Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security of data
biblio
Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems
Submitted by grigby1 on Thu, 03/04/2021 - 2:57pm
security of data
network intrusion detection system
Neural networks
noise reduction
pubcrawl
reconstruction from partial observation
resilience
Resiliency
Robustness
network intrusion detection
signature-based NIDS
software defined networking
software-defined network
telecommunication traffic
traffic traversing
Zero day attacks
Zero-day attacks
defense
adversarial example attack
adversarial setting
Anomaly Detection
anomaly-based NIDS
attacks network systems
composability
computer network security
Cyber Attacks
adversarial example
denoising autoencoders
Intrusion Detection Systems
Malicious Traffic
Metrics
Monitoring
network attacks
network function virtualization
biblio
Abnormal Behavioral Pattern Detection in Closed-Loop Robotic Systems for Zero-Day Deceptive Threats
Submitted by grigby1 on Thu, 03/04/2021 - 2:55pm
intrusion detection system
zero-day threats
zero-day deceptive attacks
Zero day attacks
Service robots
security of data
Resiliency
resilience
pubcrawl
Metrics
Intrusion Detection Systems
abnormal behavioral pattern detection
defense
deceptive attacks
cyber-physical systems
control engineering computing
composability
closed-loop robotic systems
closed loop systems
Anomaly Detection
abnormal behavioral pattern detection technique
biblio
ZeroWall: Detecting Zero-Day Web Attacks through Encoder-Decoder Recurrent Neural Networks
Submitted by grigby1 on Thu, 03/04/2021 - 2:55pm
real-time detection
ZeroWall
zero-day Web attacks
Zero-day attacks
zero-day attack request
Zero day attacks
widely-deployed signature-based Web Application Firewalls
web security
Syntactics
Semantics
security of data
Resiliency
resilience
Recurrent neural networks
Anomaly Detection
pubcrawl
Metrics
internet
historical Web requests
Hidden Markov models
Firewalls (computing)
existing WAF
existing signature-based WAF
encoder-decoder recurrent neural network
digital signatures
defense
computer network security
composability
biblio
Implementation and Analysis of Keyboard Injection Attack using USB Devices in Windows Operating System
Submitted by grigby1 on Thu, 03/04/2021 - 2:43pm
Universal Serial Bus
powershell script
pubcrawl
resilience
Resiliency
security
security of data
Software
Turning
powershell
universal serial bus devices
USB
USB devices
user interfaces
Windows
Windows 10 operating system attacks
Windows operating system
Windows Operating System Security
keylogger
Arduino Pro Microdevice
composability
Firewalls (computing)
Hardware
internet
keyboard injection attack analysis
keyboard injection attack implementation
Keyboards
Arduino
keylogger program
keystroke analysis
Metrics
microcomputers
Microsoft Windows (operating systems)
operating systems
peripheral interfaces
biblio
A Human Immunity Inspired Intrusion Detection System to Search for Infections in an Operating System
Submitted by grigby1 on Thu, 03/04/2021 - 2:43pm
human immunity inspired intrusion detection system
Windows Operating System Security
Windows operating system
security of data
security
receptors
operating systems (computers)
operating system
negative selection algorithm
microsoft windows
intrusion detection system
Intrusion Detection
Immune system
Operating systems security
Containers
computer software
computer security
composability
artificial immune system
Anomaly Detection
pubcrawl
Metrics
composabilty
resilience
Resiliency
biblio
System of Collection and Analysis Event Log from Sources under Control of Windows Operating System
Submitted by grigby1 on Thu, 03/04/2021 - 2:42pm
Metrics
Windows Operating System Security
universal system
the monitoring center
system monitoring
Servers
security of data
security information
Resiliency
resilience
received events
pubcrawl
Protocols
operating systems (computers)
operating systems
monitoring events
Windows operating system
Information systems
information security
Industrial engineering
event-forwarding technology
event sources
event management
event log analysis
event log
event forwarding technology
event collector
domain controller
computer security
composability
analysis of incidents
security
biblio
Evading Deepfake-Image Detectors with White- and Black-Box Attacks
Submitted by grigby1 on Thu, 03/04/2021 - 2:35pm
security of data
neural nets
neural network
optimization
Perturbation methods
popular forensic approach
pubcrawl
resilience
Resiliency
Robustness
Metrics
significant vulnerabilities
social networking (online)
state- of-the-art classifier
synthesizer
synthetic content
synthetically-generated content
target classifier
Training
Twitter
fraudulent social media profiles
white box
security
attack case studies
AUC
black-box attack
composability
deepfake-image detectors
disinformation campaigns
Forensics
White Box Security
Generators
image area
image classification
Image forensics
image generators
image representation
image sensors
image-forensic classifiers
learning (artificial intelligence)
biblio
Practical and White-Box Anomaly Detection through Unsupervised and Active Learning
Submitted by grigby1 on Thu, 03/04/2021 - 2:35pm
pubcrawl
white-box anomaly detection
user experience
Unsupervised Learning
Unsupervised Anomaly Detection
Time series analysis
time series
supervised learning
security of data
RRCF algorithm
RRCF
robust random cut forest
Resiliency
resilience
random forests
White Box Security
Neural networks
Monitoring
Metrics
Labeling
KPI anomaly detection framework
key performance indicators
iRRCF
Forestry
composability
Anomaly Detection
active learning
security
white box
biblio
Transparent IFC Enforcement: Possibility and (In)Efficiency Results
Submitted by grigby1 on Thu, 03/04/2021 - 2:34pm
security lattice
programming languages
pubcrawl
real-world programs
resilience
Resiliency
Runtime
secure information flow control
Secure Multi-Execution
secure programs
security condition
polynomial time
security of data
Semantics
SME family
termination insensitive noninterference
third-party systems
transparency
transparent enforcement
transparent IFC enforcement
white-box
FlowFox browser
white box
security
black-box
black-box enforcement
Browsers
composability
computational complexity
Computer languages
efficiency
faceted secure multiexecution
White Box Security
FSME
IFC community
Information Flow Control
Lattices
memory overhead
Metrics
Multiple Facets
no-write-down no-read-up style security policy
noninterference
biblio
Black Box to White Box: Discover Model Characteristics Based on Strategic Probing
Submitted by grigby1 on Thu, 03/04/2021 - 2:33pm
tuning
White Box Security
Libraries
machine learning
model characteristics
Probes
pubcrawl
resilience
security
security of data
strategic probing
text analysis
text generation
text transformer
Training
Training data
learning (artificial intelligence)
white box
white box adversarial attacks
Black Box Attacks
composability
Metrics
Resiliency
adversarial attacks
architecture attribution
black box encryption
deep classifier
GPT-2
image based classifiers
image classification
Industries
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »