Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
zero trust
biblio
Configurable Anonymous Authentication Schemes For The Internet of Things (IoT)
Submitted by aekwall on Mon, 01/20/2020 - 12:13pm
pervasive computing devices
user anonymity
user privacy
encoding
cloud-based servers
configurable anonymous authentication schemes
device-user authentication parameters
IoT authentication
IoT testbed
power consumption
privacy-preserving authentication schemes
smart home occupancy
VCSE-based approach
verifiable common secret encoding
zero knowledge proof
ZKP-based approach
zero trust
computer network security
Human Factors
IoT infrastructure
radiofrequency identification
anonymity
authentication
Cryptography
privacy
policy-based governance
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
Internet of Things
data privacy
Scalability
biblio
Listen!: Audio-based Smart IoT Device Pairing Protocol
Submitted by aekwall on Mon, 01/20/2020 - 12:13pm
Scalability
Resiliency
pubcrawl
policy-based governance
IoT security
Human Factors
Smart Home
context-based pairing
zero-interaction
zero trust
biblio
FIoT: Detecting the Memory Corruption in Lightweight IoT Device Firmware
Submitted by aekwall on Mon, 01/20/2020 - 12:13pm
library function identification approach
dynamic analysis framework
dynamic analysis techniques
embedded firmware source code
FIoT framework
firmware analysis
firmware images
fuzzing
fuzzing test
hardware architectures
IoT device operating systems
IoT industry
CFG recovery approach
lightweight IoT device firmware images
lightweight IoT firmware
memory corruption
memory corruption vulnerabilities
Microprogramming
Program slicing
security researchers
time 170.0 s
time 210.0 s
time 40.0 s
zero trust
firmware
Scalability
Internet of Things
security
performance evaluation
system monitoring
Resiliency
pubcrawl
policy-based governance
program testing
Libraries
static analysis
computer network security
program diagnostics
Human Factors
operating systems (computers)
program compilers
Loading
lightweight IoT devices
address determination analysis
backward slice approach
binary code snippets
Binary codes
binary firmware
biblio
Lightweight Protection of User Identity Privacy Based on Zero-knowledge Proof
Submitted by aekwall on Mon, 01/20/2020 - 12:13pm
Scalability
Protocols
Resiliency
pubcrawl
policy-based governance
privacy
authentication
password
Proposals
data privacy
Human Factors
zero trust
biblio
Phishing URL Detection via CNN and Attention-Based Hierarchical RNN
Submitted by aekwall on Mon, 01/20/2020 - 12:13pm
Phishing Detection
Uniform resource locators
Fuses
attention-based hierarchical recurrent neural network module
attention-based hierarchical RNN
blacklisting
character-level spatial feature representations
convolutional neural network module
deep learning-based approach
feature engineering
Human Factors
phishing uniform resource locators
phishing URL classifier
phishing URL detection
phishing Websites
three-layer CNN
word-level temporal feature representations
zero-day phishing attacks
zero trust
pattern classification
cyber security
Electronic mail
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
policy-based governance
machine learning
Scalability
Computer crime
internet
Web sites
unsolicited e-mail
convolutional neural nets
recurrent neural nets
Phishing
deep learning
biblio
Zero Knowledge Authentication for Reuse of IPs in Reconfigurable Platforms
Submitted by aekwall on Mon, 01/20/2020 - 12:13pm
field programmable gate arrays
Scalability
Hardware
Resiliency
pubcrawl
policy-based governance
Watermarking
authentication
delays
Human Factors
zero knowledge proof
field programmable gate array
intellectual property
zero trust
biblio
Secure Digital Service Payments using Zero Knowledge Proof in Distributed Network
Submitted by aekwall on Mon, 01/20/2020 - 12:12pm
trustless network
Hash functions
initial trust setup phase
interactive zero knowledge proof
post quantum attacks
PoW
secure digital service payments
SHA3-finalists
tokenized assets
trusted third party
financial transactions
TTP
Witness Indistinguishability
Zcash
zero knowledge proof
zero knowledge proof method
ZKSNARK
ZKSTARK
zero trust
cryptocurrencies
Scalability
data confidentiality
Cryptographic Protocols
Resiliency
pubcrawl
policy-based governance
bitcoin
blockchain
security of data
smart contracts
multiparty computation
Proof-of-work
distributed network
Human Factors
blockchain ecosystem
enterprise applications
fair exchange
biblio
Power-Grid Controller Anomaly Detection with Enhanced Temporal Deep Learning
Submitted by aekwall on Mon, 01/20/2020 - 12:12pm
power-grid controller anomaly detection
control engineering computing
LSTM
actuators
data-driven defense system
enhanced temporal deep learning
Hardware Performance Counter
Kolmogorov–Smirnov test
power-grid controller
Human Factors
power-grid system
programmable logic controller
security-critical cyber-physical systems
temporal deep learning detection
temporal deep learning model
time 360.0 ms
zero trust
Scalability
deep learning
sensors
process control
power grids
power system security
power engineering computing
Zero-day attacks
Substations
policy-based governance
pubcrawl
Resiliency
learning (artificial intelligence)
invasive software
malware
Hardware
biblio
Linear Precoding Design for Cache-aided Full-duplex Networks
Submitted by aekwall on Mon, 01/20/2020 - 12:12pm
linear beamforming zero-forcing
edge node
FD mode
full-duplex
full-duplex transmission
future generation wireless networks
half-duplex counterpart
inner approximation method
Interference cancellation
iterative optimization algorithms
least mean squares methods
edge caching
linear codes
linear precoding design
minimum mean square error designs
optimization problems
precoding
radiofrequency interference
self-interference
spectral efficiency
zero trust
wireless networks
Resiliency
pubcrawl
policy-based governance
Iterative methods
optimization
array signal processing
radio networks
Human Factors
wireless channels
network coding
Scalability
approximation theory
cache storage
cache-aided FD system
cache-aided full-duplex networks
concave programming
data hungry
delivery time
delivery time analysis
delivery time optimization
biblio
Smartunit: Empirical Evaluations for Automated Unit Testing of Embedded Software in Industry
Submitted by grigby1 on Mon, 08/05/2019 - 11:40am
automated unit testing
dynamic symbolic execution
Embedded System
Human behavior
Human Factors
policy-based governance
pubcrawl
resilience
Resiliency
Scalability
zero trust
« first
‹ previous
1
2
3
4
5
next ›
last »