Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
timing
biblio
Raising flags: Detecting covert storage channels using relative entropy
Submitted by grigby1 on Tue, 12/12/2017 - 1:28pm
TCP flag frequency distribution
Receivers
regular traffic data sets
regular traffic packets
relative entropy
Resiliency
ROC curves
Scalability
secret messages
receiver operating characteristic
TCP flag header
TCP/IP network packets
telecommunication traffic
testing
timing
transport protocols
Unix systems
IP addresses
coding schemes
Compositionality
covert channels
covert storage channel
covert storage channels
CSC messages
encoding
Entropy
Anomaly Detection
IP networks
IP pair
network traffic
normal traffic
Protocols
pubcrawl
raising flags
biblio
Review of covert channels over HTTP: Communication and countermeasures
Submitted by grigby1 on Tue, 12/12/2017 - 1:28pm
message content confidentiality
Uniform resource locators
ubiquitous HTTP message
transport protocols
timing
Technological innovation
Servers
Scalability
Resiliency
Receivers
pubcrawl
Protocols
networks
Browsers
internet
HTTP
detection
data leakage
Cryptography
Cryptographic Protocols
covert information container
covert communication method
covert channels
covert channel
Compositionality
capacity
biblio
FPGA based hardware implementation of AES Rijndael algorithm for Encryption and Decryption
Submitted by grigby1 on Thu, 04/20/2017 - 12:40pm
secure data transmission
Inverse S-Box transformations
network on chip
network on chip security
network security algorithm
pre-calculated look-up tables
precalculated LUT
pubcrawl
Resiliency
Rijndael
Scalability
inverse mix-columns transformations
Table lookup
timing
Verilog-HDL
Virtex-7 XC7VX690T chip
wired digital communication networks
wireless digital communication networks
Xilinx ISE Design Suite-14.7 Tool
Xilinx Virtex-7 FPGA
Xilinx XPower Analyzer
decryption
AES-128
AES-192
AES-256
AES Rijndael algorithm
Algorithm design and analysis
algorithmic functions
Clocks
composability
Cryptography
advanced encryption standard (AES)
encryption
Field Programmable Gate Array (FPGA)
field programmable gate arrays
FPGA based hardware implementation
Galois field multiplications
Galois fields
GF (28)
Hardware Description Language (HDL)
hardware description languages
biblio
Keystroke dynamics performance enhancement with soft biometrics
Submitted by grigby1 on Wed, 03/08/2017 - 2:47pm
authentication
behavioural biometric modality
behavioural sciences computing
biometric characteristics
biometrics (access control)
classification approach
combination approach
Databases
feature extraction
keystroke dynamics performance enhancement
pubcrawl170115
soft biometrics
Support vector machines
timing
biblio
On Accuracy of Classification-Based Keystroke Dynamics for Continuous User Authentication
Submitted by grigby1 on Wed, 03/08/2017 - 2:45pm
learning (artificial intelligence)
word total time duration
user active authentication
Training data
Training
timing
SVM
Support vector machines
support vector machine
security
pubcrawl170115
Performance
pattern classification
natural language processing
message authentication
machine learning techniques
authentication
keystroke features
keystroke dynamics authentication systems
keystroke dynamics
key duration
Kernel
K-NN
k-nearest neighbor classifier
flight time latency
feature extraction
English words
directed graphs
diagraph time latency
continuous user authentication
classification-based keystroke dynamics
biblio
Finite Context Modeling of Keystroke Dynamics in Free Text
Submitted by grigby1 on Wed, 03/08/2017 - 2:45pm
Context
Context modeling
Cryptography
finite context modeling
fixed short texts verification
free text analysis
keystroke dynamics analysis
password
pubcrawl170115
security
standards
text analysis
timing
Training
user verification
biblio
Cyber security operations centre: Security monitoring for protecting business and supporting cyber defense strategy
Submitted by grigby1 on Tue, 03/07/2017 - 1:37pm
CyberSA
timing
system-on-chip
SoC
security of data
security monitoring
risk management
pubcrawl170109
Monitoring
Log Source
information and communications technology
ICT systems
HMG protective monitoring controls
Her Majestys Government
government data processing
analysis
cyber situational awareness
cyber security operations centre
Cyber Incident Response
cyber defense strategy support
CSOC Strategy
CSOC framework
CSOC Benefits & Challenges
CSOC
Correlation
Computer crime
business protection
business control
Business
biblio
Efficient Clock and Carrier Recovery Algorithms for Single-Carrier Coherent Optical Systems: A systematic review on challenges and recent progress
Submitted by BrandonB on Wed, 05/06/2015 - 2:53pm
Optical distortion
timing synchronization technique
timing
synchronisation
single-carrier-based coherent optical modulation format
Signal processing algorithms
Optical signal processing
optical receivers
optical modulation
carrier recovery algorithm
optical communication
high-speed optical transmission system
High-speed optical techniques
digital signal processing
Clocks
clock recovery algorithm
carrier synchronization technique
biblio
Design, implementation and security analysis of Hardware Trojan Threats in FPGA
Submitted by BrandonB on Thu, 04/30/2015 - 1:41pm
integrated circuits
RoT
security
denial of service
design
encryption
field programmable gate arrays
FPGA testbed
Hardware
hardware Trojan detection technique
hardware Trojan threats
Hardware Trojans
HDM
HTT detectability metric
HTT detection
ICs
timing variation
integrated logic circuits
invasive software
missed detection probability
normalized physical parameters
optimal detection threshold
power consumption
Power demand
Resiliency
root of trust
Security analysis
sensitive information leak
summation of false alarm
timing
Trojan taxonomy
Trojan horses
file
NIST - Cyber-Physical Systems Program - Part 2.pdf
Submitted by Chris Greer on Wed, 04/22/2015 - 6:21pm. Contributor:
Chris Greer
CPS Domains
Concurrency and Timing
Critical Infrastructure
Foundations
NIST Public Working Group
Scalability
Smart City
test beds
timing
trustworthiness
CPS Week 2015
2015
Presentation
April 13 2015
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »