Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Tor Network
biblio
Lightweight Neural Network-based Web Fingerprinting Model
Submitted by grigby1 on Fri, 06/02/2023 - 3:31pm
pubcrawl
anonymous communication
Computational modeling
convolution
dark web
deep learning
Fingerprint recognition
Human behavior
Human Factors
network security
Neural networks
performance evaluation
Tor Network
biblio
SmarTor: Smarter Tor with Smart Contracts: Improving Resilience of Topology Distribution in the Tor Network
Submitted by grigby1 on Wed, 10/02/2019 - 1:56pm
blockchain
ethereum
Intel SGX
privacy
pubcrawl
resilience
Resiliency
Secure Hardware
security
smart contract
Tor Network
Trused Execution Environment
file
Privacy-Preserving Network Congestion Control
Submitted by Geir Dullerud on Tue, 01/22/2019 - 6:46pm. Contributors:
Hussein Darir
Hussein Sibai
Chester Cheng
Sayan Mitra
Geir Dullerud
Nikita Borisov
privacy
security
networks
Tor Network
Routing
Posters (Sessions 8 & 11)
1739966
CPS-PI Meeting 2018
2018
Poster
file
Privacy-preserving Network Congestion Control
Submitted by Geir Dullerud on Mon, 12/17/2018 - 12:00pm. Contributors:
Geir Dellerud
Hussein Darir
Hussein Sibai
Chester Cheng
Sayan Mitran
Nikita Borisov
privacy
Safety
Tor Network
Congestion Control
Session 7: LT
1739966
CPS-PI Meeting 2018
2018
Presentation
biblio
Surfacing collaborated networks in dark web to find illicit and criminal content
Submitted by grigby1 on Fri, 11/03/2017 - 10:29am
social network analysis
espionage
extremist contents
financial frauds
hyperlinks
illegal activities
illegal services
illicit content
knowledge base
law enforcement
onion Web sites
public Internet
drug markets
social obligation
socket connections
terrorist contents
text analysis
Tor crawling
Tor functions
Tor hidden services
Tor Network
Web crawler
Web Graph
child exploitation images
Human behavior
Human Factors
dark web
drugs
internet
Weapons
Crawlers
information retrieval
Terrorism
social networking (online)
automatic Web site searching
pubcrawl
child exploitation videos
child sexual abuse
collaborated networks
Computer crime
content selection
criminal content
Criminal Network
Dark Crawler
dark Web crimes
Databases
biblio
Analyzing an Adaptive Reputation Metric for Anonymity Systems
Submitted by Nikita Borisov on Wed, 09/17/2014 - 5:31pm
Concurrency and Timing
Resilient Systems
Science of Security
Foundations
ACM CCS
anonymity
concurrency and timing
Database and Storage Security
Formal Methods and Theory of Security
foundations
Information Accountability and Usage Control
PID controller
Reputation Model
Resilient Systems
Science of Security
Security Metrics
Tor Network
ACM CCS
Database and Storage Security
Information Accountability and Usage Control
Formal Methods and Theory of Security
Security Metrics
file
Analyzing an Adaptive Reputation Metric for Anonymity Systems
Submitted by Heather Lucas on Tue, 06/03/2014 - 3:16pm. Contributors:
Anupam Das
Nikita Borisov
Matthew Caesar
anonymity
PID controller
Reputation Model
Tor Network
HotSoS 2014
Academia
Presentations
Presentation Slides