks
Indexes
Human Factors
Human behavior
dynamic point cloud
detection algorithms
Cybersecurity
cyber network
Compositionality
anomaly detection algorithm
« first
‹ previous
…
54
55
56
57
58
59
60
61
62
next ›
last »