Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Security analysis
biblio
Quickest Detection of Advanced Persistent Threats: A Semi-Markov Game Approach
Submitted by grigby1 on Fri, 01/22/2021 - 12:38pm
cyberattack
two-time scale Q-learning algorithm
Stackelberg zero-sum semi-Markov games
Stackelberg semiMarkov game
refinable attack investigation framework
real-word attack dataset
Rain
multistage attacks
Limiting average reward criteria
DIFT-based defender
Dynamic Information Flow Tracking
advanced persistent threats
q-learning
Markov processes
game theory
security of data
threat detection
APT
advanced persistent threat
Cyber Attacks
Games
Security analysis
Computational modeling
Scalability
Analytical models
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Security and Privacy Analysis of Wearable Health Device
Submitted by grigby1 on Mon, 12/28/2020 - 11:28am
security
mobile computing
mobile devices
mobile health
mobile wearable health devices
privacy
privacy breach
privacy features
Privacy Risk
pubcrawl
resilience
Resiliency
malicious attack
Security analysis
security risk
security vulnerability
sensitive data information
sensitive information
Servers
telecommunication security
user data security
user sleeping arrangements
Wearable devices
dieting formula
authorisation
Biomedical monitoring
Bluetooth
Bluetooth networking
Bluetooth pairing process
bluetooth security
composability
Computer crime
data privacy
Data Security
wearables security
eating constraint
fitbit
Google Glass
Hacker
health care
health monitor system
health tracker devices
Human behavior
human health parameter monitoring
Jawbone
biblio
A Secure and Efficient Renewable Energy Trading Scheme Based on Blockchain in Smart Grid
Submitted by grigby1 on Fri, 11/20/2020 - 1:05pm
distributed energy trading schemes
composability
green computing
Smart Grids
Security analysis
power system interconnection
renewable energy sources
power markets
credibility-based equity proof mechanism
distributed energy sources
Distributed energy trading
smart power grids
efficient energy renewable trading scheme
electricity market trading model
energy internet
Energy storage
Energy systems
energy trading market
privacy protection
secure energy renewable trading scheme
smart grid consumer privacy
Resiliency
privacy
security
blockchain
Distributed databases
pubcrawl
Human behavior
Metrics
policy-based governance
collaboration
resilience
Cryptography
Indexes
data privacy
Scalability
internet
Computational modeling
distributed power generation
power engineering computing
power system security
Smart Grid
biblio
At the cross roads of lattice-based and homomorphic encryption to secure data aggregation in smart grid
Submitted by grigby1 on Fri, 11/20/2020 - 1:04pm
Security analysis
policy-based governance
power meters
privacy
privacy-preserving lattice
pubcrawl
resilience
Resiliency
Scalability
security
Metrics
smart appliances
smart energy meters
Smart Grid
smart grid consumer privacy
Smart Grids
smart household appliances
smart meters
smart power grids
encryption
communication complexity
composability
consumer privacy
Cryptography
customer privacy protection
data aggregation
data privacy
domestic appliances
collaboration
home area network appliances
home energy use
homomorphic aggregation scheme
Homomorphic encryption
Human behavior
lattice-based homomorphic encryption
Logic gates
messages confidentiality
biblio
Tell Me More Than Just Assembly! Reversing Cyber-Physical Execution Semantics of Embedded IoT Controller Software Binaries
Submitted by aekwall on Mon, 10/26/2020 - 10:46am
firmware binaries
critical cyber-physical IoT devices hinges
Cyber Physical System
cyber-physical execution semantic information
cyber-physical execution semantics
cyber-physical IoT control application domains
cyber-physical security flaws
domain-specific reverse engineering framework
domain-specific semantic information
dynamic selective memory protection
embedded binary code
embedded controller software binaries
embedded IoT controller software binaries
executables
Execution Semantic
