Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
detection method
biblio
Detection of Sybil Attack on Tor Resource Distribution
Submitted by aekwall on Mon, 12/14/2020 - 11:42am
Approximation algorithms
tor resource distribution
tor anonymous communication system
suspicious malicious users
resource distribution process
resource distribution
minimum malicious user
Integer Linear Program
enumeration attacks
Distribution strategy
computer program
anonymous communication system
Bipartite graph
Linear programming
detection method
Bridges
computer network security
Communication Systems
integer programming
Relays
Web sites
sybil attacks
Metrics
resource management
graph theory
Sybil attack
detection
composability
pubcrawl
Resiliency
network security
biblio
A Detection Method Against DNS Cache Poisoning Attacks Using Machine Learning Techniques: Work in Progress
Submitted by grigby1 on Wed, 11/04/2020 - 1:13pm
pubcrawl
GeoIP related features
Human behavior
internet
IP networks
Kaminsky attack
learning (artificial intelligence)
machine learning
machine learning techniques
feature extraction
resilience
Resiliency
Scalability
security of data
Servers
standard DNS protocols
time related features
Training
detection method
authoritative DNS server
cache poisoning attack
cache storage
cached DNS data
compromised authoritative DNS servers
Computer crime
computer network security
Databases
AI Poisoning
DNS
DNS based domain name resolution
DNS cache poisoning attacks
DNS cache servers
DNS packet
DNS response packets
DNS security extensions
biblio
An Automated Composite Scanning Tool with Multiple Vulnerabilities
Submitted by aekwall on Mon, 09/28/2020 - 11:34am
system vulnerabilities
Cross Site Scripting
vulnerability detection module
the vulnerability detection module
multiple vulnerabilities
frequent vulnerabilities
directory traversal
composite detection tool
automated composite scanning tool
Cross-site Scripting Attacks
computer network security
detection method
network security protection
SQL
SQL injection
pubcrawl
Human behavior
Resiliency
network security
Scalability
biblio
Rapid prototyping of flow-based detection methods using complex event processing
Submitted by grigby1 on Fri, 09/04/2020 - 2:25pm
Engines
brute force attacks
SQL-like syntax
SQL
network flows
network attacks
multistage HTTP brute force attack detection
flow-based detection methods
Event Processing Language
ESPER
EPL
detection method
complex event processing
CEP
security
policy-based governance
transport protocols
Human Factors
Databases
Uniform resource locators
Force
collaboration
pubcrawl
network security
Monitoring
IP networks
computer network security
biblio
Research on Network Malicious Code Detection and Provenance Tracking in Future Network
Submitted by aekwall on Mon, 04/06/2020 - 8:56am
malicious code detection
classification algorithm
Predictive Metrics
cyber physical systems
network coding
Behavior features
detection method
feature selection methods
host node
software defined networking
malware detection system
matching classification method
Mobile communication
network controller
network malicious code detection
optimal feature subset
propagation model
switch node
Feature Selection
malware
security
invasive software
Classification algorithms
machine learning algorithms
SDN network
network security
feature extraction
computer network security
Resiliency
pubcrawl
composability
Computational modeling
pattern classification
Analytical models
mobile network
biblio
RSSI Sequence and Vehicle Driving Matrix Based Sybil Nodes Detection in VANET
Submitted by grigby1 on Mon, 03/02/2020 - 12:38pm
resource allocation mechanisms
vehicular ad hoc networks
vehicle driving matrix - RSDM
VANET infrastructure
VANET
telecommunication security
sybil nodes detection
sybil attacks
Sybil attack
serious damages
RSSI sequence
composability
resource allocation
Resiliency
resilience
reputation models
pubcrawl
Protocols
neighbor nodes
Metrics
driving matrix
detection method
biblio
Golden Gates: A New Hybrid Approach for Rapid Hardware Trojan Detection Using Testing and Imaging
Submitted by grigby1 on Wed, 02/26/2020 - 3:38pm
Resiliency
Logic Test
low accuracy
malicious modifications
microscopy
modern military systems
new hybrid approach
pubcrawl
rapid hardware trojan detection
resilience
Logic gates
reverse engineering
scanning electron microscopy
security
SEM images
superlative accuracy
supply chain security
trojan horse detection
Trojan horses
grave threat
commercial systems
cyber physical systems
detection method
exhaustive test infrastructure
existing gate footprints
Foundries
GGC
golden chip
golden gate circuits
backside ultra thinning
Hardware
Hardware Trojans
high classification accuracy
high time cost
Image analysis
Imaging
integrated circuits
invasive software
biblio
Exploiting Phase Information in Thermal Scans for Stealthy Trojan Detection
Submitted by grigby1 on Fri, 03/15/2019 - 10:59am
modulation
weak thermal hot spots
Trojan horses
trojan horse detection
Trojan detection
thermal scans
Thermal Mapping
Temperature measurement
stealthy hardware Trojan detection
pubcrawl
Phase measurement
phase information
Phase
amplitude analysis
measurement platform
Lock-in Thermography
invasive software
integrated circuits
infrared thermography
infrared signals
infrared imaging
Heating systems
Hardware
formidable alternative
detection method