Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Payloads
biblio
Head(er)Hunter: Fast Intrusion Detection using Packet Metadata Signatures
Submitted by aekwall on Mon, 01/11/2021 - 1:35pm
fast intrusion detection
Internet traffic
prevention systems
deep packet inspection
current network encryption trends
DPI implementations
DPI tools
encrypted network traffic
encryption protocols
Payloads
fast signature-based intrusion detection system
network packet metadata
network speeds
network traffic inspection
packet contents
packet headers
packet metadata signatures
packet payload content
internet
Scalability
telecommunication traffic
Cryptographic Protocols
Protocols
Resiliency
pubcrawl
Cryptography
malicious activities
computer network security
Internet users
metadata
pattern matching
Intrusion Detection
digital signatures
packet forwarding
Engines
biblio
Efficient Keyword Matching for Deep Packet Inspection based Network Traffic Classification
Submitted by aekwall on Mon, 01/11/2021 - 1:34pm
telecommunication network management
traffic classification techniques
subsequent signature matching
string matching
State Transition Machine
potential application signature
Network traffic classification
good classification accuracy
flow payloads
efficient keyword matching
dpi
deep packet inspection based network traffic classification
deep packet inspection
application signatures
network flows
Inspection
network management
Payloads
security monitoring
Complexity theory
quality of service
digital signatures
pattern matching
testing
pattern classification
pubcrawl
Resiliency
Protocols
telecommunication traffic
Scalability
biblio
Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure
Submitted by aekwall on Mon, 11/09/2020 - 1:11pm
Layout
Vulnerability
source code (software)
software reusability
Software
security of data
security
Resiliency
relative memory
pubcrawl
Position-Independent Code-Reuse Attacks
Payloads
multiple position-independent ROP
Memory management
address-space layout randomization
just-in-time code-reuse attacks
Information Reuse and Security
information disclosure mitigation
information disclosure detection
exploitation
Electronic mail
computer science
Compositionality
code pointers
code gadgets
code addresses
ASLR
advanced attacker
biblio
Text Mining for Malware Classification Using Multivariate All Repeated Patterns Detection
Submitted by grigby1 on Thu, 10/29/2020 - 11:12am
privacy
Metrics
mobile computing
mobile devices
Mobile handsets
mobile phones
mobile users
multivariate all repeated pattern detection
Payloads
malware family classification
pubcrawl
randomly selected malware applications
resilience
Resiliency
smart phones
smartphone users
Social network services
Text Mining
invasive software
Androids
ARPaD
bank accounts
cyber criminals
Data mining
Human behavior
Humanoid robots
internet
Android Malware Detection
legitimate application
LERP-RSA
malware
malware classification
malware dataset
malware detection
malware families
biblio
Preserve Location Privacy for Cyber-Physical Systems with Addresses Hashing at Data Link Layer
Submitted by aekwall on Mon, 10/26/2020 - 11:55am
Wireless communication
Location Privacy in Wireless Networks
stronger privacy protection
power efficiency
media access control
data link layer frame
cyber-physical system
Compositionality
Payloads
wireless medium
sensors
Metrics
Cryptography
Routing
privacy
location privacy
wireless sensor networks
Wireless Sensor Network
pubcrawl
Human behavior
Resiliency
cyber-physical systems
telecommunication security
Receivers
biblio
Automatic XSS Detection and Automatic Anti-Anti-Virus Payload Generation
Submitted by aekwall on Mon, 09/28/2020 - 12:35pm
parameter characteristics
SVM algorithm
XSS vulnerability
automatic anti-anti-virus payload generation tool
automatic bypassing
automatic detection
automatic XSS detection tool
DQN algorithm
malicious XSS attacks
malicious XSS parameters
Web application
RNN LSTM algorithm
rule-based WAF
user input parameters
user interaction
Web 2.0 era
XSS attack
XSS attack codes
Cross Site Scripting
internet
Support vector machines
feature extraction
learning (artificial intelligence)
machine learning
Resiliency
Human behavior
pubcrawl
Reinforcement learning
Scalability
tools
cross-site scripting
Training
recurrent neural nets
automatic generation
computer viruses
Payloads
Browsers
biblio
Adaptive Random Testing for XSS Vulnerability
Submitted by aekwall on Mon, 09/28/2020 - 12:34pm
Browsers
Cross Site Scripting
XSS testing tool
Subspace constraints
open source vulnerable benchmarks
headless browser
fuzzing method
common vulnerabilities
black-box testing tools
ART method
adaptive random testing
XSS vulnerability
fuzzing
security of data
Payloads
web applications
public domain software
program testing
cross-site scripting
Web sites
tools
internet
pubcrawl
Human behavior
Resiliency
Scalability
biblio
Bridging The Gap: Data Exfiltration In Highly Secured Environments Using Bluetooth IoTs
Submitted by grigby1 on Fri, 09/04/2020 - 4:25pm
malicious actor
covert
data
Data Exfiltration
exfiltration
free-space optical communication
highly secured network
home networks
Image color analysis
insecure IoT
IoT
Chromium
professional networks
security measures
security standard
sensitive environments
smart bulb
strict security policies
unprecedented threats
web bluetooth api
Cyber Physical System
bluetooth security
sensitive information
Internet of Things
security
computer network security
invasive software
pubcrawl
composability
Resiliency
resilience
Human behavior
IoT devices
Cryptography
Software
cyber physical systems
Payloads
Browsers
botnets
air gapped network
Bluetooth
Bluetooth IoT
Bluetooth smart bulb
biblio
Bridging The Gap: Data Exfiltration In Highly Secured Environments Using Bluetooth IoTs
Submitted by grigby1 on Fri, 08/07/2020 - 3:38pm
invasive software
unprecedented threats
strict security policies
Software
sensitive information
sensitive environments
security standard
security measures
security
Science of Security
pubcrawl
professional networks
Payloads
malicious actor
IoT devices
IoT
air gapped network
Internet of Things
insecure IoT
Image color analysis
home networks
highly secured network
free-space optical communication
Data Exfiltration
Cryptography
computer network security
Browsers
botnets
Bluetooth smart bulb
Bluetooth IoT
Bluetooth
biblio
A New Spatial Steganographic Scheme by Modeling Image Residuals with Multivariate Gaussian Model
Submitted by aekwall on Mon, 08/03/2020 - 10:29am
Steganography
adaptive filtering
steganographic methods
steganalysis
spatial steganographic scheme
spatial images
quantized multivariate Gaussian distribution
multivariate Gaussian model
image residuals modeling
high-pass filters
high-pass filtering
content-adaptive image steganographic schemes
approximated Fisher Information
Scalability
image filtering
Payloads
information processing
Media
gaussian distribution
Image coding
Metrics
Computational modeling
pubcrawl
Resiliency
feature extraction
security
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »