Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
physical access
biblio
Integrity and Non-Repudiation of VoIP Streams with TPM2.0 over Wi-Fi Networks
Submitted by grigby1 on Tue, 10/15/2019 - 2:44pm
VoIP
random nodes
Repudiation
research project INTEGER
resilience
Resiliency
secure authentication
softphones
TPM2
Trusted Computing
trusted computing group
Trusted Platform Module
quality of service
VoIP communication
VoIP softphones
VoIP streams
Wi-Fi
Wi-Fi Networks
Wireless communication
Wireless fidelity
wireless LAN
wireless scenarios
wireless streaming
internet
authentication
composability
computer network security
Cryptographic Protocols
Cryptography
digital networks
digital signature
digital signatures
hardware-based trusted anchor
Human behavior
integrity
attack scenarios
internet-based communication
Internet Protocol
Internet telephony
IP networks
legacy phone technologies
Metrics
nonrepudiation
physical access
Protocols
pubcrawl
file
Data-Driven Model-Based Detection of Malicious Insiders via Physical Access Logs
Submitted by thurlwel on Fri, 09/01/2017 - 2:21pm
insider threat
Intrusion Detection
physical access
Physical movement
Science of Security
User behavior
Hard Problems
biblio
Data-Driven Model-Based Detection of Malicious Insiders via Physical Access Logs
Submitted by thurlwel on Fri, 09/01/2017 - 2:21pm
Science of Security
cyber-physical systems
insider threat
Intrusion Detection
physical access
Physical movement
Science of Security
User behavior
biblio
Memory Trace Oblivious Program Execution
Submitted by Heather Lucas on Wed, 09/17/2014 - 6:46pm
Oblivious RAM
variable partitioning
type system
Semantics
Random access memory
programming language techniques
program verification
program diagnostics
program compilers
probing memory buses
physical control
physical attacks
physical access
ORAM banks
optimal efficiency
arrays
memory trace oblivious program execution
memory access traces
memory access overhead
formal security
encryption
DRAM chips
Cryptography
computing platform
computing infrastructure
compiler
cold-boot style attacks
cloud service providers
Cloud Computing