Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Control Theory
biblio
DEMO: Demonstrating Practical Known-Plaintext Attacks Against Physical Layer Security in Wireless MIMO Systems
Submitted by grigby1 on Fri, 09/15/2017 - 9:48am
adaptive filtering
attack
Control Theory
demonstrator
known-plaintext attack
OFDM
orthogonal blinding
physical layer security
pubcrawl
Resiliency
biblio
Binary Permutation Polynomial Inversion and Application to Obfuscation Techniques
Submitted by grigby1 on Fri, 09/15/2017 - 9:48am
computer algebra
Computing Theory
Control Theory
obfuscation
permutation polynomial
pubcrawl
resilience
Resiliency
biblio
Private Circuits III: Hardware Trojan-Resilience via Testing Amplification
Submitted by grigby1 on Fri, 09/15/2017 - 9:48am
Computing Theory
Control Theory
countermeasures against malicious hardware manufacturers
Formal Security Models
Hardware Trojans
pubcrawl
resilience
Resiliency
biblio
SafeConfig'16: Testing and Evaluation for Active and Resilient Cyber Systems
Submitted by grigby1 on Fri, 09/15/2017 - 9:48am
Computing Theory
Control Theory
cyber
cyber experimentation
Metrics
pubcrawl
resilience
Resiliency
safeconfig
science of cybersecurity
security
Security Metrics
testbeds
testing
validation
biblio
Resiliency Policies in Access Control Revisited
Submitted by grigby1 on Fri, 09/15/2017 - 9:48am
Access Control
computational complexity
Computing Theory
Control Theory
fixed-parameter tractability
pubcrawl
resilience
Resiliency
Security Policies Analysis
workflow satisfiability
biblio
Secure Stable Matching at Scale
Submitted by grigby1 on Mon, 07/24/2017 - 12:56pm
Control Theory
gale-shapley
multi-party computation
pubcrawl
ram secure computation
Resiliency
roth-peranson
Secure computation
security
stable matching
biblio
A New Risk Assessment Framework Using Graph Theory for Complex ICT Systems
Submitted by grigby1 on Mon, 07/24/2017 - 12:56pm
complex ICT systems
Control Theory
graph theory
pubcrawl
Resiliency
risk assessment
security
biblio
Improvements to Secure Computation with Penalties
Submitted by grigby1 on Mon, 07/24/2017 - 12:56pm
bitcoin
Control Theory
fairness
pubcrawl
Resiliency
Secure computation
security
biblio
Systematic Analysis of Qualitative Data in Security
Submitted by grigby1 on Mon, 07/24/2017 - 12:56pm
Control Theory
grounded theory
pubcrawl
qualitative
Resiliency
security
Security analysis
biblio
Hiding Higher-Order Univariate Leakages by Shuffling Polynomial Masking Schemes: A More Efficient, Shuffled, and Higher-Order Masked AES S-box
Submitted by grigby1 on Mon, 07/24/2017 - 12:52pm
AES
Control Theory
multi-party computation
polynomial masking
privacy
pubcrawl
Resiliency
secret sharing
Shuffling
side-channel analysis
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
next ›
last »