Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
CSS
biblio
On the Impact of SSDF Attacks in Hard Combination Schemes in Cognitive Radio Networks
Submitted by aekwall on Mon, 03/15/2021 - 12:05pm
MAJORITY-rule
critical threats
CSS
different hard-decision fusion schemes
fusion center
hard combination schemes
hard data
hard data combining
hard-decision combination
hard-decision fusion scheme
licensed frequency bands
cooperative spectrum sensing
malicious user
miss detection
OR-rule
Primary User spectrum accessibility
PU
Spectrum Sensing Data Falsification reports
SSDF attacks
user performs Energy Detection
Cognitive Radio Security
cooperative communication
Resiliency
pubcrawl
Signal to noise ratio
probability
collaboration
Bandwidth
Interference
radio networks
sensors
telecommunication security
signal detection
Cascading style sheets
malicious users
radio spectrum management
cognitive radio
cognitive radio networks
detection performance
AND-rule
AYMU attacks
biblio
Hardening Firefox against Injection Attacks
Submitted by grigby1 on Wed, 02/10/2021 - 1:22pm
real-world security vulnerabilities
user interfaces
Web pages
Browser Security
information retrieval
CSS
Firefox
Hardening
injection attacks
HTML
Universal Cross-site Scripting
untrusted Web content
user interface
Web browsers display content
web security
Web security model
Cross Site Scripting
online front-ends
security
pubcrawl
Human behavior
resilience
Resiliency
Scalability
internet
Runtime
security of data
JavaScript
World Wide Web
authoring languages
Browsers
operating systems
Web sites
hypermedia markup languages
biblio
CCA Secure Proxy Re-Encryption Scheme for Secure Sharing of Files through Cloud Storage
Submitted by grigby1 on Thu, 09/26/2019 - 10:43am
resilience
Peer-to-peer computing
Proxy Reencryption
pubcrawl
Public key
public key cryptography
quantum computing
quantum computing algorithms
random oracle model
random processes
Metrics
Resiliency
ring-lwe
robust file storage capability
search problem
search problems
secure data sharing
Secure File Sharing
secure file sharing scheme
security issues
decryption time
chosen ciphertext secure
Cloud Computing
cloud storage security
cloud storage service
Collaborative Work
composability
computing technologies
confidentiality
CSS
CCA secure proxy re-encryption scheme
encrypted files
encryption
groupware
Human behavior
Human Factors
lattice based cryptography
Lattices
malicious insiders
biblio
Tracking Private Browsing Sessions Using CPU-Based Covert Channels
Submitted by grigby1 on Fri, 04/05/2019 - 10:26am
Browser Security
Compositionality
covert channels
CPU
CSS
electromagnetic emanations
HTML5
Human behavior
JavaScript
Metrics
pubcrawl
resilience
Resiliency
Tor
user identification
Web Tracking