control algorithm parameters
firmware vulnerability assessment
high-level algorithmic expressions
Linux kernel controllers versions
low-level binary symbolic values
memory forensics analysis
MISMO
reverse engineering outcomes
robotics
semantic-matching
state estimation algorithms
Symbolic Comparison
Symbolic Expression
targeted memory data attacks
Linux Operating System Security
Security analysis
security of data
Internet of Things
security
drones
Software
embedded systems
Linux
Resiliency
pubcrawl
composability
Metrics
Data mining
public domain software
firmware
IoT
reverse engineering
Heuristic algorithms
program verification
control engineering computing
Semantics
Software algorithms
Predictive Metrics
Binary codes
operating system kernels
algorithmic level
algorithm-level semantics
binary patching
control algorithm
biblio
Security Analysis of the Electronic Voting Protocol Based on Blind Intermediaries Using the SPIN Verifier
Submitted by grigby1 on Fri, 10/16/2020 - 10:23am
LTL
verification
tools
SPIN verifier
SPIN formal verifier
SPIN
Security analysis
Resiliency
resilience
pubcrawl
Protocol Security
Promela language
policy-based governance
model checking
MITM
man in the middle attack
authentication
Linear Temporal Logic
government data processing
formal verification
Electronic voting systems
electronic voting system
electronic voting protocol
electronic voting
e-voting
E-Government
data substitution
Cybersecurity
Cryptographic Protocols
cryptographic protocol
collaboration
biblio
Formal Modeling and Security Analysis for OpenFlow-Based Networks
Submitted by aekwall on Mon, 10/05/2020 - 10:53am
Semantics
Dynamic Networks and Security
topology-oriented operational semantics
point-to-point topology
Operational Semantics
openflow-based networks
formal OpenFlow-based network programming language
dynamic OpenFlow applications
dynamic flow rules
Switches
computer network security
Topology
Security analysis
network topology
Metrics
composability
pubcrawl
Resiliency
Protocols
security
biblio
Environment Aware Privacy-Preserving Authentication with Predictability for Medical Edge Computing
Submitted by aekwall on Mon, 09/28/2020 - 11:02am
environmental prediction
mutual authentication
biomedical communication
communication channel
edge computing health monitoring system
edge computing unit
environment aware privacy-preserving authentication protocol
environment equality
environmental assessment
elliptic curve
fuzzy extractor
fuzzy synthetic evaluation model
Health monitoring system
medical edge computing
resource-limited smart devices
smart health monitoring system
temporal health index
Computing Theory and Privacy
privacy preservation
authorisation
Data Security
data privacy
distributed processing
Cryptographic Protocols
Resiliency
Human behavior
pubcrawl
Scalability
fuzzy set theory
public key cryptography
Security analysis
secure communication
Elliptic curve cryptography
edge computing
privacy protection
biblio
Security Analysis for Cognitive Radio Network with Energy Scavenging Capable Relay over Nakagami-m Fading Channels
Submitted by grigby1 on Fri, 09/18/2020 - 12:56pm
Cognitive Radio Network
Cognitive Radio Security
underlay cognitive network
SOP
secrecy outage
relay networks (telecommunication)
power constraints
Nakagami-m fading channels
Nakagami-m
energy scavenging capable relay
energy scavenging
closed-form expression
secrecy outage probability
relaying
Nakagami channels
security
cognitive radio
information processing
energy harvesting
Relays
fading channels
telecommunication network reliability
probability
Decoding
Security analysis
telecommunication security
Resiliency
resilience
pubcrawl
biblio
Security of Gestures Based CAPTCHAs
Submitted by grigby1 on Fri, 09/11/2020 - 10:46am
mobile devices
security.
mobile gesture CAPTCHA
gyroscopes
accelerometer
Smartphones
gestures
CAPTCHA
Accelerometers
captchas
gesture recognition
security
Mobile handsets
Security analysis
invasive software
mobile computing
composability
Software
Human behavior
pubcrawl
Servers
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »