Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
attack models
biblio
Efficient Reed-Muller Implementation for Fuzzy Extractor Schemes
Submitted by aekwall on Mon, 01/18/2021 - 10:34am
medium-range FPGA device
attack models
area constraints
delay constraints
efficient Reed-Muller implementation
fuzzy extraction scheme
fuzzy extractor schemes
fuzzy-extractor
immunity
intrinsic hardware security
Hamming distance
physical tampering
PUF circuits
PUF implementations
Reed-Muller
Reed-Muller codes
Reed-Muller ECC design
responses stability
Fuzzy Cryptography
counterfeiting
FPGA
Scalability
Cryptography
Internet-of-Things
security
Table lookup
Resiliency
pubcrawl
Metrics
field programmable gate arrays
Decoding
fuzzy set theory
security problem
electronic devices
error correction codes
PUF
physical unclonable functions
Distributed Applications
biblio
Exploring Adversaries to Defend Audio CAPTCHA
Submitted by grigby1 on Fri, 09/11/2020 - 10:44am
bots
captchas
CAPTCHA
adversarial audio captcha
adversarial audio datasets
adversarial examples attack
attack accuracy
basic iterative method
BIM
Noise measurement
deepFool
distortion
medium background noise
near-sighted users
single audio captcha
spoken digits
Web-based authentication method
websites
composability
authorisation
machine learning
machine learning algorithms
security
pubcrawl
Human behavior
internet
deep learning
learning (artificial intelligence)
Classification algorithms
neural nets
Speech recognition
deep learning models
Web sites
attack models
handicapped aids
biblio
A Survey of Attack Models for Cyber-Physical Security Assessment in Electricity Grid
Submitted by aekwall on Tue, 09/08/2020 - 9:00am
electricity grid
Chained Attacks
data injection attack scenario
attack models
PLADD
Cyber-physical security assessment
bad data injection
attack propagation
attack graph
markov chain
cyber-physical system
Power Grid
security of data
Markov processes
power system security
power engineering computing
password
power grids
pubcrawl
Resiliency
cyber-physical systems
Data models
Scalability
IP networks
biblio
Algorithmic Approaches to Characterizing Power Flow Cyber-Attack Vulnerabilities
Submitted by grigby1 on Fri, 04/24/2020 - 3:38pm
algorithmic approaches
Power Grid Vulnerability Assessment
Voltage measurement
SCADA
power system stability
power related errors
power grid control systems
power flow cyber-attack vulnerabilities
power flow constraints
Numerical Resilience
Load flow
Economic dispatch
cyber-attacks
contingency analysis
attack models
security of data
Metrics
power grids
convergence
control systems
composability
Smart Grid
power system security
power engineering computing
state estimation
Indexes
Resiliency
resilience
pubcrawl
biblio
Enhancement of probabilistic attack graphs for accurate cyber security monitoring
Submitted by grigby1 on Wed, 09/05/2018 - 9:41am
security assessment
vulnerability scoring
probabilistic attack graphs
cyber security monitoring
computer security incidents
Bayesian methods
automatic countermeasure selection
attack response
attack probability
attack models
attack graph nodes
attack graph generation
attack actions
Computing Theory
security
security monitoring
Metrics
Indexes
Computational modeling
computer networks
Bayes methods
Monitoring
Software
security of data
attack graph
pubcrawl
graph theory
Security Metrics